The United States strongly condemns the illegal disclosure of classied
information. It puts people’s lives in danger, threatens our national secu-
rity, and undermines our efforts to work with other countries to solve
If you use a computer that is connected to the Internet, your information is
at risk. The Bureau of Justice Statistics (BJS) reported from interviewing 7,818
businesses, that 67 percent detected at least one cyber crime (Rantala 2008).
Of the nearly 8,000-company sample, more than a third of them are critical
infrastructure businesses. Nearly 60 percent reported a cyber attack to their
computer system; 11 percent reported cyber theft, which includes embezzle-
ment, fraud, and intellectual property theft; and 24 percent reported other
cyber incidents such as port scanning, spyware,
or some type of
breach that resulted in damage or a loss.
Even if you are not an engineer working at a business that is considered
critical infrastructure or a company that has a more moderate risk level, you
have an identity and personal information that you need to protect; thus, you
need to be an informed computer user.
The Internet Crime Complaint Center (IC3), a partnership between the
Federal Bureau of Investigation (FBI) and the National White Collar Crime
Center (NW3C), reports an average of 26,000 complaints a month (2011
Internet Crime Report). A few of the crimes reported include identity theft,
crimes that target computer networks or devices, and scams where the
criminal poses as the FBI to defraud victims. This implies that, you need to
prepare yourself and your business for an attack—because it will happen
Spyware is software that self-installs on one’s computer with the goal of stealing personal
information, usually for the purpose of determining Internet-browsing habits.
Spoong is impersonating an individual by forging an e-mail header.