ComputerCrimeOutline

ComputerCrimeOutline - b.) embezzlement 2.) What some real...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Michael Leeper Course Project Outline Digital Crime and Procedure 1/30/11 I. Intro 1. Computer Crimes (definition) a. Four main categories of computer crimes 1.) Computer as a target 2.) the computer as an instrument of the crime 3.) the computer as an incidental to a crime 4.) crimes associated with the prevalence of computers II. Body 1. Computer as a Target a. this means the computer was targeted by the criminal to obtain information from 1.) Examples a.) taking files off of hard drive b.) wiping the memory 2.) What some real instances? b. how much damage can this cause if you are victim of this type of computer crime? c. what are legal ramifications? d. How do prevent such an attack? 2. Computer as an Instrument of the Crime a. definition-computer is an instrumental part of committing the crime 1.) Examples
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
a.) hacking network systems
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: b.) embezzlement 2.) What some real instances? b. how much damage can this cause if you are victim of this type of computer crime? c. what are legal ramifications? d. How do prevent such an attack? 3. Computer as an incidental to crime a. computer used to facilitate a crime b. What's the difference between this one and the other ones? 1.)Examples a.) Child Pornography b.) Money Laundering 2.) What some real instances? c. what's the damage caused? d. legal ramifications e. prevention 4. Crimes associated with the prevalence of computers a. definition has to do with mainly the industry, or corporate businesses 1.) Examples a.)Napster-giving copyrighted music away freely on the internet b. what's the damage caused? c. legal ramifications d. prevention III. Conclusion...
View Full Document

This note was uploaded on 05/16/2011 for the course CIS 330 taught by Professor Mancini during the Fall '10 term at DeVry Cincinnati.

Page1 / 3

ComputerCrimeOutline - b.) embezzlement 2.) What some real...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online