Consider the following examples of computer crime as you answer the question: Social Security numbers are stolen from a company’s database.

Consider the following examples of computer crime as you answer the question:

i. Social Security numbers are stolen from a company’s database.

ii. A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.

iii. An employee receives threats from a co-worker via e-mail.

iv. An unhappy customer launches a denial-of-service attack.

Carter’s taxonomy of computer crime comprises four categories. Which of the following pairs includes two items from the same category?

I and IIII and IIIII and IVI and IV

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *