Answer the following statements true (T) or false (F)

1. The legal and ethical aspects of computer security encompass a broad range of topics.
2. Computer attacks are considered crimes but do not carry criminal sanctions.
3. Computers as targets is a form of crime that involves an attack on data integrity, system integrity, data confidentiality, privacy, or availability.
4. The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations.
5. No cybercriminal databases exist that can point investigators to likely suspects.


1. True
2. False
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

float and double variables should be used:

a. To perform monetary calculations. b. As counters. c. To store true/false values. d. As approximate representations of decimal numbers.

Computer Science & Information Technology

________ was designed as a note-taking application, similar to the spiral notebooks you used in high school

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which platforms does Adobe AIR support?

What will be an ideal response?

Computer Science & Information Technology

When moving through an area, several Base Transceiver Stations might handle your call—a hand-off would occur from one BTS to another. In a ________ hand-off, the communication is handled by one Base Transceiver Station at a time with no simultaneous communication

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology