Professional Documents
Culture Documents
Phishing - Deceiving
individuals to gain private or
personal information about that
person.
Spamming - Distributed
unsolicited e-mail to dozens or
hundreds of different addresses.
Wiretapping - Connecting a
device to a phone line to listen
to conversations.
Examples of computer
crimes
Below is a listing of the different types
of computer crimes today. Clicking on
any of the links below gives further
information about each crime.
Espionage - Spying on a
person or business.
System Disaster
Disasters can be classified into two broad
categories. The first is natural disasters
such as floods, hurricanes, tornadoes or
earthquakes. While preventing a natural
Disaster Recovery
Plan
Businesses use information technology
to quickly and effectively process
information. Employees use electronic
mail and Voice over Internet Protocol
(VOIP) telephone systems to
communicate. Electronic data
interchange (EDI) is used to transmit
data including orders and payments
from one company to another. Servers
process information and store large
amounts of data. Desktop computers,
laptops and wireless devices are used
by employees to create process,
manage and communicate
information.
Safeguarding
Information
Safeguarding information refers to
protecting electronic information from
unwanted access, sometimes known
as a breach. The Federal Information
Security Management Act (FISMA)
requires each federal agency to
develop, document, and implement an