NCJ Number
84315
Date Published
1981
Length
26 pages
Annotation
Topics considered are the nature of computer crime, the vulnerability of computer systems, computer security, existing law applicable to computer crimes, and the investigation of computer crimes and abuses.
Abstract
Computer crime or abuse is defined as any incident involving computer technology in which there is a victim who suffered or could have suffered a loss and a perpetrator who by intention made or could have made gain. Types of computer crime are indicated to involve the computer as the object of the attack, using the computer system for personal gain, using a computer to commit a crime unrelated to the computer system, and using computers to intimidate, deceive, or defraud. A profile is provided of the typical computer criminal and his/her motivations for the criminal acts. Areas in computer systems vulnerable to various types of crime are noted, and ways to counter criminal attacks on particularly vulnerable aspects of a computer system are suggested. The section on computer security considers categories of safeguards, identifying computer assets and resources, identifying threats to computer systems, solving security problems, a security checklist, and future security measures. Federal and State laws bearing upon computer crime are described, and the discussion of the investigation of computer crimes covers the hiring and training of investigators and steps in the initial investigation. A computer risk checklist is provided, along with 13 references and 7 notes.