When computer crime takes place in a room filled with people, there arc usually many witne
A.Y
B.N
C.NG
A.Y
B.N
C.NG
第1题
A.Y
B.N
C.NG
第2题
第3题
Computer Crime
A computer crime is generally defined as one that involves the use of computers and software for illegal purposes. This doesn&39;t mean that all the crimes are new types of crime. On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer. But with a computer, these offenses can be carried out more quickly and with less chance that the person responsible for the crime will be discovered.
Computer crimes are on the rise and have been for the last twelve years. Just how much these computer crimes cost the American public is in dispute, but estimates range from $ 3 billion to $ 5 billion annually. Even the FBI, which attempts-to keep track of the growth or decline of all kinds of crimes, is unable to say precisely how large a loss is involved; however, it estimates that the average take from a company hit by computer crime is $ 600,000. A number of reasons are given for the increase in computer crime: (A) more computers in use and, thus, more people who are familiar with basic computer operation; (B) more computers tied together in satellite and other data-transmission networks; and (C) the easy access of microcomputers to huge mainframe. data bases.
The Criminal
Movies and newspaper stories might lead us to believe that most computer crimes are committed by teenage "hackers"—brilliant and basically good children who let their imagination and technical genius get them into trouble. But a realistic look at the crimes reveals that the offender is likely to be an employee of the firm against which the crime has been committed, i. e.. an "insider".
Difficulty of Detection and Prevention
Given the kind of person who commits a computer crime and the environment in which the crime occurs, it is often difficult to detect who the criminal is. First of all, the crime may be so complex that months or years go by before anyone discovers it.
Second, once the crime has been revealed, it is not easy to find a clear trail of evidence that leads back to the guilty party. After all, looking for "weapons" or fingerprints does not occur as it might in the investigation of more conventional crimes.
Third, there are usually no witnesses to the computer crime, even though it may be taking place in a mom filled with people. Who is to say if the person at the next terminal, calmly keying in data, is doing the company&39;s work or committing a criminal act?
Fourth, not enough people in management and law enforcement know enough about computer technology to prevent the crimes. Authorities have to be familiar with the computer&39;s capabilities within a given situation to guard against its misuses. In some large cities, such as LosAngeles, police departments have set up specially trained computer crime units.
But even when an offender is caught, the investigators, attorneys (律师), judges, or juries may find the alleged crime too complicated and perplexing to handle. More attorneys are specializing in computer law and studying the computer&39;s potential for misuse.
After a computer crime has been discovered, many companies do not report it or prosecute (起诉) the person responsible. A company may not announce the crime out of fear that the pubic will find out the weaknesses of its computer system and lose confidence in its organization. Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities (脆弱性) because they rely heavily on customer trust.
To avoid public attention, cautious companies will often settle cases of computer tampering out of court. And if cases do go to trial and the offenders are convicted, they may be punished only by a fine or light sentence because the judge or jury isn&39;t fully trained to understand the nature and seriousness of the crime. Not all companies are timid in apprehending computer criminals. For example, Connecticut General Life Insurance Company decided it had to get tough on violators. So when the company discovered that one of its computer technicians had embezzled about200, 000 by entering false benefit claims, it presented it findings to the state’s attorney and aided in the prosecution of the technician. The technician was found guilty and sentenced to prison, not just for the computer misuse, but also for grand theft and insurance fraud. Connecticut General now has a policy of reporting all incidents of theft or fraud, no matter how small.
The FBI knows exactly how large a loss is involved in computer crimes.
A.Y
B.N
C.NG
It has become easy for microcomputer owners to use huge mainframe. data bases.
A.Y
B.N
C.NG
It is implied in the Paragraph 3 that most computer criminals are the employees of the concerned companies.
A.Y
B.N
C.NG
Many companies don&39;t report computer crimes because law procedures against computer crimes usually cost a lot of money.
A.Y
B.N
C.NG
When computer crime takes place in a room filled with people, there arc usually many witnesses to the crime.
A.Y
B.N
C.NG
The passage is mainly about the increase of computer crimes in America and the difficulties in combating computer crimes.
A.Y
B.N
C.NG
Computer crimes are on the rise because more cheap microcomputers are available.
A.Y
B.N
C.NG
According to the passage, computer crimes has been on the rise for the last ______ years.
Connecticut General Life Insurance company is cited as ______ of companies that took serious measures to fight against computer crimes.
Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities because they place too much reliance on ______.
请帮忙给出每个问题的正确答案和分析,谢谢!
第4题
The man behind this notion, Jack Maple, is a dandy who affects dark glasses, homburgs(翘边帽)and two-toe shoes; yet he has become something of a legend in America's police departments. For some years, starting in New York and moving on to high-crime spots such as New Orleans and Philadelphia, he and his business partner, John Linder have marketed a two-tier system for cutting crime.
First, police departments have to sort themselves out: root out corruption, streamline their bureaucracy, and make more contact with the public. Second, they have to adopt a computer system called Comstat which helps them to analyze statistics of all major crimes. These are constantly keyed into the computer, which then displays where and when they have occurred on a color-coded map, enabling the police to monitor crime trends as they happen and to spot high-crime areas. In New York, Comstat's statistical maps are analyzed each week at a meeting of the city's police chief and precinct captains.
Messrs Maple and Linder(" specialists in crime-reduction services")have no doubt that their system is a main contributor to the drop in crime. When they introduced it in New Orleans in January 1997, violent crime dropped by 22% in a year; when they merely started working informally with the police department in Newark, New Jersey, violent crime fell by 13% . Police departments are now lining up to pay as much as $50, 000 a month for these two men to put them straight.
Probably all these new policies and bits of technical wizardry, added together, have made a big difference to crime. But there remain anomalies that cannot be explained, such as the fact that crime in Washington D. C. , has fallen as fast as anywhere, although the police department has been corrupt and hopeless and, in large stretches of the city, neither police nor residents seem disposed to fight the criminals in their midst.
The more important reason for the fall in crime rates, many say, is a much less sophisticated one. It is a fact that crime rates have dropped as the imprisonment rate soared. In 1997 the national incarceration rate, at 645 per 100 000 people was more than double the rate in 1985, and the number of inmates in city and county jails rose by 9.4% .almost double its annual average increase since 1990. Surely some criminologists argue, one set of figures is the cause of the other. It is precise because more people are being sent to prison, they claim that crime rates are falling. A 1993 study by the National Academy of Sciences actually concluded that the tripling of the prison population between 1975 and 1989 had lowered violent crime by 10-15% .
Yet cause and effect may not be so obviously linked. To begin with, the sale and possession of drugs are not counted by the FBI in its crime index, which is limited to violent crimes and crimes against property. Yet drug offences account for more than a third of the recent increase in the number of those jailed; since 1980, the incarceration rate for drug arrests has increased by 1000% . And although about three-quarters of those going to prison for drug offences have committed other crimes as well, there is not yet a crystal-clear connection between filling the jails with drug-pushers and a decline in the rate of violent crime. Again, though national figures are suggestive, local ones diverge: the places where crime has dropped most sharply(such as New York City)are not always the places where incarceration has risen fastest.
Jack Maple started his career in______.
A.Philadelphia
B.Oregon
C.New Orleans
D.New York
第5题
(30)
A.Computers are fast.
B.Computers do not often provide evidences or witnesses.
C.Computers can replace paperwork.
D.Computers are safe from human temptation.
第6题
A computer crime is ______.
A.the offense that the person responsible for the crime will be discovered more quickly
B.the crime that all the criminals are new types of crime
C.committed by robbers, vandals, and terrorists
D.an illegal behavior. that involves the use of computers and software
第7题
In May 2004, agents from the Federal Bureau of Investigation (FBI) showed up at Brandon Mayfield's law office and arrested him in connection with the March 2004 bombing of a train station in Madrid(马德里), Spain. The Oregon lawyer was a suspect (嫌犯)because several experts had matched one of his fingerprints to a print found near the scene of the terrorist attack.
But Mayfield was innocent (清白的). When the truth was found 2 weeks later, he was set free from jail. Still, Mayfield had suffered unnecessarily(受罪), and he's not alone.
Police officers often use fingerprints successfully to catch criminals. However, according to a recent study by criminologist(犯罪学家) Simon Cole of the University of California, Irvine, authorities may make as many as 1,000 incorrect fingerprint matches each year in the United States.
"The cost of a wrong decision is very high," says Anil K. Jain, a computer scientist at Michigan State University in East Lansing.
Jain is one of a number of researchers around the world who are trying to develop improved computer systems for making accurate fingerprint matches. These scientists sometimes even engage in competitions in which they test their fingerprint-verification (核实) software to see which way works best.
The work is important because fingerprints have a role not just in crime solving but also in everyday life. A fingerprint scan may someday be your ticket to getting into a building, logging on to a computer, withdrawing money from an ATM, or getting your lunch at school.
The title of this article most probably is ______.
A.Fingerprint Evidence
B.Fingerprint and Computer
C.The Mistakes of Fingerprinting
D.Fingerprint Matching
第8题
Computer crime is difficult to detect and prevent because ______.
A.the crime may be done by more than one person
B.computers themselves have no good firewall
C.computer crime doesn't leave any trail behind
D.few people witness the computer crime
第9题
What was Sven jaschan’s crime?
A.He stole a lot of computers.
B.He created a computer virus.
C.He stole millions of dollars.
D.He robbed a big bank.
第10题
Which of the following is NOT the target of computer crime?
A.Family computers.
B.Computers without networks.
C.Computer infrastructures.
D.Computers with large networks in companies.