You are on page 1of 24

Cyber Crime - Syllabus

• Course Description

 This course gets students up-to-speed on the basics of


computers and networks, so they can quickly understand how
computer crimes "work" and how they are investigated.
 It is appropriate to all students even if they have little or no
technical knowledge or experience.
 The syllabus covers all forms of computer crime, both
traditional and new.
 It includes detailed coverage of identity theft, computer fraud,
e-fencing, fraudulent instruments, and many other forms of
computer crime and it helps students understand the full
spectrum of computer crime against individuals and
organizations.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
CyberCrime - Syllabus
• The following are assessment methods used for this course:
Assignment Value
Exam 1 25%
Exam 2 25%
Final Exam 25%
Case study – Group Project 20%
Group Project- Bonus (Qatar case) 5%
TOTAL 100%

• The student will be graded on a scale of A-F (based on the


standard college grading scale):
Percentage 90 - 100% 80 – 89.99% 70 - 79.99% 60 - 69.99% < 60
Grade A B C D F

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
CyberCrime - Syllabus
Week Date Topic (s) Assignments /Quizzes
/Exams
1 Lecture 1
Introduction and Overview of
Computer Forensics and Cybercrime
(Part 1)
Lecture 2 Introduction and Overview of
Computer Forensics and Cybercrime
(part 2)
Lecture 3 Computer terminology and history
2 Lecture 4 Traditional computer crime: early
hackers and theft of components
Lecture 5 Contemporary computer crime (part 1)
Lecture 6 Contemporary computer crime (part 2) Exam 1
3 Lecture 7 Identity theft and identity fraud
Lecture 8 Terrorism and organized crime (part 1)
Lecture 9 Terrorism and organized crime (part 2)
4 Lecture 10 Avenue for prosecution and government
efforts
Lecture 11 Applying the first amendment to
computer-related crime
Lecture 12 The forth amendment and other legal
issues
5 Lecture 13 Computer forensics: terminology and
requirement (Part 1)
Lecture 14 Computer forensics: terminology and
requirement (Part 2)
Lecture 15 Searching and seizing computer-related Exam 2
evidence (Part 1)
6 Lecture 16 Searching and seizing computer-related
evidence (Part 2)
Lecture 17 Processing of evidence and report
preparation
Lecture 18 Case study-- group
Traditional Problems and project
Recommendations
7 Lecture 19 Future Trends and Emerging Concerns

Final Exams Final exam date is TBD

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Computer Forensics and Cyber
Crime

CHAPTER 1
Introduction and
Overview of
Computer
Forensics and
Cybercrime

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Introduction

• Technological change has always led to


changes in criminal law.

 Having a telephone network makes it


easy to commit wire fraud.

 Widespread reliance on automobiles


meant a new crime, felony auto theft.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Introduction

 Widespread Internet use presents new


kinds of unacceptable behavior.

 Enforcing Internet-related crimes poses


new challenges for law enforcement.

 This text explores how law enforcement


responds to these challenges.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives

• Explore the changes in society


associated with the advent of
technological changes and the
introduction of the Internet.

• Identify the challenges associated with


the enforcement and prosecution of
computer crime.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives

• Examine the extent of computer crime


in society.

• Gain familiarity with categories of


computer-related crime.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Cyberspace and Criminal Behavior

• The societal impact of the Digital


Revolution is as great as the Industrial
Revolution.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Cyberspace and Criminal Behavior

• Action in the virtual reality of


cyberspace can affect physical reality.

• Organizations like the Electronic


Freedom Foundation challenge new
criminal laws.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Types of Crime

• Computer crime: crimes committed


with computers

• Cyber crime: computer crimes that


involve the Internet

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Types of Crime

• Computer-related crime: crimes that


in some way use a computer

 Example: child pornography is easier to


spread via the Internet

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Types of Crime

INSERT: page 13 box as example

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Problems Associated with
Computer Crime
Problems associated with computer crime
include:

• Difficulty in law enforcement

• Difficulty courts face when addressing


extra-jurisdictional crime

• Belief that computer crime is not as


dangerous as violent crime

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Problems Associated with
Computer Crime
• Prosecutors may prefer to limit resources
on violent crime instead.

• Lack of reporting arises from a belief that


these are not worth pursuing.

• Law enforcement agencies may lack


financial and/or technical resources to
investigate computer crimes.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem

Crimes can vary by:

• Type:

 Those unique to computers, like


phreaking
 Those facilitated by computer use, like
distribution of child pornography

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem

Crimes can also vary by:

• Target:

 Private
 Government

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
The Extent of the Problem

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Example of a New Cybercrime:
The Emergence of e-Cash
• Increased electronic commerce requires
new ways to pay for goods and
services.

• The increased flexibility and utility of


these make them appealing.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Example of a New Cybercrime:
The Emergence of e-Cash
 Prepaid cards: like debit cards, not
geographically limited

 Stored value cards: sometimes called


electronic purses. Data is on a computer
chip.

 Mobile payments may be transmitted


via smartphones.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Example of a New Cybercrime:
The Emergence of e-Cash

 Internet payment services, like


PayPal

 Digital precious metals: value of


electronic payments linked to a
precious metal

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Conclusions

• Greater reliance on computer-based


technology presents benefits as well as
problems.

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Conclusions

• Law enforcement may find it difficult to


respond to new types of crimes
because of:
 Lack of resources
 Difficulty responding to rapid
technological change
 Public perception that computer crime is
less serious than violent crime

Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved

You might also like