CRM 101 Lecture Notes - Lecture 12: Cybercrime, Cyberterrorism, Cyberwarfare
Document Summary
Tradiional crimes can be commited over the internet, as can new crimes (cybercrime): Cyber thet: thet of copyright material or using technology to commit fraud and larceny. Cyberterrorism: undermining the social, economic, and poliical system of an enemy naion. One computer is used to reprogram another program for elicit purposes. When a dummy account is used to steal from customer"s inancial accounts (both banks and other businesses) A maintenance program orders checks to be issued to a private account. When a virus program is atached to a companies computer system. Unauthorized use of an authorized users idenity in order to gain access. Through this technique data is illegally obtained from a system by leaking it in small amounts over an extended period of ime. Generally found to be increasing, including by other naions. Illegal copyright infringement, o e. g. , ile-sharing program> warez: pracice of illegally copying sotware and posing on internet for others to use)