You are on page 1of 2

Computer Crime

Alternatively referred to as cyber


crime, e-crime, electronic crime, or
hi-tech crime. Computer crime is
an act performed by a knowledgeable
computer user, sometimes referred to
as a hacker that illegally browses or
steals a company's or individuals
private information. In some cases,
this person or group of individuals may
be malicious and destroy or otherwise
corrupt the computer or data files.

Fraud - Manipulating data, e.g.


changing banking records to
transfer money to an account.

Harvesting - Collect account or


other account related
information on other people.

Identity theft - Pretending to


be someone you are not.

Intellectual property theft Stealing another persons or


companies intellectual property.

Phishing - Deceiving
individuals to gain private or
personal information about that
person.

Salami slicing - Stealing tiny


amounts of money from each
transaction.

Spamming - Distributed
unsolicited e-mail to dozens or
hundreds of different addresses.

Spoofing - Deceiving a system


into thinking you are someone
you really are not.

Unauthorized access Gaining access to systems you


have no permission to access.

Wiretapping - Connecting a
device to a phone line to listen
to conversations.

Examples of computer
crimes
Below is a listing of the different types
of computer crimes today. Clicking on
any of the links below gives further
information about each crime.

Child pornography - Making


or distributing child
pornography.
Cyber terrorism - Hacking,
threats, and blackmailing
towards a business or person.
Cyber bully or Cyber
stalking - Harassing others
online.

Creating Malware - Writing,


creating, or distributing
malware (e.g. viruses and
spyware.)

Denial of Service attack Overloading a system with so


many requests it cannot serve
normal requests.

Espionage - Spying on a
person or business.

System Disaster
Disasters can be classified into two broad
categories. The first is natural disasters
such as floods, hurricanes, tornadoes or
earthquakes. While preventing a natural

disaster is very difficult, risk management


measures such as avoiding disaster-prone
situations and good planning can help.
The second category is manmade
disasters, such as hazardous material
spills, infrastructure failure, bio-terrorism,
and disastrous IT bugs or failed change
implementations. In these instances,
surveillance, testing and mitigation
planning are invaluable.

Disaster Recovery
Plan
Businesses use information technology
to quickly and effectively process
information. Employees use electronic
mail and Voice over Internet Protocol
(VOIP) telephone systems to
communicate. Electronic data
interchange (EDI) is used to transmit
data including orders and payments
from one company to another. Servers
process information and store large
amounts of data. Desktop computers,
laptops and wireless devices are used
by employees to create process,
manage and communicate
information.

agency-wide program providing


information security and information
systems that support the operations
and assets of that agency.
An effective information security
program for a federal agency should
include:

Policies and procedures that


cost-effectively reduce
information security risks;

Backup plans for providing


adequate information security
for networks, facilities,
information systems, or groups
of information systems;

Security awareness training;

Periodic testing and evaluation


of the effectiveness of
information security policies,
procedures, practices, and
security controls;

Periodic assessments of risk,


including the magnitude of
harm that could result from the
unauthorized access, use,
disclosure, disruption,
modification, or destruction of
information and information
systems;

A process for planning,


implementing, evaluating, and
documenting remedial actions
to address any deficiencies in
the information security
policies, procedures, and
practices; and

Procedures for detecting,


reporting, and responding to
security incidents.

Safeguarding
Information
Safeguarding information refers to
protecting electronic information from
unwanted access, sometimes known
as a breach. The Federal Information
Security Management Act (FISMA)
requires each federal agency to
develop, document, and implement an

You might also like