Ket 3> Electronic vandals manage
•To implant destructive software called “viruses” and “worm” to destroy computer data or software.
•Ket 4> Using a computer to plan or conduct a crime is becoming more “popular” as users discover ways to use the computer’s power for illegal purpose. Such things as creating false ATM cards, forging documents, and …
… Illegally accessing a cellular
•Phone network fall into this category. The use of electronic bulletin boards to sell child pornography also falls into this category.
•Ket 5> The illegal reproduction of software, often referred to as software piracy, is a large problem for companies that develop and sell software.
•Security issues involve methods that …
… Organizations use to
•Protect their hardware, software, and information – physical security, data security, and network security.
•Physical security involves methods of protecting all computer hardware, from mainframes to desktop computers to notebook PCs.
•Data security protects the software and …