home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Comp…er Concepts (3rd Edition) / NP3CD_Intro.iso / NP3CD / PAGE370.PAG < prev    next >
Graphics Interchange Format  |  1997-11-02  |  59KB  |  623x1043  |  8-bit (124 colors)
Labels: book | hakham | kite | mountain | plant | reckoner | sky | trade name | tree
OCR: 9-14 DATA SECURITY AND CONTRO Co m pute Crime Is crime spread computer virus? The accounting f firm Ernst & Young estimates that computer crime costs individuals and organizations in the United States between billion aue $5 billion vear "Old-fas hioned' crimes that take a high- tech twist because they involve computer are often prosecuted using traditional laws FOr example person who attempts s to destroy computer setting fire tc computer might be prosecuted under traditional arson laws InfoWet Traditional laws do not howev er, cover the range of possibilities for computer crimes Suppose aperson unlawfully enters computer facilit y. That person might be prosecuted for breaking pue entering. would breaking pue entering laws Apdpe to person who uses an off-site terminal to "enter' computer s ...