1)Key terms
- access control Software: a software that only allows users to access according to the user's needs
- antivirus:a program designed to search for virus, alert the users, and destroy the virus
- authentication mechanism: a security measure that make sure only legitimate users have access to the system by asking potential users to identify themselves
- authorization mechanism: a security measure that guarantees that users have permission to perform a particular task
- autonomous system: a complex system that can assume almost complete responsibility for a task without human input
- back up:the process of saving data- especially for data recovery
- biometric: measurements of individual body characteristics
- computer crime: an crime accomplished though knowledge or use of computer technology
- encryption: a secret numerical code that can be used to scramble network transmission
- firewall: a tool used to keep internal networks secure while enabling communication with the rest of the Internet
- hacking: electronic trespassing and vandalism
- identity theft: the crime of obtaining enough information about a person to assume his or her identity
- passwords: the most common security tool used to restrict access to a computer system
- sabotage: a malicious attack on work, tools, or business
2) Why is it hard to estimate the extent of computer crimes?
Not all computer crimes are reported to the database, so it is impossible to estimate its' extent.
3)Describe the typical computer criminal. How does he or she differ from the media stereotype.
A typical computer criminal is struggling with something, for example, financial needs. He has no criminal record and commits crime due to these struggles. The stereotypical criminal is described as a young, white, and tech-savvy.
4) What is the most common computer crime? Who commits it? What is being done to stop it?
Theft by computer is the most common computer crime. Different people are involved with it such as employees, clerks, etc. People use more secure websites and in some cases even the FBI are involved to stop it from happening.