Com_crime_varities - Hostile Applets Bombs Trapdoors and...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Security – Fischer and Green Mahesh Nalla
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
General Issues
Background image of page 2
Varieties of computer crimes Data Manipulation Salami technique Trojan Horse Viruses Worms
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Hostile Applets Bombs Trapdoors and Back Doors Time Stealing Electronic Eavesdropping Software Privacy Scavenging Memory...
View Full Document

This note was uploaded on 04/14/2008 for the course CJ 385 taught by Professor Nalla during the Spring '08 term at Michigan State University.

Page1 / 3

Com_crime_varities - Hostile Applets Bombs Trapdoors and...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online