Computer Security
Beginning of paper
First, we have to understand these type of computer crimes such as below because they will let us know the computer crimes often happen in our lives.
1. unauthorized use, access, modification, copying, and destruction of software or data (Bill Smith, the computer consultant, was convicted under rec ....
Middle of paper
.... their money if they neglect the , and the increasing trend of unauthorized access is from 1996 to 1997 from the tables below.
Table 1
Companies reporting financial losses attributable to specific types of high-tech criminal activity and other factor in 1996-1997.
Factor Percentage
Virus Infection 65%
Laptop Theft 57%
Abusive Use Of Internet 31%
Unauthorized Computer Use 16%
Telecommunications Fraud 16%
Information Theft 14%
Financial Fraud 12%
Sabotage 11%
Network break-in 8%
sour ....
------------------
Word count: 826
Page count: 4 (approximately 250 words per page)