Tag: dumpster diving
-
Computer related crime characteristics
Trap doors – potential offenders are system and application programmers Trojan horses, viruses, worms, salamis and logic bombs – can be detected by comparing program code with backup copies of the same program Masquerading – can be detected through password violations Scanning – potential offenders are spies trying to access systems for targeted data Dumpster…