Halting Computer Crime And Abuse: Managements Newest Challenge
Main Article Content
Keywords
computer crime, criminal profile, management challenge
Abstract
As computers enter the business environment with increasing regularity, their introduction is also coupled with paramount abuse. This paper explores the profile of the typical computer criminal and describes some of the most commonly used methods for violating a computer system. Included in the discussion are: data diddling, Trojan horse, salami technique, superzapping, trapdoors, logic bombs, synch attacks, scavenging, data leakage, piggybacking or impersonation, wiretapping, manipulation, and viruses.
Downloads
Download data is not yet available.