Answer the following statements true (T) or false (F)

1. The legal and ethical aspects of computer security encompass a broad range of topics.
2. Computer attacks are considered crimes but do not carry criminal sanctions.
3. Computers as targets is a form of crime that involves an attack on data integrity, system integrity, data confidentiality, privacy, or availability.
4. The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations.
5. No cybercriminal databases exist that can point investigators to likely suspects.

1. True
2. False
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

Word's default style for footnote text is ________

A) single-spaced paragraph with 11-point Calibri font and no paragraph indents B) single-spaced paragraph with 10-point Calibri font and no paragraph indents C) double-spaced paragraph with 10-point Times New Roman font and .5" paragraph indents D) single-spaced paragraph with 10-point Times New Roman font and .5" paragraph indents

Computer Science & Information Technology

Match the following macro actions to their description

I. AutoExec II. ApplyFilter III. DisplayHourglassPointer IV. GoToControl V. Beep A. Restrict or sort records B. Moves the focus C. Uses the computer's speakers D. Runs when the database is opened E. Provides a visual indication

Computer Science & Information Technology