kamko 21

Most computer crime fall into

•One of five broad categories: 1) illegal access to computers; 2) theft of computers; 3) direct attack on computers; 4) use of the computer to conduct or plan a crime; and 5) illegal reproduction of software.
•Ket 1 > an unauthorized person gains access to a computer or a computer network. Individuals who specialize in breaking into computers are called hackers.
The term hacker originally
•Applied to anyone who spent many hours at the computer “hacking” program – that is, learning how they work. In fact, many of today’s computer industry leaders started out as hackers who wanted to make computers do more. Unfortuneately, the term has taken on negative connotations due to the harm many of these people cause.
Ket 2> In many cases, when computer hardware, software, or
•Peripherals are stolen, the object of the theft is actually the information stored in the computer. An organization’s information may be significantly more valuable the the computer itself.
•A computer can be attacked physically or throuh the use of damaging software. Terrorists target computer centers for destruction.

Author: rasp

Saya adalah pejuang, pekerja informatics ipos, mujahid fi sabil lillaah, hamba Allah SWT.

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *