Changes in Cybercrime

16 Oct No Comments

Changes in Cybercrime

By Tina Johnson

Cyber Crime against Person

Cyber Weapons against Person IncludesHarassmentPhishingIRC Attacks

Evolving with Technology

Methods of Committing Cyber CrimeHackingElectronic FormE-mail BombingData DiddlingSalami AttacksDenial of Service AttacksVirus or Worm Attacks

Technology used in Cyber Crimes

Kinds of AttacksBotnet – is when a robotic computer is used to control a networkSYN Flood Attack- the over load of SYN requests to the TCPICMP Flood Attack

Computer Crime Laws

Condition of the Law Securities Act of 1933 . Fraud and Abuse Act (“CFAA”). .

Prevention Investigation of Cyber Crime

Prevention of Cyber CrimeSpam BlockingAntivirusEncryption

Investigation of Cyber Crime

Computer ForensicForensic SoftwareDigital EvidenceSound Evidence

References

Desai, P. N., & Pastel, A. M. (2013, June). Cyber Crime Against Person. International Journal of Innovations in Engineering and TechnologyVol(2).Paryag, E. and Griffin, Ashre (n.d.). What You Need to Know About Cybercrimes. Retrieved from http://www.Cameron.edu/cybersecurity/research/it4444…/2_hackers.docxSinrod, E. J. and Reilly, William P.  (n.d.). CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF FEDERAL COMPUTER CRIME LAWS. Retrieved from http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1258&c.




Click following link to download this document

Changes in Cybercrime.pptx

Would you like your assignment done free from plagiarism by an expert? Place your order now and it shall be done within the timeframe you indicate.

To view and download a complete answer, scroll down to the bottom to pay Pay to view