Tuesday, March 29, 2011

Ch 10 Review Questions

  • 2. It is hard to determine the extent of computer crimes because many crimes go undetected, and those detected go unreported because buisnesses will go into fear.
  • 3. The typical computer criminal is a trusted employee with no criminal record. they are usually tempted by loopholes in the system. They are different then the normal steryotypes in which the criminal is outside the system and tries to break in.
  • 4. Theft is the most common form of computer crime. People steal money, goods, passwords, information and resources.
  • 5. Intellectual property laws give us the right to protect what is rightfully ours. They apply to software by allowing us to have log in passwords to protect our computers and laptops to protect information from being stolen.
  • 6. Some sabotage software includes trojan horses, viruses, and worms. A trojan horse performs a useful task while also being secretly distructive. Viruses spread by making copies of itself from program to program.A worm is a program that travels over computer networks seeking uninfected sites.
  • 7. Two inherent characteristics of computers that make security so difficult is the fact that first its impossible to remove all the bugs from the computers. Theres to many to count or even find. Second, the bigger the system is the bigger the problem. With larger computers its harder to tract the problems within it.
  • 9. The First Taxpayer coppies the days worth of transactions from disk to tape to keep record, also to prevent theft. That way if anyhting has been stolen the bank has record of how much money has been taken and such details.
  • 11. Smart weapons are missiles that use computered guidance to locate their targets. These are different then normal missiles that have to be aimed by the person manually. Smart weapons are a step up from what was previously used can call for better accuracy.

No comments:

Post a Comment