Page 19 - Forensic News Journal Oct Nov 2017
P. 19

How the Computer Criminals Control Information: Typess of Computer Crime

        ties via computer for con-           priority                             commercial value or rep-

        tract negotiations, sales,           * The phenomenal growth  resent original thoughts or
        collections, and other               of computer BBSs, on-line  theses. Crimes associated
        business transactions                services, and the Internet           with intellectual property

 F      * The computer becomes               only serves to compound              focus primarily on theft

 O      the vault, with the EDI              the problem                          when the product has
 R      serving as the key to its                                                 commercial value, as op-
 E      contents                             As a result, computer-               posed to basic research or

 N      * The ability to access              related crimes become                research for private use.
 S      data in the computer must  easier to perpetrate and

 I      be relatively easy in order  more difficult to identify,                  Intellectual Property:
 C      to maximize business ef-             investigate, and prove.



 M
 E

 T
 H
 O

 D
 O

 L
 O
 G

 Y                                                                        Photo Courtesy of google.com


        ficiency

        * Security controls must             Special Problems
        be introduced in order               with Computer Crime                  * Involves formulas,
        to protect the business’                                                  processes, components,

        “crown jewels”                       Intellectual property con-           structure, characteristics,
        * Maximum security and               sists of concepts, ideas,            and applications of new

        easy accessibility are not           planning documents, de-              technologies and covers
        compatible: As the busi-             signs, formulas, and other  such areas as fiber optics,
        nesses prefer user-friendly  information-based materi-                    computer chip designs and

        equipment, system secu-              als intended for products            conductivity, and telecom-
        rity usually takes second            or services that have some  munications equipment,


                                                                                                                     19
   14   15   16   17   18   19   20   21   22   23   24