Tuesday, June 14, 2011

Characteristics of Computer Intrusion


Any part of a computing system can be the target of a crime. When we refer to a computing system we mean a collection of hardware, software, storage media, data, and people that an organization uses to perform computing tasks. Sometimes we assume that parts of a computing system are not valuable to an outsider but often we are mistaken. For instance we tend to think that the most valuable property in a bank is the cash, gold, or silver in the vault. But in fact the customer information in the banks computer may be far more valuable.     

No comments:

Post a Comment