Time Bomb Attacks by an Insider
William Carl Shea, aged 39, was hired around August 2001 as a programmer and manager for
Bay Area Credit Services Inc., in San Jose, California. Sheas position gave him administrative
access to and familiarity with the comp
Categories of Computer Crimes
According to our book, Digital Crime and Digital Terrorism (2nd Edition.), there are, generally,
four categories of computer crime, including (1) the computer as a target, (2) the computer as
an instrument of the crime, (3) t
Understanding the past is an important tool by which law enforcement can base to forecast
future crime trends and develop best practices for investigating and prosecuting computer crime
in addition to researching all past, present and future aspects of em
1. Identify and explain the factors that have limited local law enforcement efforts
against digital crime.
According to our book, Digital Crime and Digital Terrorism, the number of local, state,
county, and regional computer crime task forces continues to
1. What is the importance of a forensic analysis?
Forensic Analysis is the use of controlled and documented analytical and investigative
techniques to identify, collect, examine and preserve digital information. After collecting
evidence from the crime sc
1. Explain the intent and fundamental concepts of search and seizure law as it applies to
The intention of search and seizure is to provide law enforcement agencies with the authority to
enter a premises search for the objects names in the
Explain why hackers think that the term hacker does not refer to criminals.
First of all if we go back to the original term "Hacker" it was coined by a group of MIT students
who "Hacked" a model train to make it run faster. The modern term is used as an o
1. What are the differences between file viruses, boot viruses, macro viruses, and
Viruses, worms, Trojans, and bots are all part of a class of software called malware.
Malware or malicious code (malcode) is short for malicious software.