Crime Classification Manual Part II Chapter 10 A 10
Crime Classification Manual Part II Chapter 10 A 10
A STANDARD SYSTEM FOR INVESTIGATING AND
CLASSIFYING VIOLENT CRIMES SECOND EDITION
Trojan horses
are programs placed on a computer to capture and send information to a third
party unbeknown to the computer user. They have been used in cases of identity
theft (see classification 521). Another type of Trojan horse captures the user’s
keystroke information and searches for personal and financial information. This
type of program is called a “key logger.”
Comments
Post a Comment