CRM 101 Lecture Notes - Lecture 10: Logic Bomb, United Nations Security Council Resolution 1566, Edward Snowden
Document Summary
Cyber crime: the theft of destruction of information using computers, networks, and the internet. Information technology (it): the use of computer networks and communications for education and commerce. Trojan horse -> one computer is used to reprogram another computer for illicit purposes. Salami slice -> a dummy account is used to steal from customers" accounts. Super-zapping -> when a maintenance program orders cheques issued to a private account. Logic bomb -> a technique through which a virus program is attached to a computer system. Data leakage -> illegally obtaining data from a system by leaking it in small amounts. Generally found to be increasing, including by other nations. Warez: the practice of illegally copying software and posting it to the internet for others to use. Market manipulation, fraudulent offerings of securities, illegal touting. Cyberespionage: the use of computer networks and communications to commit espionage, such as hacking into military, government, and industry computer systems.