Halting Computer Crime And Abuse: Managements Newest Challenge

Main Article Content

Karen A. Forcht
Joan Pierson
Ben Bauman

Keywords

computer crime, criminal profile, management challenge

Abstract

As computers enter the business environment with increasing regularity, their introduction is also coupled with paramount abuse. This paper explores the profile of the typical computer criminal and describes some of the most commonly used methods for violating a computer system. Included in the discussion are: data diddling, Trojan horse, salami technique, superzapping, trapdoors, logic bombs, synch attacks, scavenging, data leakage, piggybacking or impersonation, wiretapping, manipulation, and viruses.

Downloads

Download data is not yet available.
Abstract 173 | PDF Downloads 117