The maximum exploitation of technology exits at workplace where personal computers, network systems, Internet access, e-mail and telephones are easily accessible for employee’s use. Employers’ greatest risk to their computer security comes not from outside hackers but from current and former employees who intentionally or inadvertently disclose confidential or sensitive information. Employees no longer have to photocopy documents behind closed doors; they can simply download package of data to disk, CD or DVD, or even e-mail the information to a competitor with the click of a mouse.
Another form of technical exploitation or defamation is employer harassing female employees’ by sending obnoxious and sexually assaulting emails. Technology may also be used to commit a wide spectrum of other offenses, including embezzlement, defrauding the company and customers, and corruption of company records.
The easiest way for a modern office worker to destroy the company is through its information resources. It only takes one disgruntled or irritated employee, or former employee with enough information technology expertise, to create serious disruption, which could result in significant economic loss. There are numerous ways in which insiders or former insiders can attack company computers:
hacking (gaining access to a computer or network without authorisation); cracking (gaining access for the purpose of committing crime once inside); sabotage (gaining access for the purpose of doing damage); and...