{"id":438,"date":"2012-05-28T21:29:29","date_gmt":"2012-05-28T14:29:29","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=438"},"modified":"2012-05-28T21:31:00","modified_gmt":"2012-05-28T14:31:00","slug":"kamko-21-2","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/28\/kamko-21-2\/","title":{"rendered":"kamko 21"},"content":{"rendered":"<p>Most computer crime fall into<\/p>\n<div>\u2022One of five broad categories: 1) illegal access to computers; 2) theft of computers; 3) direct attack on computers; 4) use of the computer to conduct or plan a crime; and 5) illegal reproduction of software.<\/div>\n<div>\u2022Ket 1 &gt; an unauthorized person gains access to a computer or a computer network. Individuals who specialize in breaking into computers are called hackers.<\/div>\n<div>The term hacker originally<\/div>\n<div>\n<div>\u2022Applied to anyone who spent many hours at the computer \u201chacking\u201d program \u2013 that is, learning how they work. In fact, many of today\u2019s computer industry leaders started out as hackers who wanted to make computers do more. Unfortuneately, the term has taken on negative connotations due to the harm many of these people cause.<\/div>\n<\/div>\n<div>Ket 2&gt; In many cases, when computer hardware, software, or<\/div>\n<div>\n<div>\u2022Peripherals are stolen, the object of the theft is actually the information stored in the computer. An organization\u2019s information may be significantly more valuable the the computer itself.<\/div>\n<div>\u2022A computer can be attacked physically or throuh the use of damaging software. Terrorists target computer centers for destruction.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Most computer crime fall into \u2022One of five broad categories: 1) illegal access to computers; 2) theft of computers; 3) direct attack on computers; 4) use of the computer to conduct or plan a crime; and 5) illegal reproduction of software. \u2022Ket 1 &gt; an unauthorized person gains access to a computer or a computer &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/28\/kamko-21-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 21&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-438","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/438"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=438"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/438\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}