CRIM 380 Study Guide - Final Guide: Money Order, Dumpster Diving, Distributed Computing

139 views59 pages

Document Summary

Record-holder: yahoo 1 billion: names, numbers, dobs, passwords, security questions stolen. These break ins and thefts are getting more frequent. Crime needs 3 things routine activity theory. Presence of opportunities or targets to commit crime. Offender may be politically driven people, poor people. Huge increase in scale due to: large selection of victims: global reach of offenders, automated crimes, anonymity. Guardians are hindered due to: local jurisdictions complicated forensics evidence collection infrastructure privately owned: hidde(cid:374) (cid:272)(cid:396)i(cid:373)es, (cid:449)he(cid:396)e (cid:448)i(cid:272)ti(cid:373) (cid:373)ight (cid:374)ot k(cid:374)o(cid:449) the(cid:455)(cid:859)(cid:396)e (cid:448)i(cid:272)ti(cid:373)ized. Is theft of virtual property a crime? (game currency) Computer supported crimes the computer is not central to the crime but may contain evidence of the crime: ex: addresses found in the computer of a murder suspect. Computer facilitated crimes the computer is a tool used to commit the crime: ex: child pornography, criminal copyright infringement and fraud, essential player but not cybercrime specific. Computer crimes computer or network is the target: ex: hacking, malware, dos attacks.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents