NCJ Number
38841
Journal
Assets Protection Volume: 2 Issue: 1 Dated: (WINTER 1976) Pages: 32-38
Date Published
1976
Length
7 pages
Annotation
ARTICLE DEVELOPS A PICTURE OF A NEW FORM OF CRIME, COMPUTER RELATED FRAUD, THAT HAS BURGEONED WITH MODERN TECHNOLOGICAL ADVANCES.
Abstract
AIDING THIS INCREASE IN COMPUTER RELATED CRIMES IS THE FACT THAT MORE PEOPLE ARE GAINING KNOWLEDGE IN THE COMPUTER FIELD, THUS HAVING THE TECHNICAL CAPABILITY TO COMMIT SUCH CRIMES. TO ILLUSTRATE THE IMPACT OF THESE CRIMES, THE AUTHOR CITES A NUMBER OF DOCUMENTED INCIDENTS TYPIFYING COMPUTER DATA THEFT. IN ORDER TO CLARIFY THE SUBJECT, THE AUTHOR DELINEATES SIX MAJOR CATEGORIES OF GAINING UNAUTHORIZED ACCESS TO COMPUTERIZED DATA. ALSO NOTED IS THE FACT THAT SECURITY PROBLEMS MOST FREQUENTLY OCCUR WITH THE USE OF REMOTE TERMINALS. THE ARTICLE CONCLUDES WITH SUGGESTIONS FOR USING SECURITY CHECKLISTS, HARDWARE AND SOFTWARE MONITORS, AND ENCRYPTION DEVICES OR SCRAMBLERS TO PREVENT ESPIONAGE AND THEFT OF COMPUTER SYSTEMS....KAP