Question: 4. The following classification scheme for computer crime is based upon the role that the computer plays in the criminal activity: (A) Computers as targets:

4. The following classification scheme for computer crime is based upon the role that the computer plays in the criminal activity: (A) Computers as targets: This form of crime involves an attack on data integrity, system integrity, data confidentiality, privacy, or availability of the computer system.

(B) Computers as storage devices: Computers can be used to further unlawful activity by using a computer or a computer device as a passive storage medium. Examples: The computer is used to store pirated commercial software, pornographic images, or stolen credit card numbers.

(C) Computers as communications tools: Many of the crimes falling within this category are simply traditional crimes that are committed online. Examples: The illegal sale of prescription drugs; gambling; and child pornography.

For each of the 15 reported cybercrimes listed in the table below, indicate whether it falls into the category of computer as target, computer as storage device, or computer as communications tool. In the first case, indicate whether the crime is primarily an attack on data integrity, system integrity, data confidentiality, privacy, or availability. Reported cybercrimes (Source: CERT 2006 E-Crime Watch Survey Results)

1) Theft of intellectual property

2) Theft of other (proprietary) info including customer records, financial records, etc.

3) Denial-of-service attacks

4) Virus, worms, or other malicious code

5) Fraud (credit card fraud, etc.)

6) Identity theft of customer

7) Illegal generation of spam e-mail

8) Phishing (someone posing as your company online in an attempt to gain personal data from your subscribers or employees)

9) Unauthorized access to/use of information, systems, or networks.

10) Sabotage: deliberate disruption, deletion, or destruction of information, systems, or networks.

11) Extortion

12) Web site defacement

13) Zombie machines on organizations network/bots/use of network by BotNets

14) Intentional exposure of private or sensitive information

15) Spyware (not including adware)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!