Preview

Nt1110 Unit 11 Lab

Best Essays
Open Document
Open Document
2482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1110 Unit 11 Lab
Michael Sims
Instructor: Baxter
NT1110
Unit 11 Lab: Research Project
Cyber Crime

In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher’s computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). Computers and the internet have become intertwined into our daily lives.
One reason why individuals use the internet is because they can gather and share information with other individuals no matter where on the globe they are located. This advancement
…show more content…
Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal …show more content…
(2004). U.S. cybercrime law: Defining offenses. Information Systems
Frontiers, 6(2), 115-132.

Buzzell, T., Foss, D., & Middleton, Z. (2006). Explaining use of online pornography: A test of self-control theory and opportunities for deviance. Journal of Criminal Justice and Popular Culture, 13(2), 96-116. Retrieved December 27, 2011, from http://www.albany.edu/scj/jcjpc/vol13is2/Buzzell.pdf

Choi, K.(2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333.

Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. In F. Cullen & R. Agnew (Eds.), Criminological Theory Past to
Present: Essential Readings (pp. 427-442). New York, NY: Oxford University
Press.

Cullen, F., & Agnew, R. (2006). Criminological theory: past to present essential readings. (3rd ed., pp. 5-8). New York, NY: Oxford University Press.

Deng, X., & Zhang, L. (1998). Correlates of self-control: An empirical test of self-control theory. Journal of Crime and Justice, 21(2), 89-110.

Federal Bureau of Investigation, Cyber Crime Division. Computer intrusions. Retrieved November 28, 2011from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    nt1310 unit 1 lab 1

    • 673 Words
    • 3 Pages

    • How much time do you spend talking on the phone, and when do you make your calls? Some providers offer free incoming calls, or free nights and weekends, but those aren’t helpful if you make lots of outbound calls during business hours.…

    • 673 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Unit Lab 1

    • 421 Words
    • 18 Pages

    1 0 0 0 1 0 128 +64 +32 0 0 0 +2 0 Binary# 111000102…

    • 421 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 3 lab 3 nt1210

    • 275 Words
    • 1 Page

    Unit 3 lab lab 3.1 Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? If each vendor had their own standards and protocols, we would have a harder time making devices that we use every day to inter-operate. We would to have multiple routers depending on the devices we own and probably would not be able to use internet when we’re in a café, library, or airport because of incompatibility.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    Answer: B. International standard documents have been reviewed more thoroughly. D. International standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries.…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT 1310 Unit 8 Lab 1

    • 595 Words
    • 2 Pages

    The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction.…

    • 595 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT 1310 Unit 5 LAB 1

    • 417 Words
    • 2 Pages

    Unit 5. Lab. New Building-Wired and Wireless If I choose to design the new building with a wired network the main benefit is there would be a low chance on interception. Choosing a wired network will also have a lower risk of security issues; reliability and speed are primary benefits as well when using physical connections in a wired network. The basis of the new building will relay on loads of data to be moveable that is why a wired network allows the control. Wired LANs provide superior performance. A wired network is also more cost effective, the items needed to build such as Ethernet cables; hubs and switches are very inexpensive. But by using a wired network Ethernet cables, hubs and switches are extremely reliable and inexpensive.…

    • 417 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biological Behavior

    • 480 Words
    • 2 Pages

    Schmalleger, F. (2012). Criminology today: An interactive introduction. (6th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 480 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Walklate, S., 2004. Gender, Crime and Criminal Justice. 2nd ed. Cullompton: Willan Publishing. Walklate, S., 1994 . Understanding Criminology: Current Theoretical Debates. [online] Available at: <http://www.socresonline.org.uk/8/4/walklate.html> [Accessed 30 April 2012].…

    • 3183 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    1. Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Schmalleger, F. (2012). Criminology Today: An Integrative Introduction (6th ed.). Retrieved from The University of Phoenix eBook Collection Database…

    • 2302 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Lab

    • 91 Words
    • 1 Page

    1. Unify mass of the iron tablet content for al the 5 tablets. 2. Crush the weighed tablets in a mortar and pestle.…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Lab

    • 353 Words
    • 2 Pages

    Unit 2 Research Paper 1: Experiment A problem that I think needs to be solved is traffic lights causing the back up of traffic. Traffic lights cause a delay in traffic and cause for traffic back up. It causes everyone to be late when there is no need for it. From personal experience I have been late of several occasions due to backed up traffic because of traffic lights. There are certain spots where traffic lights are not needed and they are only backing up traffic more than needed. Traffic lights turn red even when there is no traffic at the other end of the light. Traffic lights also cause a lot of accidents, such as someone running a red light, etc.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Lab

    • 2577 Words
    • 11 Pages

    Lab No. 2: The Microscope Light microscopy The bright field microscope is best known to students and is most likely to be found in a classroom. Visible light is focused through a specimen by a condenser lens, then is passed through two more lenses placed at both ends of a light-tight tube. The latter two lenses each magnify the image. Limitations to what can be seen in bright field microscopy are not so much related to magnification as they are to resolution, illumination, and contrast. Resolution can be improved using oil immersion lenses.…

    • 2577 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ip3 Crime Causation

    • 1535 Words
    • 7 Pages

    The Crime and Deviance Channel, Retrieved on 1/20/12 from http://www.sociology.org.uk/cc_text/cc_updates_strainspl.pdf Williams, P., Frank III & McShane, D., Marilyn, (2010) Criminological Theory (5th Ed.) Published Prentice Hall, copyright © 2010, by Pearson Education, Inc.…

    • 1535 Words
    • 7 Pages
    Powerful Essays