Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Criminal investigation - Chapter 16: Computer crime
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
This chapter outline the types of crimes in which computer is the target discuss computers as an instrumentality of the crime, describe computers as incidental to the crime, explain crimes associated with the prevalence of computers, understand the tools that computer criminals use to commit crime, discuss debates regarding privacy issues concerning the regulation of the Internet,. | SIXTEEN Computer Crime LEARNING OBJECTIVES Outline the types of crimes in which computer is the target Discuss computers as an instrumentality of the crime Describe computers as incidental to the crime Explain crimes associated with the prevalence of computers Understand the tools that computer criminals use to commit crime Discuss debates regarding privacy issues concerning the regulation of the Internet Outline profiles of computer crime suspects Explain techniques for investigating computer crime Assess methods to prevent computer crimes 16-1 COMPUTER ABUSE Any intentional act involving knowledge of computer use or technology in which the perpetrator could have made a gain and the victim could have experienced a loss; includes acts that may not be covered by criminal laws 16-2 COMPUTER CRIME Any illegal act in which knowledge of computer technology is used to commit the offense 16-3 TYPOLOGIES OF COMPUTER CRIME The crimes include the denial of expected service or the alteration of data Computer Manipulation Crimes Data Alteration or Denial Network Intrusion and Theft of Data Denial of Service Computer Vandalism 16-4 THE COMPUTER AS AN INSTRUMENTALITY OF THE CRIME Theft Much information stored in a computer can have value to the owner Theft of Services The use of these proprietary services without payment is theft Fraud Fraud using a computer exploits the trust, guaranteed by law, in a business transaction Threat and Harassment The U.S. Department of Justice (DOJ) maintains a Web site that details a range of threatening behaviors conducted on the internet 16-5 COMMON INTERNET SCAMS 16-6 According to the Internet Fraud Watch, these were the top 10 rip-offs on the Internet in 1997: ►Web auctions: Items bid for but never delivered by the sellers, value of items inflated, shills suspected of driving up bids, prices increased after highest bids accepted ►Internet services: Charges for services that were supposedly free, payment for online and Internet services that . | SIXTEEN Computer Crime LEARNING OBJECTIVES Outline the types of crimes in which computer is the target Discuss computers as an instrumentality of the crime Describe computers as incidental to the crime Explain crimes associated with the prevalence of computers Understand the tools that computer criminals use to commit crime Discuss debates regarding privacy issues concerning the regulation of the Internet Outline profiles of computer crime suspects Explain techniques for investigating computer crime Assess methods to prevent computer crimes 16-1 COMPUTER ABUSE Any intentional act involving knowledge of computer use or technology in which the perpetrator could have made a gain and the victim could have experienced a loss; includes acts that may not be covered by criminal laws 16-2 COMPUTER CRIME Any illegal act in which knowledge of computer technology is used to commit the offense 16-3 TYPOLOGIES OF COMPUTER CRIME The crimes include the denial of expected service or the alteration of