CRCJ 4001 Lecture Notes - Lecture 2: Social Security Number, Cyberstalking, Crimeware

33 views2 pages

Document Summary

Any crime facilitated or committed using computer network or hardware device. Hardware would include things like phones, tablets etc Could be entirely technological or more personally based. Identity theft is most common form of cybercrime. Computer and hardware merely allows for the facilitation of previously committed crimes like fraud. The computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime. They present a type 1 and type 2. Crimeware : software used in commission of a crime. A vulnerable browser would not constitute crimeware, but instead simply flawed software. Ex: account on kijiji is hacked and selling fake products. Originally account user had clicked a link on a phishing email. Most vulnerable group of type 1 is 18-29. This may be due to frequency of use and not tied to knowledge of the internet or technology. Normally done by an individual known to the victim.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents