BUS 082 Lecture Notes - Lecture 15: Cyberterrorism, Dumpster Diving, Hard Disk Drive
Document Summary
Computer crime can be very effective and difficult to detect. The computer as a tool to commit crime. Many individuals who commit computer-related crime claim they do it for the. In general, criminals need two capabilities for computer crimes: challenge, not for the money. The criminal needs to know how to gain access to the computer system. The criminal must know how to manipulate the system to produce the desired result access to the computer system. Social engineering: criminals talk computer passwords out of individuals to gain. Dumpster diving: attackers go through the garbage for important pieces of information that can help crack the computers or convince someone at the company to give them more access. Identify theft potential security holes in critical systems (electricity grids, stockmarkets) Cyberterrorism: the act of using internet probes and serve scan intrusions to map.