NCJ Number
91726
Date Published
1983
Length
321 pages
Annotation
An expert on law and computer security discusses in nontechnical language the causes and types of computer crime, measures to safeguard computers from criminal attack, and novel abuses such as the theft of high technology, industrial espionage and sabotage, and takeover attempts.
Abstract
The book initially describes the kinds of crimes that can be committed with computers and why the technology encourages such crimes. This section also analyzes computer felons' characteristics, their motivations, and why victims are reluctant to prosecute. It emphasizes that, unlike traditional crime, computer crimes are calculated acts of professionals who occupy positions of trust and are armed with modern technology. Potential sources of computer-related attacks are detailed, as are managerial initiatives that help authorities prosecute computer criminals. The author explores the threat of organized crime's infiltration into computer systems, methods to identify such activities, and the role of ethics in combating computer crime. Guidelines for computer security discuss managing an audit of the computer center, detecting and investigating computer fraud, coordinating preventive efforts with law enforcement agencies, and using consultants. Other suggestions outline a risk assessment process to analyze a system's vulnerability, potential losses that could result from computer crime, and the probability of abuse. Subsequent chapters explain the role of computer security in an organization and essential components of a security program. Finally, the book examines computer-related legal liabilities and subtle electronic crimes peculiar to the cashless/paperless society, notably stealing electronic money. A glossary, over 60 references, and an index are supplied.