O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of Computer Crime

  • Identify, specify, or describe computer and network ethical, legal, and privacy issues.

    • List types of computer- and network-related crimes.

Computer crimes can be categorized in several different ways, because there are a number of ways in which computers can be involved in criminal behavior.

  • The computer is used to commit the crime (a “tool of the crime”) in the same way a set of lockpicks is used to commit a burglary.

  • The computer is the target (the “victim”) of the crime.

  • The computer is used to keep records (such as a list of customers by a bookie or drug dealer) or for other purposes that are less directly related to the crime.

Computer security specialists are most concerned with the first two categories, and most especially ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required