Preview

Nt1110 Unit 11 Lab

Best Essays
Open Document
Open Document
2482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1110 Unit 11 Lab
Michael Sims
Instructor: Baxter
NT1110
Unit 11 Lab: Research Project
Cyber Crime

In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher’s computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). Computers and the internet have become intertwined into our daily lives.
One reason why individuals use the internet is because they can gather and share information with other individuals no matter where on the globe they are located. This advancement
…show more content…
Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal …show more content…
(2004). U.S. cybercrime law: Defining offenses. Information Systems
Frontiers, 6(2), 115-132.

Buzzell, T., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture, 13(2), 96-116. Retrieved December 27, 2011, from http://www.albany.edu/scj/jcjpc/vol13is2/Buzzell.pdf

Choi, K.(2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333.

Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. In F. Cullen & R. Agnew (Eds.), Criminological Theory Past to
Present: Essential Readings (pp. 427-442). New York, NY: Oxford University
Press.

Cullen, F., & Agnew, R. (2006). Criminological theory: past to present essential readings. (3rd ed., pp. 5-8). New York, NY: Oxford University Press.

Deng, X., & Zhang, L. (1998). Correlates of self-control: An empirical test of self-control theory. Journal of Crime and Justice, 21(2), 89-110.

Federal Bureau of Investigation, Cyber Crime Division. Computer intrusions. Retrieved November 28, 2011from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT 1310 Unit 8 Lab 1

    • 595 Words
    • 2 Pages

    The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction.…

    • 595 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1310 Unit 9 Lab 1

    • 1254 Words
    • 4 Pages

    The new structure has been given a grant to make its network state of the art by making it a fiber optic network. The topics of discussion that will be mentioned in this paper are the hardware that will be necessary for the inside and outside of the building and how we would expand the fiber to an adjacent building if it is built. Another topic to be discussed will be describing the safety procedures that will be following during the installation.…

    • 1254 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Lab 8

    • 551 Words
    • 3 Pages

    The team also noticed some inconsistencies in the graph that they feel could be fixed by changing their code. One of these issues being that cutting off power completely from the AEV’s resulted in the motors having to do extra work in order to get started again. Possibly changing the code so the amount of power supplied to the motors gradually decreased over time instead of stopping the power completely, could make for a more efficient AEV. Theoretically speaking, when a plane begins to near its destination the pilot begins to lower the amount of thrust given to the engines, not cease thrust completely, so if the team were able to find a way to mimic this, they feel that their AEV could save energy overall, and become more productive.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Lab

    • 91 Words
    • 1 Page

    Transfer the uniformly weighted crushed tablets into a beaker and add 100cm3 of dilute sulfuric acid to the beaker.…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Lab

    • 361 Words
    • 2 Pages

    4. What is the significant difference in the temperature of the PC (with the processor fan) with and without the…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Lab

    • 140 Words
    • 1 Page

    1.) Test for viscosity: Since DNA molecules are long strands that anneal to each other, they can be very viscous in liquid if they're at a high enough concentration. If I notice the sample sticking together while pipetting it, I'll often know that I have a lot of DNA in the sample.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT 1310 Unit 5 LAB 1

    • 417 Words
    • 2 Pages

    If I choose to design the new building with a wired network the main benefit is there would be a low chance on interception. Choosing a wired network will also have a lower risk of security issues; reliability and speed are primary benefits as well when using physical connections in a wired network. The basis of the new building will relay on loads of data to be moveable that is why a wired network allows the control. Wired LANs provide superior performance. A wired network is also more cost effective, the items needed to build such as Ethernet cables; hubs and switches are very inexpensive. But by using a wired network Ethernet cables, hubs and switches are extremely reliable and inexpensive.…

    • 417 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 3 lab 3 nt1210

    • 275 Words
    • 1 Page

    Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? If each vendor had their own standards and protocols, we would have a harder time making devices that we use every day to inter-operate. We would to have multiple routers depending on the devices we own and probably would not be able to use internet when we’re in a café, library, or airport because of incompatibility.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Lab

    • 252 Words
    • 2 Pages

    ➢ To define a class of your own and use it to create an object.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biological Behavior

    • 480 Words
    • 2 Pages

    Schmalleger, F. (2012). Criminology today: An interactive introduction. (6th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 480 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Cote, S. (2002). Criminological Theories: Bridging the Past to the Future. Thousand Oaks: SAGE Publications Ltd. p232.…

    • 2514 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Self Control Theory

    • 844 Words
    • 4 Pages

    . Self control theory explains that deviance is inherently attractive to everyone. It applies to both legal, illegal and self indulgent actions that are considered deviant in our society, for example , robbery , rape ,using drugs , smoking , drinking and even being obese and being a potato couch .The main reason behind these crimes are low self control , immediate and easy gratification and satisfying short term goals ( Goode, 2015). These college women wanted their body to be thin , but they did not want to do it by exercising and through proper dieting Instead they took they easy path of using drugs and disordered eating which provided them with immediate results and satisfied their short term goals.…

    • 844 Words
    • 4 Pages
    Good Essays