Strayer Universality
CIS 170
Introduction Technologies such as cellular phones, pagers, home computers, the Internet, websites, and palm pilots have added another dimension to crime. That dimension involves increased methods at criminals disposal to commit certain crimes along with increased locations in which crimes can occur. Hackers use to look for fame with a splashy, large-scale attack on a network that made headlines. Today 's cybercriminals are quietly taking over vulnerable web sites as part of an elaborate process in the underground economy. A highlighted section is something can change the motivation of hackers. The hackers have moved from hacking attempts that are being done for notoriety to hacking for criminal intent and fraud. While early hackers wanted to make a big splash by attacking as many computers as possible in a show of genius and ability for taking down network, now criminals do not want to be detected. Takeovers are done in a slow, methodical fashion. By not being caught, they can use the systems they have taken over for a variety of purposes. How are cybercriminals working today, and what do you need to know to stay on top with your security strategy. Cybercriminals are sneakier, and quite. Malware infected systems are used as network of bots for a wide variety of inappropriate activities. A program that uses “Bots,” can do denial of service attacks, they can be used to send out spam, and to send out phishing data
Internet aided criminal activity The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft. The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very
References: Anti-Phishing Working Group, (2004). Anti-Phishing Working Group. Retrieved Nov., 2013, from http://www.antiphishing.org (accesNovember 2004). Computer Crime Research Center. About Computer Crime Research Center. Retrieved Nov., 2013 from http://www.crime-research.org/about Computer Crimes and Intellectual Property Section, (2003). Computer Crimes Policy and Programs Taylor, Robert W., Fritsch, Eric J., Liederbach, John & Holt, Thomas J. (2011, 2006). Digital Crime and Digital Terrorism, Second Edition, Upper Saddle River: Pearson Education, Inc. Taylor, R., Caeti, T., Loper, K., Fritsch, E., & Liederbach, J. (2006). Digital crime and digital terrorism: Chapter 3 - The Criminology of Computer Crime