Changes in Cybercrime
By Tina Johnson
Cyber Crime against Person
Cyber Weapons against Person IncludesHarassmentPhishingIRC Attacks
Evolving with Technology
Methods of Committing Cyber CrimeHackingElectronic FormE-mail BombingData DiddlingSalami AttacksDenial of Service AttacksVirus or Worm Attacks
Technology used in Cyber Crimes
Kinds of AttacksBotnet – is when a robotic computer is used to control a networkSYN Flood Attack- the over load of SYN requests to the TCPICMP Flood Attack
Computer Crime Laws
Condition of the Law Securities Act of 1933 . Fraud and Abuse Act (“CFAA”). .
Prevention Investigation of Cyber Crime
Prevention of Cyber CrimeSpam BlockingAntivirusEncryption
Investigation of Cyber Crime
Computer ForensicForensic SoftwareDigital EvidenceSound Evidence
References
Desai, P. N., & Pastel, A. M. (2013, June). Cyber Crime Against Person. International Journal of Innovations in Engineering and Technology, Vol(2).Paryag, E. and Griffin, Ashre (n.d.). What You Need to Know About Cybercrimes. Retrieved from http://www.Cameron.edu/cybersecurity/research/it4444…/2_hackers.docxSinrod, E. J. and Reilly, William P. (n.d.). CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF FEDERAL COMPUTER CRIME LAWS. Retrieved from http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1258&c.