Listen to the text and order the
paragraphs
Text:
"COMPUTER
CRIMES"
(1) More and more, the operations of our businesses,
governments, and financial institutions are controlled by information that
exists only inside computer memories. Anyone clever enough to modify this
information for his own purposes can reap substantial re wards. Even worse, a
number of people who have done this and been caught at it have managed to get
away without punishment.
(2) These facts have not been lost on criminals or would-be
criminals. A recent Stanford Research Institute study of computer abuse was
based on 160 case histories, which probably are just the proverbial tip of the
iceberg. After all, we only know about the unsuccessful crimes. How many
successful ones have gone undetected is anybody's guess.
(3) Here are a few areas in which computer criminals
have found the pickings all too easy.
(4) Banking. All but the smallest banks now keep their
accounts on computer files. Someone who knows how to change the numbers in the
files can transfer funds at will. For instance, one programmer was caught
having the computer transfer funds from other people's accounts to his wife's
checking account. Often, tradition ally trained auditors don't know enough
about the workings of computers to catch what is taking place right under their
noses.
(5) Business. A company that uses computers
extensively offers many opportunities to both dishonest employees and clever
outsiders. For instance, a thief can have the computer ship the company's
products to addresses of his own choosing. Or he can have it issue checks to
him or his confederates for imaginary supplies or ser vices. People have been
caught doing both.
(6) Credit Cards. There is a trend toward using cards
similar to credit cards to gain access to funds through cash-dispensing
terminals. Yet, in the past, organized crime has used stolen or counterfeit
credit cards to finance its operations. Banks that offer after-hours or remote
banking through cash-dispensing terminals may find themselves unwillingly
subsidizing organized crime.
(7) Theft of Information. Much personal information
about individuals is now stored in computer files. An unauthorized person with
access to this information could use it for blackmail. Also, confidential information
about a company's products or operations can be stolen and sold to unscrupulous
competitors. (One attempt at the latter came to light when the competitor
turned out to be scrupulous and turned in the people who were trying to sell
him stolen information.)
(8) Software Theft. The software for a computer system
is often more expensive than the hardware. Yet this expensive software is all
too easy to copy. Crooked computer experts have devised a variety of tricks for
getting these expensive programs printed out, punched on cards, recorded on
tape, or otherwise delivered into their hands. This crime has even been
perpetrated from remote terminals that access the computer over the telephone.
Ex. 48.1 Order the paragraphs
A. More
and more, the operations of our businesses, governments, and financial
institutions are controlled by information that exists only inside computer
memories. Anyone clever enough to modify this information for his own purposes
can reap substantial re wards. Even worse, a number of people who have done
this and been caught at it have managed to get away without punishment.
B. Business.
A company that uses computers extensively offers many opportunities to both
dishonest employees and clever outsiders. For instance, a thief can have the
computer ship the company's products to addresses of his own choosing. Or he
can have it issue checks to him or his confederates for imaginary supplies or
ser vices. People have been caught doing both.
C. Theft
of Information. Much personal information about individuals is now stored in
computer files. An unauthorized person with access to this information could
use it for blackmail. Also, confidential information about a company's products
or operations can be stolen and sold to unscrupulous competitors. (One attempt
at the latter came to light when the competitor turned out to be scrupulous and
turned in the people who were trying to sell him stolen information.)
D. Software
Theft. The software for a computer system is often more expensive than the
hardware. Yet this expensive software is all too easy to copy. Crooked computer
experts have devised a variety of tricks for getting these expensive programs
printed out, punched on cards, recorded on tape, or otherwise delivered into
their hands. This crime has even been perpetrated from remote terminals that
access the computer over the telephone.
E. Credit
Cards. There is a trend toward using cards similar to credit cards to gain
access to funds through cash-dispensing terminals. Yet, in the past, organized
crime has used stolen or counterfeit credit cards to finance its operations.
Banks that offer after-hours or remote banking through cash-dispensing
terminals may find themselves unwillingly subsidizing organized crime.
F. Here
are a few areas in which computer criminals have found the pickings all too
easy.
G. Banking.
All but the smallest banks now keep their accounts on computer files. Someone
who knows how to change the numbers in the files can transfer funds at will.
For instance, one programmer was caught having the computer transfer funds from
other people's accounts to his wife's checking account. Often, tradition ally
trained auditors don't know enough about the workings of computers to catch
what is taking place right under their noses.
H. These
facts have not been lost on criminals or would-be criminals. A recent Stanford
Research Institute study of computer abuse was based on 160 case histories,
which probably are just the proverbial tip of the iceberg. After all, we only
know about the unsuccessful crimes. How many successful ones have gone
undetected is anybody's guess.
Оставьте свой комментарий
Авторизуйтесь, чтобы задавать вопросы.