- Trap doors – potential offenders are system and application programmers
- Trojan horses, viruses, worms, salamis and logic bombs – can be detected by comparing program code with backup copies of the same program
- Masquerading – can be detected through password violations
- Scanning – potential offenders are spies trying to access systems for targeted data
- Dumpster diving – may be detected by analyzing the data left over after the job execution.
- Timing attacks – potential offenders are advanced system analysts and computer programmers
- Wiretapping or eavesdropping – may be detected by tracing origins of equipment and items used to commit the crime
- Software piracy – commercial software purchasers and users are potential offenders
- Excess privileges – potentially programmers with access to computer operations staff
- Data diddling – possible evidence includes source and transaction data