computer crime and security measures

PPT 17 pages 141.0 KB Free download

Page preview (5 pages)

Scroll down 👇
1 / 17
computer crime and security measures computer crime and security measures week 5 cont. computer crime computers make activities easier including illegal activities new ways to commit old crimes crimes against businesses - insiders and outsiders hackers, competitors, criminal gangs crime computers make the crimes easier to commit more devastating harder to detect doable from long distances new terms virus worm trojan horse trap door fraud and embezzlement embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted requires special knowledge special programming skill poor security fraud and embezzlement aided by anonymity complexities of modern transactions increase the opportunities defending against dishonest employees rotate responsibilities of employees with access to sensitive systems unique id and password limit access to system audit trails screening and background checks of employees good security policies defending against fraud immediate checks on legitimate cards programs to detect unusual spending holograms and …
2 / 17
sponsibility internet protection firewall crime laws computer technology challenged existing laws and led to new ones larceny use of computer time new laws access and use of computer without authorization is illegal
3 / 17
computer crime and security measures - Page 3
4 / 17
computer crime and security measures - Page 4
5 / 17
computer crime and security measures - Page 5

Want to read more?

Download all 17 pages for free via Telegram.

Download full file

About "computer crime and security measures"

computer crime and security measures computer crime and security measures week 5 cont. computer crime computers make activities easier including illegal activities new ways to commit old crimes crimes against businesses - insiders and outsiders hackers, competitors, criminal gangs crime computers make the crimes easier to commit more devastating harder to detect doable from long distances new terms virus worm trojan horse trap door fraud and embezzlement embezzlement - fraudulent appropriation of property by a person to whom it has been entrusted requires special knowledge special programming skill poor security fraud and embezzlement aided by anonymity complexities of modern transactions increase the opportunities defending against dishonest employees rotate responsibilities of employees ...

This file contains 17 pages in PPT format (141.0 KB). To download "computer crime and security measures", click the Telegram button on the left.

Tags: computer crime and security mea… PPT 17 pages Free download Telegram