BUS 082 Lecture Notes - Lecture 15: Cyberterrorism, Dumpster Diving, Hard Disk Drive

11 views3 pages

Document Summary

Computer crime can be very effective and difficult to detect. The computer as a tool to commit crime. Many individuals who commit computer-related crime claim they do it for the. In general, criminals need two capabilities for computer crimes: challenge, not for the money. The criminal needs to know how to gain access to the computer system. The criminal must know how to manipulate the system to produce the desired result access to the computer system. Social engineering: criminals talk computer passwords out of individuals to gain. Dumpster diving: attackers go through the garbage for important pieces of information that can help crack the computers or convince someone at the company to give them more access. Identify theft potential security holes in critical systems (electricity grids, stockmarkets) Cyberterrorism: the act of using internet probes and serve scan intrusions to map.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents