CRIM 218 Lecture Notes - Lecture 6: Modus Operandi, Cybercrime, Structural Level

88 views2 pages

Document Summary

Little is known about the characteristics of the o enders or their modus operandi. Little or no research on pro ling cybercriminals or cybercrime. Rooted in rational choice theory, routine activities theory, and crime pattern theory. For changes to the environment to have any e ect o enders must exercise some degree of rationality (cost-bene t analysis). Scp strategies need to be minute or granular (i. e. , they work at the micro level, rather than at the macro or structural level). Di erent scp strategies required for di erent countries and di erent crime categories (including di erent types of cybercrime). Target hardening, e. g. , encrypting sensitive information custom installation of the os (rather than using default), requiring employees to use strong passwords, etc. Access control, e. g. , photo id cards, biometric credentialing, check-in booths with security guards. De ecting o ender, e. g. , storing data o -site (in the cloud). Controlling facilitators, e. g. , conducting background checks, restricting installation of exe les to administrators.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers