Computer Crime Investigation

PLEASE NO PLAGIARIZED WORK!

 

Today, there are many industries that remain vulnerable to electronic fraud.  For this assignment, you will need to research the Internet for organizations that remain vulnerable and the hacking or fraud techniques they have encountered in the recent years.

Write a 3-4 page paper in which you:

  1. Identify and describe at least two forms of fraud techniques from your research. Include the identity of the government agencies that provide awareness for these types of fraud techniques.
  2. Justify the threat cyber terrorism poses to society. Provide examples to support your justification.
  3. Prioritize steps that should be completed in order to preserve evidence so that it may be used in court cases for trials against computer fraud offenders.
  4. Defend or oppose the legal processes of civil law used to resolve cases against computer crimes offenders. Justify your decision.
  5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The next part of the assignment are discussion questions therefore do not require a paper where I have to piece together an answer:

-identify and describe at least two tools that can be used to gather evidence from the operating system.  Describe specifics on the level of technical experience required to operate and manage these tools.  Cite all your sources.

-Give an example of how evidence from an operating system could be used in a civil case trial.

-Describe two devices that are available from leading computer manufacturing companies.  Prepare details on what types of evidence these tools can gather.  

-From your selected devices, explain how the tools could be used in a corporate setting and what IT policies they can help enforce.   Summarize the process for gathering the evidence with each tool. 

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *