CRM 101 Lecture Notes - Lecture 10: Logic Bomb, United Nations Security Council Resolution 1566, Edward Snowden

18 views4 pages

Document Summary

Cyber crime: the theft of destruction of information using computers, networks, and the internet. Information technology (it): the use of computer networks and communications for education and commerce. Trojan horse -> one computer is used to reprogram another computer for illicit purposes. Salami slice -> a dummy account is used to steal from customers" accounts. Super-zapping -> when a maintenance program orders cheques issued to a private account. Logic bomb -> a technique through which a virus program is attached to a computer system. Data leakage -> illegally obtaining data from a system by leaking it in small amounts. Generally found to be increasing, including by other nations. Warez: the practice of illegally copying software and posting it to the internet for others to use. Market manipulation, fraudulent offerings of securities, illegal touting. Cyberespionage: the use of computer networks and communications to commit espionage, such as hacking into military, government, and industry computer systems.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents