U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyber Crime: How to Protect Yourself From Computer Criminals

NCJ Number
166933
Author(s)
L E Quarantiello
Date Published
1997
Length
144 pages
Annotation
This book provides information that is intended for immediate use to safeguard computers and computer activities in both home and business, without requiring highly sophisticated computer knowledge.
Abstract
Computer-related crime is defined as "any illegal act in which knowledge of computer technology is used to commit the offense." There are four main categories of computer-related crime that are identified for the purposes of threat assessment, risk reduction, and intrusion protection. They are the unauthorized use of computer-related assets; the introduction of fraudulent records or data into a computer system; alteration or destruction of information or files; and theft, by electronic means or otherwise, of money, financial instruments, property, services, or data. Following an overview of the characteristics of computer criminals and their criminal methods, chapters address various types of computer crime, including viruses, threats to personal safety and security, online harassment and stalking, pedophiles and pornography, fraud, and invasion of privacy. In discussing computer-crime prevention measures, the chapter on system security discusses log-on procedures, securing data from theft, guarding against data manipulation, and protection against viruses. A chapter on personal security considers information dissemination, identity hoaxes, online harassment and stalking, protecting children online, maintaining privacy, and E-mail security. The section on physical security focuses on physical access controls and site hardening. Policing the "information highway" and reporting computer crime are considered in the final chapter. Appended resources for more information, CERT Coordination Center Incident Reporting Form, a list of online resources, and a glossary

Downloads

No download available

Availability