CRIM 380 Study Guide - Summer 2018, Comprehensive Midterm Notes - Cybercrime, Credit Card, Canada

214 views51 pages
CRIM 380
MIDTERM EXAM
STUDY GUIDE
Fall 2018
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 51 pages and 3 million more documents.

Already have an account? Log in
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 51 pages and 3 million more documents.

Already have an account? Log in
CRIM 380 Week 1 Notes
Final Exam
3 hours
Mixture of t/f, mc, short answer
No essay
Computer Basics
o We’re Talking About Crime
o So, what is a computer?
o No perfect definition.
o iPads
o Desktops
o Laptops
o Mobile phones
o Anything that is physical
o What is Software?
o Set of instructions that tell your computer what to do.
o Running on your computer.
o Examples: Excel, Word, PowerPoint.
o What is Hardware?
o Physical part of computer you can touch.
o Computer is Stolen… (not on exam)
o What is the crime?
o Theft
o What is the damage?
o Personal belongings on computer gone.
Example: documents, photos, etc.
o Where’s the evidence?
o Track individual through usage on computer.
o Witnesses
o Computer is Hacked, Data is Stolen (not on exam)
o What is the crime?
o Theft
o Privacy laws
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 51 pages and 3 million more documents.

Already have an account? Log in
o Breaking and entering
o What is the damage?
o Property stolen
o Revenge porn
o Cyber bullying
o Where’s the evidence?
o On the computer
o Security cameras
o Hacker uses Computer to Send Spam Email
o What is the crime?
o Authorization use of computer
o Spam laws
o What is the damage?
o Computer could be thrown off the network (disconnect).
o Loss of access/productivity.
o Where’s the evidence?
o On the computer.
o Crime Drop in US
o Crime rates are dropping
o Property and violent victimization dropping
o Crime Drop in Canada…
o Similar to US rates
o Or Crime Swap?
o Data leak
o Financial data
o Personal data
o Name
o Address
o Credit card information
o 2004-2008
o 27 breaches with over 1 million records.
o 14.5 records on average
o 2014-2016
o In 2017, 25 breaches so far with 2 billion records.
o 100 million records on average
o Illegitimate Record-holder: River City Media
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 51 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Internet basics: what happens when i say, let"s go to walmart , on a map, what is walmart, real-life. Burnaby? : real life, easier to remember than 99 main street, burnaby , internet, easier to remember than ip address 23. 39. 93. 42 , internet vs. Call amazon, tell them you want to add a credit card to your account: 2. Add a new (fake) credit card to your amazon account: 3. Call back saying you"ve lost access to your account: 5. Provide name, billing address, new credit card: 6. Go to the amazon website, reset password using your new email: 8. Verizon : phishing = social engineering via email, majority of crime (people are vulnerable, four stages of a social engineering attack, 1. Research: learn about a person in order to be able to gain trust, pick best target, 2. Developing rapport and trust: establishes contact with the victim to obtain information directly, often through telephone, email, face-to-face chat, 3.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers