{"id":366,"date":"2012-04-24T03:05:29","date_gmt":"2012-04-23T20:05:29","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=366"},"modified":"2012-04-24T03:06:32","modified_gmt":"2012-04-23T20:06:32","slug":"kamko-5","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-5\/","title":{"rendered":"Kamko 5"},"content":{"rendered":"<p>A disgruntled employee might<\/p>\n<div>\u2022Plant a logic bomb to be \u201cexploded\u201d on the first Friday the thirteenth after his or her record is deleted from the personnel data base.<\/div>\n<div>\u2022Crimes that involve the manipulation of computer systems and their data. Embezzlement and fraud fall into this category.<\/div>\n<div>Computer crime<\/div>\n<div>\n<div>\u2022Tipe: mulai dari penggunaan sandi tak legal (unauthorized password) oleh mahasiswa sampai a billion-dollar insurance fraud.<\/div>\n<div>\u2022Diestimasi total uang hilang akibat kriminal komputer lebih besar dari pada total semua perampokan.<\/div>\n<div>\u2022In fact, no one really knows the extent of computer crime because &#8230;<\/div>\n<\/div>\n<div>\n<div>\u2022Much of it is either undetected or unreported (most often the latter). In those cases involving banks, officers may elect to write off the loss rather than announce the crime and risk losing the goodwill of their customers.<\/div>\n<div>\u2022Computer crime requires the cooperation of an experienced computer specialist. A common street thug does not have the knowledge or the opportunity to be successful at computer crime.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A disgruntled employee might \u2022Plant a logic bomb to be \u201cexploded\u201d on the first Friday the thirteenth after his or her record is deleted from the personnel data base. \u2022Crimes that involve the manipulation of computer systems and their data. Embezzlement and fraud fall into this category. Computer crime \u2022Tipe: mulai dari penggunaan sandi tak &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-5\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 5&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-366","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/366"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/366\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}