Premium Essay

Issc351

In:

Submitted By ddillmike
Words 1503
Pages 7
Computer Related Crimes

Michael Dill

American Military University

ISSC351 Computer Forensics

Dr. Kevin Harris

June 21, 2015

Outline

I. Introduction

A. Computer related crimes 1. What are computer related crimes 2. Types of computer related offenses 3. The increase in computer related crimes

II. Computer related crimes

A. What are computer related crimes 1. Legal definitions 2. Perceived definitions

B. Types of computer related offenses 1. Object of the Crime 2. Subject of the crime 3. Instrument

III. Process for Investigating the Crime

A. Evidence 1. Collecting 2. Seizing 3. Chain of Custody 4. Protecting

B. Recovering Data 1. Windows 2. Linux 3. Macintosh 4. Mobile 5. Email

III. Conclusion

A. Best practices for Investigating Computer crimes

Thesis

Computer crimes have existed since computers were invented. The very first computer crime was the computer virus. Although most do not think of the computer virus being a crime it actually is. It falls into one of the three categories that computer related offenses fall into – object, subject and instrument. Today’s computer users have developed elaborate schemes to defraud and take advantage of the World. It is the responsibility of computer forensic professionals to investigate these crimes and gather the information that is needed to seek a conviction in a Court of Law. With that responsibility there are certain guidelines or procedures that must be followed to help insure the integrity of the case.

Computer crimes have existed since computers were invented. The very first computer crime was the computer virus (Snyder, 2010). Although most do not think of the computer virus being a crime it actually is. There

Similar Documents

Premium Essay

Theft of Intellectual Property at Trig Enterprises, Inc.

...Theft of intellectual property at Trig Enterprises, Inc. Librium Author Note This paper is being submitted on November 19, 2015, for Kevin Harris’s ISSC351-Computer Forensics course. Trig Enterprises, Inc. is an international supplement dietary company and it is located in St. Louis. In 2006, a newly designed and ready to manufacture product was comprised. One of the Trig’s competitors released the very similar product on the market before Trig did. A short time later, it’s found that the competitor’s website was very similar to the Trig’s website. This raised a flag about the company’s 22-year old graphics designer, Kevin K. The CEO of the company, contacted the IT department to monitor his computer/laptop and email accounts, his VOIP phone and wireless devices if there was any suspicious activity. IT department scanned his emails for the last a couple of years. No questionable information found. IT department continue to monitor his devices and emails for about three months. While he was under surveillance, another similar event happened. This time a product on the manufacturing process was compromised. This caused the company millions of dollars. CEO did not a choice but the contact the local police. After contacting the local police, the police’s compu In 2006, 22-year old graphics designer, Kevin K., suspected to leak the extremely important corporate data to its competitors. The owner of the company tries to solve the issue with...

Words: 466 - Pages: 2

Premium Essay

Assignment 1

...ISSC351 - Week 1 Your Name: Search the Internet for articles on computer crime prosecution. Write a one page paper summarizing the article and identify key features of the decision you find in your search. Computer Crime Criminals have always tried to take advantage or exploit the advances in technology. It's extremely profitable to do so and rarely can get to prosecution if caught and if caught will be given the option to work with the intelligence agencies. Computer crime is prosecution is relatively new in this New Age, and the court system is catching up with how to handle computer crimes and that is why computer forensics is coming to the forefront of many criminal cases that has to do with the computer-related crime. A profitable computer crime is credit card fraud, and the criminals know that computer crimes rarely prosecuted because companies and corporations do not want to admit there may be faults in their security practices. One of the main reasons why the Payment Card Industry created the Payment Card Industry Data Security Standards is to secure cardholder data from Cyber criminals. Additionally, the computer can be used to enhance and protect criminals conducting crime worldwide “ a computer may have been utilized by a drugs trafficker to record details of shipments and corresponding payments and, although incidental to the offenses, the computer may therefore still have evident significant value” (Bell, 2002). Plus, computers can be used as low-key tools...

Words: 477 - Pages: 2