intelligent, and have the analytical skills that make them valued
employees. The fact that computer criminals do not fit criminal
stereotypes helps them to obtain the positions they require to carry
out crimes. Being intelligent, they have fertile imaginations, and the
variety of ways in which they use equipment to their advantages is
constantly being extended. In addition to direct theft of funds, the
theft of data for corporate espionage or extortion is being widespread,
and can obviously have a substantial effect on a company’s finances.
Another lucrative scheme, often difficult to detect, involves
accumulating fractions pence from individual payroll accounts, with
electronic transfer of the accumulated amount to the criminal’s
payroll.
Sabotage is also an increasingly common type of computer crime.
Everyone in the computer business has heard of cases of a “time-bomb”
being placed in a program. Typically, the programmer inserts an
instruction that causes the computer to destroy an entire personnel
data bank, for example, if the programmer’s employment is terminated.
As soon as the termination data is fed into the system, it
automatically erases the entire program.
26. most important; main (Para. 1)
27. something that happens (Para. 1)
28. to do something damaging (Para. 1)
29. fixed images of what a particular type of person is like (Para. 2
)
30. full of interesting and unusual ideas (Para. 2)
31. profitable; able to make a lot of money (Para. 2)
32. the process by which something moves or is moved from one place to
another (Para. 2)
33. damage done deliberately to equipment so that they can’t be used
(Para. 3)
34. puts something into something else (Para. 3)
35. the act of ending something (Para. 3)