Defining The Boundaries Of Computer Crime Piracy

  • Uploaded by: Rocky
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Defining The Boundaries Of Computer Crime Piracy as PDF for free.

More details

  • Words: 268
  • Pages: 1
Rocky L. Ho Chapter 31 Title: “Defining the Boundaries of Computer Crime: Piracy, Breaks-Ins, and Sabotage in Cyberspace” by Hermani T. Tavani

Quote: “Each of the incidents in the preceding

paragraph would seem to be a genuine

instance of computer crime or cybercrime.”

Expectations: I expect to learn about the different kinds of computer crime and ways on how to prevent the computer crime or cyber crime.

Book Review: The author of this chapter is Hermani T. Tavani. Computer viruses can affect every computer, it has big or small effect in every computer, we can suffer a great disadvantage when our computer is affected by it. Our files can be eaten up without any trace. How can we get rid of these problems, first of all we can install an anti-virus for our computer, second we can put up or set the firewall in on mode, third is to reformat our computers. How or where can we get these problems, first is from internet, when we download from the net, we have the possibility of get virus, second is from the other computers, when we plug in the usb drive from the infected computer, then plugged it in our own computer, we can also get virus from them.

Things I have learned: I learned that virus is a scary thing when it happen, we can get a major disadvantage from it.

Integrity Questions: 1.) What is computer virus? 2.) How do computers be affected by computer viruses? 3.) What is computer crime? 4.) What are the categories of computer crime? 5.) Who is the author of this chapter?

Related Documents


More Documents from ""