Using Computer Science in High-Tech Criminal Justice Careers and Business by Carol Hand

Using Computer Science in High-Tech Criminal Justice Careers and Business by Carol Hand

Author:Carol Hand
Language: eng
Format: epub
Publisher: The Rosen Publishing Group, Inc


In 1988, Robert Morris created the first computer worm, which crashed thousands of computers. Morris was prosecuted but is now an MIT professor and an entrepreneur.

Many cybercrime methods are more technological. In keystroke logging, the hacker installs a program that records every keystroke the computer user makes. This approach provides information needed to enter the system or steal the user’s identity. Passwords can be hacked using educated guesses; brute force (trial and error); or simple algorithms that generate combinations of keyboard letters, numbers, or symbols. Password hacking is often successful because people use predictable passwords or leave default passwords in place.

Hackers can gain backdoor access by writing a program that searches for unprotected pathways into the system. If a computer has poor security, this flaw sometimes allows access without a password or username. Another backdoor-access approach is installing a program called a Trojan horse. This program is a piece of malware disguised as legitimate software. Users are tricked into downloading and installing the program on their computer. The Trojan then spies on the user or steals, deletes, blocks, modifies, or copies data. Sometimes, it simply disrupts the computer’s (or network’s) performance. Trojans cause considerable harm, but they do not self-replicate like viruses or worms.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Working with Challenging Parents of Students with Special Needs by Gorman Jean Cheng;(696)
Macmillan Primary Grammar 2 Pupil's Book by Unknown(370)
Figuring Out Fluency in Mathematics Teaching and Learning, Grades K-8 by Jennifer M. Bay-Williams & John J. SanGiovanni(332)
The Principal's Guide to Curriculum Leadership by Sorenson Richard D.;Goldsmith Lloyd M.;Mendez Zulma Y.;Maxwell Karen T.;(255)
English Grammar Practice--The Noun by Roxana Nastase(221)
Learning from Accidents 3rd ed by Trevor Kletz (2001)(216)
Harnessing Technology for Deeper Learning by Scott McLeod(202)
Text-Dependent Questions, Grades K-5 by Douglas Fisher & Nancy Frey & Heather Anderson & Marisol Thayre(200)
English Language Program Administration by Unknown(191)
A Guide to Curriculum Mapping by Hale Janet A.;(190)
Deep Change Leadership by Reeves Douglas;(185)
How to Do Everything with Google Tools by Unknown(178)
The Grammar Teacher's Activity-a-Day by Jack Umstatter(174)
The Power of SMART Goals by Conzemius Anne;O'Neill Jan; & Anne Conzemius(171)
Beyond the RTI Pyramid by Bender William N.;(155)
Using Data to Close the Achievement Gap by Johnson Ruth S.;(151)
Using Equity Audits to Create Equitable and Excellent Schools by Skrla Linda E.;McKenzie Kathryn B.;Scheurich James Joseph;(146)
Aligning and Balancing the Standards-Based Curriculum by Squires David A.;(141)
Differentiated Instructional Strategies for the Block Schedule by Gregory Gayle H.;Herndon Lynne E.; & Lynne E. Herndon(131)
You've Got to Reach Them to Teach Them by Schreck Mary Kim; & Schreck(131)