Common types of computer-related mistakes
Computer criminals need what 2 capabilities to commit crime?
- how to manipulate the system to get the desired result
What is social engineering?
using social skills to get computer users to provide information to access an information system
What is dumpster diving?
going through trash cans to find secret or confidential information
What is LeadsOnline Web-based service system?
Categories crimes fall into:
Use of e-mail among public officials might violate _______ laws.
open meeting
Potential places for privacy invasion on the Internet:
Emails
Website browser
Buying online
What is P3P?
Platform for Privacy Preferences
- screening technology