edf40wrjww2CF_PaperMaster:Desc
Table of Contents
Executive Summary............................................................................................................3
Introduction.......................................................................................................................4
Threats to security……………….............................................................................................5
Computer-crime laws.........................................................................................................6
Criminal law and civil law..................................................................................................6
International developments..............................................................................................7
Jurisdictional problems......................................................................................................7
Computer & Internet Crimes.............................................................................................8
Viruses, Worms and Trojans..................................................................................8
Early viruses……..........................................................................................8
Worms…….................................................................................................11Trojans…….................................................................................................15
Fraud.................................................................................................................................18
Counterfeits of documents, money.......................................................................... ...