professional development seminar.doc - RunningHead...

This preview shows page 1 - 4 out of 6 pages.

RunningHead: PROFESSIONAL DEVELOPMENT SEMINAR1Professional Development SeminarAmber HowardSEC 405Professor Terence ClappApril 13, 2018
PROFESSIONAL DEVELOPMENT SEMINAR2Professional Development SeminarA computer crime is the use of a computer to further criminal activity. There are broad categories of computer crimes; however we will be discussing identity theft. Identity theft is the process of obtaining personal information and pretending to be someone other than one’s self. Identity theft is most commonly used for economical gain. In most cases the criminal uses the victim’s information to obtain credit and leaving the debt on the victim (Easttom & Taylor, 2011). Furthermore, identity theft victimizes people by ruining their credit or reputation. When acriminal obtains someone’s personal information it may be used to get credit or order embarrassing products. After criminal does what they wish with the information the victim is lefttrying to clean up their credit or their name. There are a plethora of ways a person can become a victim to identity theft through computer crime for example a key logger, Trojan horse, and spyware can capture any information a user types.A key logger enables the criminal to access your accounts with the information obtained. A key logger is a program that resides on a computer and simply records key strokes. The data retrieved can be used by the key logger can be configured to send data to another IP address. Theperpetrator can put the key logger in software which creates a Trojan horse. The Trojan horse is software that will appear to the user to have a meaningful use but in reality it is delivering information to the perpetrator. When the user downloads what they believe to be a useful program, the key logger is also installed. By that time the key logger is installed through the program the perpetrator has already set up an IP address to send information to. As the information comes in the perpetrator can go through it and use information they choose. A good
PROFESSIONAL DEVELOPMENT SEMINAR3example of a case for this type of action is the 2005 London bank transfer that hackers attempted to obtain $420 million from (Steiner, 2008).

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture