Assignment 1 Digital Computer Crime Prevention

Assignment 1: Digital Computer Crime

Due Week 3 and worth 210 points

Write a three to four (3-4) page paper in which you:

  1. Explain the four (4) major categories of computer crimes, and provide at least one (1) example for each.
  2. Explain the most common forms of digital crime.
  3. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.
  4. Summarize the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Next, suggest one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.
  5. Use at least three (3) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain digital crime and digital terrorism activities.
  • Describe law enforcement roles and responses.
  • Identify information system attacks and countermeasures.
  • Describe the criminology of computer crime.
  • Use technology and information resources to research issues in information technology in criminal justice.
  • Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style convention.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric found here.

Computer Crime 2 Different Types of Computer Crime There are many types of computer crime, and each can fit into one of the four major categories. Some forms of computer crime are more common than others, and computer criminals use them to conduct their activities. There are some forms of computer crime that pose major threats to critical infrastructure and other areas. Even so, there are ways that the government and law enforcement can protect people from becoming a victim of one of these crimes. There are various types of computer crime, some of which may be commonly known, and some that are not as popularly known. But what is computer crime? According to the Computer Hope website, computer crime can be described as an act in which a person who is knowledgeable about computers, illegally views or steals information from a company or an individual, including private information, like your social security number or credit card numbers (Computer Hope, 2015). These people are often considered hackers, and they have been known to use malicious software to destroy or corrupt files or hardware. Some of the different types of computer crimes may include cyber terrorism, fraud, child pornography, identity theft, creation and distribution of malware (viruses, spyware), and DDoS (distributed denial of service) attacks. Each of these crime can be put into one of the four categories of computer crime. The first category of computer crime is that in which the computer is the target (Tayler, Fritsch, & Liederbach, 2015). This refers to any type of damage to the computer, whether it be physically vandalizing the hardware, theft of the computer, or malicious spyware and attacks against the computer system. An example of the latter would be a DDoS attack on a computer, preventing it from accessing certain information or servers. Another example would be an instance in which the hacker alters or corrupts files on a server or computer. The second category

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *