Crime Classification Manual Part II Chapter 10 A 41
Crime Classification Manual Part II Chapter 10 A 41
A STANDARD SYSTEM FOR INVESTIGATING AND
CLASSIFYING VIOLENT CRIMES SECOND EDITION
The offender
will have placed Trojan horse software on many computers and triggered an
attack at some speciļ¬c time in the future. The sites chosen for the Trojan
horse software typically are college and university computers, which have many
users and can be easily hacked because some legitimate users failed to use
hard-to-break passwords. Additional service request sites could be personal
computers attached to the Internet that have been compromised.
Comments
Post a Comment