14. - Spoofing
Internet Address)
- The Hole in the Web world wide web
Website
Website
Input Process)
- Disk Disk
Hard Disk,Floppy Disk Disk
Removable
- Hard Disk
16. - (Damage to Data and
Program)
- (Alteration of Data and
Program)
Output Process)
- (Sewaging)
- Printout Print
4:
3
1. Unauthorized Access)
17. 2. (Computer Misuse)
3. Computer Related Crime)
(1) ( 5 6)
Hacking or Cracking)
Computer Trespass)
Passwords) Secret Trade)
"
(2) ( 7)
(Illegal Interception)
The Right of Privacy of Data Communication)
18. "
Technical Means)
(3) ( 8 9)
Data and System
Interference)
(4) 11)
(Hacker Tools)
(1) 12)