Consider the following examples of computer crime as you answer the question: Social Security numbers are stolen from a company’s database.

Consider the following examples of computer crime as you answer the question:

i. Social Security numbers are stolen from a company’s database.

ii. A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.

iii. An employee receives threats from a co-worker via e-mail.

iv. An unhappy customer launches a denial-of-service attack.

Carter’s taxonomy of computer crime comprises four categories. Which of the following pairs includes two items from the same category?

I and IIII and IIIII and IVI and IV

“Get 20% discount on your first 3 orders with us” Use coupon: GET20

Posted in Uncategorized