major categories of cyber-crimes assignment
Order ID 53563633773 Type Essay Writer Level Masters Style APA Sources/References 4 Perfect Number of Pages to Order 5-10 Pages Description/Paper Instructions
major categories of cyber-crimes assignment
- There are three major categories of cyber-crimes are against people, crimes against property, and crimes against the government. Crimes against the government are when cybercrime is committed against the government. Cybercrimes against the government are cyber warfare, hacking, cyber terrorism, and pirated software. Crimes against property are some online crimes that occur against property such as a computer or server. These crimes include hacking, virus transmission, typo squatting, computer vandalism, and copyright infringement. Crimes against people are the distribution of child pornography, harassment, stalking, identity theft, spoofing, human trafficking, and credit card fraud.
A common protocol for processing a crime scene involving electron evidence is as follows: secure and evaluate the crime scene, conduct preliminary interviews, obtain a search warrant, document the crime scene, recognized, and identify the evidence. Collect a piece of preserved evidence, package, transport, and store evidence, and submit digital evidence, such as hard drives, for analysis and data recovery.
Store electronic evidence in a secure area away from temperature and humidity extremes and protected from magnetic sources, moisture, dust, and other harmful particles or contaminants. Do not use plastic bags. Digital evidence is volatile and fragile, and the improper handling of this evidence can alter it. Because of its volatility and fragility, protocols need to be followed to ensure that data is not modified during its handling (i.e., during its access, collection, packaging, transfer, and storage). These protocols delineate the steps to be followed when handling digital evidence. There are four phases involved in the initial handling of digital evidence: identification, collection, acquisition, and preservation.
- Three ways computer crimes can be categorized are “Computer as target, computer as tool, or computer as an incidental to the offense”(Hess, Kären M., Hess Orthmann 2021).
Computer as target-When an unauthorized user takes control of someone else’scomputer and attacks it using hacking methods, viruses, and worms.
Computer as a tool-When someone uses it for fraudulent activity, to gain access to private information such as passwords account numbers and stealing someone’s identity.
Computer as incidental to an offense- When individuals use to commit crimes such as sex crimes, child pornography, and drug trafficking.
Steps to take while processing a crime scene involving electronic evidence would be to have a search warrant first. Also, someone who is trained in this department thoroughly in order to preserve the needed evidence. All devices should be secured, anyone not authorized to touch these electronic devices should not do so. Everyone should be removed from the area that is not authorized to be there, the state the device is in should always stay the same. If it is off, it is to stay off, and it is on it should stay on. All the evidence on the computer should be collected before it is ever moved or turned off. This includes photos and documentation of all information on the screens, along with pictures of the actual computer what is near it and the position of anything around it. Other information collected are names of anyone that has used these electronic devices, any passwords and internet information available. The devices may also be dusted for fingerprints, and information printed off the computer to have a paper copies. All information from these electronic devices are backed up on disks to make information easily movable for litigation, and so there is always several copy.
- The U.S Department of Justice has defined three basic ways of categorizing computer crimes. Computer as target is when a computer or network’s confidentiality or integrity is attacked then resulting in theft of services or information or the damage of victim (Orthmann et al., 2017). The second way is computer as tool, which include crimes that transitioned from physical into the world of the internet such as fraud, gambling, harassment, or child pornography (Orthmann et al., 2017). Lastly, computer as incidental to an offense involves the significance of the computer’s role in executing a crime such as storing child pornography (Orthmann et al., 2017).\
When investigating a crime scene with electronic evidence, it is important for investigators to not touch anything and follow the basic tenet: If it’s on, leave it on. If it’s off, leave it off (Orthmann et al., 2017). Police should avoid altering the condition of the evidence in which it was found and ensure that no authorized individual is at the crime scene. Preventing contamination of evidence should be their priority to avoid evidence from being destroyed. The electronic devices might have latent footprints or other forms of trace evidence so it’s best to preserve the evidence. Investigators should also photograph the crime scene with 360-degree coverage and photograph all aspects of a computer such as the monitor, computer, position of mouse or keyboard, etc. (Orthmann et al., 2017). Digital evidence is often contained in CDs or hard drives, which can be easily susceptible to damage. They should be stored in a secure area away from extreme temperatures and humidity, protected from harmful particles (Orthmann et al., 2017). It should also be noted that there should be reports on how the evidence was found and identify the type of evidence.
- The three basic ways computer crime can be categorized is as a computer as target, computer as a tool and computer as an incident to the offense. An example of a computer as a target can be viruses, worms, or extortion. Computer as a tool is when a criminal uses a computer as a tool to commit a crime. For instance fraud, spam, and pharming are all computers as a tool. The steps taken for processing a crime scene involving electronic evidence is securing and investigating the crime scene. Then look for witnesses to interview, get a warrant to investigate the crime scene further. Identify any evidence,make sure it’s not contaminated and then document it. Lastly to collect, secure it correctly, transport the evidence so it can be examined. Storing electronic evidence is very important. The investigators need to store electronic evidence where it cannot be harmed or Sabotage with. It needs to be packaged, documented, labeled, marked, photographed, and stored. When a crime scene involves multiple electronic evidence, investigators must follow protocols of the investigation. These include identifying the evidence, collecting, interviewing and preserving the evidence.
- Computer crimes can be categorized in three ways: “Computer as a target, computer as a tool or computer as an incidental to the offense” (Orthmann et al., 2017). Computer as a target means when someone takes control of another computer without their permission, this can lead to the hacker taking information and infesting the victim’s computer with numerous malware. Computer as a tool is when someone uses their computers for crimes. This can be when criminal attempts to get authorized access to the victim’s private accounts and passwords as well as other personal information. They can use this as a scamming technique to either steal someone’s identity or blackmail the victim. Computer as an incidental to an offense can mean when the criminal chooses to use their computer to watch or sell child pornography. The steps to take when processing an electronic crime scene is to get a warrant to search the scene, make sure no unauthorized individuals are at the scene causing risks, question and do interviews. The warrant will also allow you to obtain the electronic device so it can be in police custody as evidence. The device should not be opened or touched unless the device is already open to decrease the risk of lost evidence or data. Once someone skilled in that area is able to proceed through the computer safely, they will be able to recover some lost data, any evidence, and documentation. All information found on the computer should be documented and also transferred and duplicated to somewhere safe and stored as evidence. Fingerprints should be documented when the computer is dusted for any DNA.
RUBRIC
QUALITY OF RESPONSE NO RESPONSE POOR / UNSATISFACTORY SATISFACTORY GOOD EXCELLENT Content (worth a maximum of 50% of the total points) Zero points: Student failed to submit the final paper. 20 points out of 50: The essay illustrates poor understanding of the relevant material by failing to address or incorrectly addressing the relevant content; failing to identify or inaccurately explaining/defining key concepts/ideas; ignoring or incorrectly explaining key points/claims and the reasoning behind them; and/or incorrectly or inappropriately using terminology; and elements of the response are lacking. 30 points out of 50: The essay illustrates a rudimentary understanding of the relevant material by mentioning but not full explaining the relevant content; identifying some of the key concepts/ideas though failing to fully or accurately explain many of them; using terminology, though sometimes inaccurately or inappropriately; and/or incorporating some key claims/points but failing to explain the reasoning behind them or doing so inaccurately. Elements of the required response may also be lacking. 40 points out of 50: The essay illustrates solid understanding of the relevant material by correctly addressing most of the relevant content; identifying and explaining most of the key concepts/ideas; using correct terminology; explaining the reasoning behind most of the key points/claims; and/or where necessary or useful, substantiating some points with accurate examples. The answer is complete. 50 points: The essay illustrates exemplary understanding of the relevant material by thoroughly and correctly addressing the relevant content; identifying and explaining all of the key concepts/ideas; using correct terminology explaining the reasoning behind key points/claims and substantiating, as necessary/useful, points with several accurate and illuminating examples. No aspects of the required answer are missing. Use of Sources (worth a maximum of 20% of the total points). Zero points: Student failed to include citations and/or references. Or the student failed to submit a final paper. 5 out 20 points: Sources are seldom cited to support statements and/or format of citations are not recognizable as APA 6th Edition format. There are major errors in the formation of the references and citations. And/or there is a major reliance on highly questionable. The Student fails to provide an adequate synthesis of research collected for the paper. 10 out 20 points: References to scholarly sources are occasionally given; many statements seem unsubstantiated. Frequent errors in APA 6th Edition format, leaving the reader confused about the source of the information. There are significant errors of the formation in the references and citations. And/or there is a significant use of highly questionable sources. 15 out 20 points: Credible Scholarly sources are used effectively support claims and are, for the most part, clear and fairly represented. APA 6th Edition is used with only a few minor errors. There are minor errors in reference and/or citations. And/or there is some use of questionable sources. 20 points: Credible scholarly sources are used to give compelling evidence to support claims and are clearly and fairly represented. APA 6th Edition format is used accurately and consistently. The student uses above the maximum required references in the development of the assignment. Grammar (worth maximum of 20% of total points) Zero points: Student failed to submit the final paper. 5 points out of 20: The paper does not communicate ideas/points clearly due to inappropriate use of terminology and vague language; thoughts and sentences are disjointed or incomprehensible; organization lacking; and/or numerous grammatical, spelling/punctuation errors 10 points out 20: The paper is often unclear and difficult to follow due to some inappropriate terminology and/or vague language; ideas may be fragmented, wandering and/or repetitive; poor organization; and/or some grammatical, spelling, punctuation errors 15 points out of 20: The paper is mostly clear as a result of appropriate use of terminology and minimal vagueness; no tangents and no repetition; fairly good organization; almost perfect grammar, spelling, punctuation, and word usage. 20 points: The paper is clear, concise, and a pleasure to read as a result of appropriate and precise use of terminology; total coherence of thoughts and presentation and logical organization; and the essay is error free. Structure of the Paper (worth 10% of total points) Zero points: Student failed to submit the final paper. 3 points out of 10: Student needs to develop better formatting skills. The paper omits significant structural elements required for and APA 6th edition paper. Formatting of the paper has major flaws. The paper does not conform to APA 6th edition requirements whatsoever. 5 points out of 10: Appearance of final paper demonstrates the student’s limited ability to format the paper. There are significant errors in formatting and/or the total omission of major components of an APA 6th edition paper. They can include the omission of the cover page, abstract, and page numbers. Additionally the page has major formatting issues with spacing or paragraph formation. Font size might not conform to size requirements. The student also significantly writes too large or too short of and paper 7 points out of 10: Research paper presents an above-average use of formatting skills. The paper has slight errors within the paper. This can include small errors or omissions with the cover page, abstract, page number, and headers. There could be also slight formatting issues with the document spacing or the font Additionally the paper might slightly exceed or undershoot the specific number of required written pages for the assignment. 10 points: Student provides a high-caliber, formatted paper. This includes an APA 6th edition cover page, abstract, page number, headers and is double spaced in 12’ Times Roman Font. Additionally, the paper conforms to the specific number of required written pages and neither goes over or under the specified length of the paper. GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
CLICK ON THE LINK HERE: https://www.perfectacademic.com/orders/ordernow
Also, you can place the order at www.collegepaper.us/orders/ordernow / www.phdwriters.us/orders/ordernow
Do You Have Any Other Essay/Assignment/Class Project/Homework Related to this? Click Here Now [CLICK ME]and Have It Done by Our PhD Qualified Writers!!