12.crime.docVIP

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
  4. 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
  5. 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们
  6. 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
  7. 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Text 34 Fighting the War against Computer Crime 与电脑犯罪作斗争 Pre-reading Activities 1. Do you think people tend to commit crimes if they believe that they will not be detected? 2. What do you know about computer crimes? Text 1. Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation f thousands of pounds. Accidental erasure of crucial data can paralyse company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and use it for his own purposes. 实际上,每个有电脑的公司都会因电脑滥用、电脑犯罪和电脑事故而蒙受损失,因而,电脑及内存信息和财产的安全对管理来说至关重要。熟练的电脑罪犯进入电脑系统比武装劫匪闯入银行金库要容易得多,而其被捕和受惩罚的风险却很小。复杂程序的稍许改动会带来数千英镑的损失。无意中消除一些重要资料会使整个公司的动作陷于瘫痪状态。无论保密程度有多么高,任何熟悉必要程序的人都可获取贮存于电脑中的信息并利用它达到自己的目的。 2. Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft. Once the computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it. 尽管电脑犯罪的范围很难测定,但是大多数专家认为它是非法活动增加最快的领域之一。非法活动增加和缺乏精确测定的主要原因是很难侦查精心实施的偷窃行为,因而每次损失比其他类型的偷窃损失要高。一旦电脑罪犯危及软件系统,那么盗取巨款与偷窃一小笔钱是一样的容易;而且一次得逞,能轻而易举地在间隔相当长的时间后继续作案。事实上,电脑罪犯会发现停止犯罪比开始犯罪更难。 3.

文档评论(0)

ebitjij + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档