Fighting Computer Crime |
Contents
PART ONE Computer Abuse 1 | 3 |
Computer Abuse Research | 14 |
How Much Computer Crime Is There? | 23 |
Copyright | |
49 other sections not shown
Other editions - View all
Fighting Computer Crime: A New Framework for Protecting Information Donn B. Parker No preview available - 1998 |
Common terms and phrases
account number action activities acts assets attack attorney automated backup bank Cap'n Crunch cards cause circuits computer abuse computer center computer crime law computer operator computer programs computer science computer security computer services computer system computer technology computer terminal computer-related copy correct criminal crypto cryptography customers decryption DEFENDANT detection deterrent developed device digital signatures discovered disk electronic employees encrypted equipment Ethics Issue example Federal fraud funds Hansen identified logic bomb loss magnetic magnetic tape manual methods million operating system output password perpetrator person phone phreaks potential prevention prison problem processing prosecution PROSECUTOR protection public key puter records reported requires responsibility safeguards scenarios scientist secret key signature SRI International storage tape technical telephone theft time-sharing tion transfer Trojan horse trust unauthorized unethical users victim vulnerability wire