z-logo
open-access-imgOpen Access
Halting Computer Crime And Abuse: Managements Newest Challenge
Author(s) -
Karen A. Forcht,
Joan K. Pierson,
Ben M. Bauman
Publication year - 2011
Publication title -
journal of applied business research
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.149
H-Index - 22
eISSN - 2157-8834
pISSN - 0892-7626
DOI - 10.19030/jabr.v5i2.6366
Subject(s) - trojan horse , computer security , computer science , criminology , internet privacy , psychology
As computers enter the business environment with increasing regularity, their introduction is also coupled with paramount abuse. This paper explores the profile of the typical computer criminal and describes some of the most commonly used methods for violating a computer system. Included in the discussion are: data diddling, Trojan horse, salami technique, superzapping, trapdoors, logic bombs, synch attacks, scavenging, data leakage, piggybacking or impersonation, wiretapping, manipulation, and viruses.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here