Professional Documents
Culture Documents
Computer as a target of a
crime
Viruses, worms, industrial
espionage, software piracy,
hacking
Floppy disks
Zip/Jazz disks
Tapes
Digital cameras
Memory sticks
Printers
CDs
PDAs
Game boxes
Networks
Hard drives
Delete their files and emails Restore deleted files and emails –
they are still really there!
Use Wi-Fi networks and cyber Track them down through the
cafes to cover their tracks digital trail - IP addresses to ISPs
to the offender