Professional Documents
Culture Documents
F. Middle in The Middle Attack: It Security Cyber Threats - The Information Is Then Used To Access
F. Middle in The Middle Attack: It Security Cyber Threats - The Information Is Then Used To Access
NATURAL HAZARDS
- Some disasters do not merely lead to
temporary system downtime; they can
wreck the entire system
- Without power and communications
connections, cellphones, automated teller
machines, credit card verifiers, and bank
computers are useless
COMPUTER CRIMES
- An illegal act perpetrated against computer
or telecommunications
- Use of computer or telecommunications to
accomplish an illegal act
Types of Computer Crimes
A. Theft of Hardware
o Computers, computer parts,
computer accessories
B. Theft of Software