NCJ Number
170211
Date Published
1995
Length
455 pages
Annotation
This book explains how computers are protected against criminal activities and how such protections can be circumvented and examines laws applicable to computer crimes, characteristics and motives of likely perpetrators of computer crimes, computer crime investigations, and protection of the rights and property of suspects and victims.
Abstract
Book chapters are organized in four parts. The first part covers laws that prohibit computer crimes, vulnerabilities of computer systems to crime, computer crime prevention, breaches of physical and personnel security, breaches of communications and data security, characteristics of computer criminals, and jurisdiction over computer crimes. The second part discusses computer crime prevention, with emphasis on threats, vulnerabilities, countermeasures, physical and personnel security, communications security, and operations security. The third part considers how to handle computer crimes in relation to planning, crisis management, investigation, and prosecution. The fourth part deals with computer crime laws, particularly State laws. Appendixes provide additional information on how to prevent computer crimes. References and footnotes