Intro to Computer Crime

Intro to Computer Crime - CJ276 Review for final Definition...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CJ276 Review for final • Definition of and types of computers crime and examples of each type: -Computer crime: any act involving a computer that may be prosecuted under criminal law -Types of computer crime: 1. The instrument of crime: used to facilitate a traditional crime in a high-tech manner ex: stalking, harassment, online auction fraud 2. The target of the crime: offender attempts to alter, steal or damage the hardware, software, or data ex: trespassing, tampering, theft of data 3. Incidental to the crime but an important source of evidence ex: drug dealer’s client list, communication with a predator •Factors that contribute to juvenile computer crime: 1. Computer provides new opportunities 2. Sense of anonymity 3. Ethical deficit of younger generation 4. Connecting like-minded people through Internet 5. Lack of guardianship, generational gap w/ parent making them unable to control and don’t know dangers •Different types of anonymizing tools and techniques and how they might be used to further a crime -Technical means: 1. Passwords- restrict access to computer/files 2. Encryption- renders file unintelligible w/o key 3. Steganography-conceal data within other data 4. Anonymous remailers and web browsers 5. Remote Storage 6. Digital Compression 7. Computer Penetration and looping -Non-technical: 1. Public access Internet 2. Free Wi-fi 3. Unsecured Wireless network •Benefits of Encryption, symmetric/asymmetric encryption 1. Privacy 2. Information integrity- protect unauthorized changes 3. Authentification- verify identity 4. Non-repudiation- sender unable to deny they sent message Symmetric key- uses same secret key, recipient needs key Public key encryption (Asymmetric)- each recipient has private key and public key for everyone •War driving, piggybacking, Wi-fi security practices War driving - driving to search to unsecured/open connections Piggybacking- accessing Internet through unsecured network w/o permission of subscriber or ISP -Other security practices: Encryption-WEP/WPA (50-60%), port blocking (25%),
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
MAC address filtering (20%), none (9%) Don’t know (20%) •Routine Activities Theory relevance to age of global Internet Routine Activities Theory- crime explained by intersection of 3 variables: 1. Suitable targets for victimization 2. Lack of guardianship 3. Motivated offenders -Positive relationship between proximity and deviance; the close one is to the potential victim the less likely to commit deviance and vice versa •Legal challenges posed by global nature of computer crime 1. Establishing whether conduct in question is criminal in jurisdiction 2. Assemble sufficient evidence to mobilize the law, whether legal and investigatory assistance is available 3. Identify the perpetrator and locate them 4. Whether to extradite or leave matter to other country •Principles that guide assertion of jurisdiction in a criminal matter 1. Territoriality- sovereign states can assert jurisdiction over behavior within borders 2. Nationality- assert jurisdiction involving citizens as perpetrators regardless where
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/25/2011 for the course CJ 276 taught by Professor D'ovidio during the Spring '10 term at Drexel.

Page1 / 7

Intro to Computer Crime - CJ276 Review for final Definition...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online