CRM 101 Lecture Notes - Lecture 9: United Nations Security Council Resolution 1566, Securities Fraud, Political Crime
Document Summary
Chapter 14 crimes in the 21st century. Tradiional crimes can be commited over the internet, as can new crimes (cybercrime): cyberthet: thet of copyright material or using technology to commit fraud and larceny, cybervandalism: disruping, defacing, and destroying technology, cyberwar: is poliical, involving spying. Can be commited across internaional borders: cyberterrorism: undermining the social, economic, and poliical system of an enemy naion. Trojan horse: through this technique, one computer is used to reprogram another computer for illicit purposes. Salami slice: a dummy account is used to steal from customer"s accounts. Super-zapping: when a maintenance program orders cheques issued to a private account. Logic bomb: a virus program is atached to a computer system. Impersonaion: when someone makes unauthorized use of an authorized users idenity. Data leakage: illegally obtaining data from a system by leaking it in small amounts. 2. the need to exhibit their technical prowess and superiority: desire to highlight the vulnerability of computer security systems.