Changes in Cybercrime
Cyber Crime against Person
Cyber Weapons against Person Includes
Evolving with Technology
Methods of Committing Cyber Crime
Denial of Service Attacks
Virus or Worm Attacks
Technology used in Cyber Crimes
Kinds of Attacks
Botnet – is when a robotic computer is used to control a network
SYN Flood Attack- the over load of SYN requests to the TCP
ICMP Flood Attack
Computer Crime Laws
Condition of the Law
Securities Act of 1933 .
Fraud and Abuse Act (“CFAA”). .
Prevention Investigation of Cyber Crime
Prevention of Cyber Crime
Investigation of Cyber Crime
Desai, P. N., & Pastel, A. M. (2013, June). Cyber Crime Against Person. International Journal of Innovations in Engineering and Technology, Vol(2).
Paryag, E. and Griffin, Ashre (n.d.). What You Need to Know About Cybercrimes. Retrieved from http://www.Cameron.edu/cybersecurity/research/it4444…/2_hackers.docx
Sinrod, E. J. and Reilly, William P. (n.d.). CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF FEDERAL COMPUTER CRIME LAWS. Retrieved from http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1258&c.