Tag: characteristics

  • Computer related crime characteristics

    Trap doors – potential offenders are system and application programmers Trojan horses, viruses, worms, salamis and logic bombs – can be detected by comparing program code with backup copies of the same program Masquerading – can be detected through password violations Scanning – potential offenders are spies trying to access systems for targeted data Dumpster…