Changes in Cybercrime

Changes in Cybercrime

By Tina Johnson

Cyber Crime against Person

Cyber Weapons against Person IncludesHarassmentPhishingIRC Attacks

Evolving with Technology

Methods of Committing Cyber CrimeHackingElectronic FormE-mail BombingData DiddlingSalami AttacksDenial of Service AttacksVirus or Worm Attacks

Technology used in Cyber Crimes

Kinds of AttacksBotnet – is when a robotic computer is used to control a networkSYN Flood Attack- the over load of SYN requests to the TCPICMP Flood Attack

Computer Crime Laws

Condition of the Law Securities Act of 1933 . Fraud and Abuse Act (“CFAA”). .

Prevention Investigation of Cyber Crime

Prevention of Cyber CrimeSpam BlockingAntivirusEncryption

Investigation of Cyber Crime

Computer ForensicForensic SoftwareDigital EvidenceSound Evidence

References

Desai, P. N., & Pastel, A. M. (2013, June). Cyber Crime Against Person. International Journal of Innovations in Engineering and TechnologyVol(2).Paryag, E. and Griffin, Ashre (n.d.). What You Need to Know About Cybercrimes. Retrieved from http://www.Cameron.edu/cybersecurity/research/it4444…/2_hackers.docxSinrod, E. J. and Reilly, William P.  (n.d.). CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF FEDERAL COMPUTER CRIME LAWS. Retrieved from http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1258&c.

Place an Order

Plagiarism Free!

Scroll to Top