Premium Essay

Cis170

In:

Submitted By fayew
Words 794
Pages 4
Categories of Computer Crimes

Valencia Faye Walker

Information Technology
Dr. Patricia White (Instructor)

April 9, 2012

The “Integrity’ in the criminal justice field is that of duty, obligation, morality, discretion and fairness. The type that shows each individual has moral worth, wherein the individual is endowed with certain rights that cannot be taken away. The tradition of moral rights maintains that each ‘moral subject’ has a right to integrity. The subject of computer criminal takes away some form of freedom from us as individuals. We have select categories of computer crimes that present a great threat for our future. Piracy involves downloading and distribution of copyright media without paying for it, vandalism the computer. Even though I feel that this is not a serious issue, it seems that the Federal law states that this is very wrong on a moral standard and a legal one. The penalties involve the infringer paying anywhere from $200 to $150,000 for each work infringed with attorneys fees and court cost, also jail time is also a possibility. Illegal Hacking is a serious crime, especially those who can and will use their skills to rob people of personal information, invaded secure networks and vandalize virtual property. The computer is the instrument they use to obtain this information. The law enforcement and government agency have relied on programmers who are reformed criminals to test for security leaks and help keep out other intruders. Cyber criminal, use the computer to facilitate child pornography, and take money from accounts, money laundering and remove private data. The FBI has a cyber crime division and its mission is to stop those behind the computer intrusions, identify predators using the internet to meet and exploit

Similar Documents

Premium Essay

Cis170 Final Exam Guide

.... MC 1. (TCO 13) Text files are what type of file? 4 Points : Sequential Random access Binary Consecutive Instructor Explanation: Lecture / Chapter 13 Edit 3. MC 1. Delete (TCO 13) To create an input file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 4. MC 1. Delete (TCO 13) To create an output file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 5. MC 1. Delete (TCO 13) The header file that defines the classes for processing and manipulating files is called the _____. 4 Points : Instructor Explanation: Chapter 13.1 Introduction Edit 6. 7. 8. MC 2. Delete (TCO 13) What do the following statements accomplish? ifstream theFile; theFile.open( myFile.txt , ios::in); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 9. MC 2. Delete (TCO 13) What do the following statements accomplish? ofstream theFile; theFile.open( myFile.txt , ios::out); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit...

Words: 2540 - Pages: 11

Free Essay

The Choice Theory

...The Choice Theory By Adrienne Clarey CIS170 Professor Nick George The Theory that I selected was the Choice Theory according to the choice theory the individual commits the crime because he or she make a rational choice to do so by weighing the risks and benefits of committing the act. If the risk (e.g.,) (apprehension and punishment) out weight the benefits, then the person will not commit the act, and vice versa. But in a more perfect world that might be true. I think that the criminal mind does not have a rational thought process, because even if the crime has a negative outcome the criminal will still commit the crime. I think that it is more of a personal satisfaction more than anything else. The theory is related to earlier drift theory (Matza: 1964) where people use the techniques of neutralization to drift in and out of delinquent behavior, and the Systematic Crime Theory (an aspect of Social Disorganization Theory developed by the Chicago School), where Edwin Sutherland proposed that the failure of families and extended kin groups expands the realm of relationships no longer controlled by the community, and undermines governmental controls. This leads to persistent "systematic" crime and delinquency. He also believed that such disorganization causes and reinforces the cultural traditions and cultural conflicts that support antisocial activity. The systematic quality of the behavior was a reference to repetitive, patterned or organized offending as...

Words: 592 - Pages: 3

Premium Essay

Crime Thoeries

...Crime Theories Kristyn Irene Hope Seiler Information Technology in Criminal Justice – CIS170 Strayer University Professor Carmen J. Flores November 5, 2012 There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory. The one theory that I believe that caused digital crime is the routine activities theory. This is related to crime in general by the way that the criminals had made a rational choice to commit the crime. The rational activities theory can be related to crime in general by that the criminals have the choice of what victim that they want to commit the crime on. There are many different ways to commit this crime digitally. Three of the ways are a motivated offender, a suitable target and the absence of a capable guardian. The three ways to commit a digital crime and a crime in general is the same three ways. In any crime you need a many different opportunities that need to be in place before the crime happens. The reason that rational activities theory could be recognized as the most relevant in terms of digital crime is because...

Words: 704 - Pages: 3

Free Essay

Computer Crime

...Digital Computer Crime Matthew Moeller Dr. Neal Basta CIS170 April 21, 2015 Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. The four most common categories of computer crimes are computer as a target, instrument of a crime, incidental to a crime, and prevalence. Computers can be the target of a criminal activity, a storage place for data about a criminal activity or the actual tool used to commit a crime. One of the most publicized crimes targeting computers involves unleashing a virus through email. A virus is a computer program that disrupts or destroys existing computer systems. A virus spreads rapidly around the world destroying computer files and costing companies and individuals millions in downtime or when the computers networks are shutdown. Most viruses are released by hackers as pranks. A hacker is someone who gains unauthorized access to a specific system. Sometimes hackers may target law enforcement or military computers and read or copy sensitive information. Some are concerned that terrorists will unleash viruses to cripple computer systems that control vital transportation networks. By using the computer as the instrument of a crime means that some other criminal objective is gained. Just like in the...

Words: 846 - Pages: 4

Premium Essay

Assignment 1: Digital Computer Crimes

...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second category...

Words: 1501 - Pages: 7

Premium Essay

Doc, Docx Pdf

...Free eChapters (FALL 2012) eChapters offer students immediate access to the first few chapters of their textbooks while they are waiting for the print book to arrive. eChapters help students to keep up with required reading and assignments until they receive their course material, without having to pay expedited shipping costs. eChapters that are available from the publisher are attainable free of charge. How do students gain access to free eChapters? Not all courses or textbooks have eChapters available. For all courses where eChapters are available, the files are located in the student’s Blackboard course shell under the Student Center. Below is a list of courses with eChapters loaded into the course shells, giving students free access as of the first day of classes. * = eChapters are forthcoming Course ID ACC100 ACC206 ACC303 ACC304 ACC305 ACC306 Text Title Accounting Principles – 9th edition Accounting Principles – 9th edition Intermediate Accounting 14e Intermediate Accounting 14e Intermediate Accounting 14e Microcomputer Applications for Accounting Excel 2010 Microsoft® Excel 2010: A Case Approach, Complete, 1st Edition, copyright 2011 SOUTH WESTERN FEDERAL TAXATION 2012: COMPREHENSIVE, 36th ed. South-Western Federal Taxation 2013: Corporations, Partnerships, Estates and Trusts, 36th Edition Cost Accounting 13th 09 ed. Advanced Accounting 4th 10th ed. Auditing & Assurance Services 13th 10 ed. Core Concepts of Government and Not for Profit Accounting 2nd ed., 2011 ed ACC...

Words: 3676 - Pages: 15