Page 19 - Forensic News Journal Oct Nov 2017
P. 19
How the Computer Criminals Control Information: Typess of Computer Crime
ties via computer for con- priority commercial value or rep-
tract negotiations, sales, * The phenomenal growth resent original thoughts or
collections, and other of computer BBSs, on-line theses. Crimes associated
business transactions services, and the Internet with intellectual property
F * The computer becomes only serves to compound focus primarily on theft
O the vault, with the EDI the problem when the product has
R serving as the key to its commercial value, as op-
E contents As a result, computer- posed to basic research or
N * The ability to access related crimes become research for private use.
S data in the computer must easier to perpetrate and
I be relatively easy in order more difficult to identify, Intellectual Property:
C to maximize business ef- investigate, and prove.
M
E
T
H
O
D
O
L
O
G
Y Photo Courtesy of google.com
ficiency
* Security controls must Special Problems
be introduced in order with Computer Crime * Involves formulas,
to protect the business’ processes, components,
“crown jewels” Intellectual property con- structure, characteristics,
* Maximum security and sists of concepts, ideas, and applications of new
easy accessibility are not planning documents, de- technologies and covers
compatible: As the busi- signs, formulas, and other such areas as fiber optics,
nesses prefer user-friendly information-based materi- computer chip designs and
equipment, system secu- als intended for products conductivity, and telecom-
rity usually takes second or services that have some munications equipment,
19