Preview

Capstone Analysis

Satisfactory Essays
Open Document
Open Document
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Capstone Analysis
Capstone Analysis
Sabrina Fazendin
CJS200
July 13, 2014
Sara Burnette
Capstone Analysis
Cybercrime is defined as any crime that is conducted via the Internet or another computer network. When it comes to cybercrime it is very easy for someone to fall victim to it. We use computers for everything; searching the internet, shopping, accessing our bank accounts, email, and online gaming are some examples. Communication is faster and much more reliable than in the past which has allowed more to be accomplished in any given day. The problem is just like anything else; vulnerability. There are individuals that hack into computers as well as networks of businesses and government agencies. The problem is that sensitive data can be stolen and/or destroyed. There needs to be more focus on the security of computers and the internet.
Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.
In general, I feel that in this day and age you really need to be aware of your surrounding and that also includes the cyber world.

You May Also Find These Documents Helpful

  • Good Essays

    Capstone

    • 688 Words
    • 3 Pages

    Everything is fine. One fine day, you do some changes in your webapp and restart tomcat. Then you get this error. LifecycleException: service.getName(): "Catalina"; Protocol handler start failed: `java.net.BindException: Permission denied :80. What does this mean??? (The complete error is given below for your reference)…

    • 688 Words
    • 3 Pages
    Good Essays
  • Better Essays

    capstone example

    • 1267 Words
    • 4 Pages

    To build and roll out a top level enterprise-wide telecommunications network for the ABC Company. As ABC’s Technical contractors meeting the ABC Company’s technical needs by meeting the requirements for each of their separate office locations in San Francisco, Detroit, Washington, Indianapolis, Tampa, Paris, Liverpool, Tokyo, and Sao Paulo. With local LANs that are in each office that connect to a WAN to share data files and multimedia. There are many different pieces of equipment needed when setting up and maintain a large business network. Each piece of equipment has many different choices in brands and even capabilities that set them apart from each other. Each piece of equipment can be detrimental to the flow and success of the network at hand. Now that we have discussed the importance of equipment on the network let us move on to discussing each piece of equipment needed to running a successful network.…

    • 1267 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The juvenile justice system has been a great tool over the years and has improved much in that time and for the question that if we should keep the juvenile justice system I feel the answer is yes. The answer is not to get rid of the juvenile justice system but to improve it by learning from the past and thinking of new ideals. I do feel that the community should set in and be more of a part of preventing and helping these kids in need because of an old saying that “it takes a village to raise a kid”. If there would be more access, more help, more programs for this kids then I bet we would see a decline in juvenile delinquency because these kids would see that there is people out there who care and are willing to be there for them.…

    • 347 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Capstone Analysis

    • 297 Words
    • 2 Pages

    Walker, S., & Katz, C. M. (2011). The police in America: An introduction (7th ed.).New York, NY: McGraw-Hill.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Capstone Analysis

    • 522 Words
    • 2 Pages

    In 1607, the Susan Constant sails to the "New World" from England, carrying British settlers of the Virginia Company. On board are Captain John Smith and the voyage's leader Governor Ratcliffe, who seeks large amounts of gold in the New World to assure a strong position at the British court. Along the way, the Susan Constant is caught in a North Atlantic storm, and Smith saves a young, inexperienced Thomas from drowning. In the Powhatan Tribe in the New World, Pocahontas, daughter of Chief Powhatan, dreads being possibly wed to Kocoum, a brave warrior whom she sees as too "serious" for her spirited personality. Chief Powhatan gives Pocahontas her deceased mother's necklace as a present. Pocahontas, along with her friends, the gluttonous raccoon Meeko and hummingbird Flit, visit Grandmother Willow, a spiritual talking willow tree, and speaks of a possibly prophetic dream involving a spinning arrow, and her confusion regarding what her "path" in life should be. Grandmother Willow then alerts Pocahontas to the arriving Englishmen.…

    • 522 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    Thesis Statement: Cybercrime is an increasing concern among individuals across the U.S. making it necessary to know how to avoid being a victim.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Types of Computer Crimes

    • 487 Words
    • 2 Pages

    Computer crime in today’s world has become more common than in the past. Everywhere you go there is always some sort of Internet access. For instance most restaurants have Wi-Fi for their customers to connect. Cellular networks also provide Internet access away from home making computer criminals be able to work wherever. Having the Internet at the tips of your fingers makes it easier for today’s criminals to commit a crime. There are three main categories in which computer crimes are categorized.…

    • 487 Words
    • 2 Pages
    Good Essays