Preview

Unit 8 Assignment 1

Satisfactory Essays
Open Document
Open Document
233 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment 1
Unit 8 Assignment 1: Organized Cybercrimes

Learning Objectives and Outcomes
You will be able to review the given case scenario to analyze why information theft has become popular in organized crime.

Assignment Requirements
To complete this assignment, you need to access the recent case study by Verizon on data breaches, which is available at the following link: http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf (accessed July 2, 2010).

One of the major findings of this case study is that over 91 percent of all compromised records were linked to organized crime, and 93 percent of those records were financial in nature. Your tasks for this assignment are:
Review the given case study
Establish a cause-effect analysis on why financial information has become so popular with organized crime

Collate your findings in the form of an executive summary.

Submission Requirements
File Format: Microsoft Word (.doc / .docx)
Length: 1-2 pages
Font: Arial 10 point size
Line Spacing: Double

UNIT 8 ASSESSMENTS

Unit 8 Assignment 1: Organized Cybercrimes
Use the following rubric to evaluate the assignment.
Assessment Criteria
Performance Levels

5

TARGET

Met all criteria

4

ACCEPTABLE

Met selected criteria

3

MINIMAL

Met one criterion

2

UNACCEPTABLE

Submitted assignment, but did not meet the criteria

1

NO SUBMISSION
% of Assignment Grade:
100%
75%
50%
25%
0%
Students mentioned monetary gain.

Students discussed the ease of perpetrating the crime.

Students discussed the problem of jurisdiction and the inability to arrest and punish the criminals.

Students identified recommended procedures to properly handle alleged cybercrime cases

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    5. How long do you think it will take before the IPv4 addresses are completely exhausted? It could possibly become exhausted within the next two years or so.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    #5. Identify the principal agents who expose white collar crime in contemporary society. What factors motivate people to expose such crime, and what factors inhibit them from doing so? What specific policy measures can be adopted to encourage exposure of white collar crime?…

    • 1446 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Test Bank

    • 534 Words
    • 3 Pages

    Recent advances have fostered the growth of a relatively new industry to profit from crime. Statistics show that criminals have learned it is easier, less risky, and more profitable to…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If we consider our society as the social institution that it has become we need to recognize how that institution has become staple that has helped to spawn the organized crime that also exists within it. We have outlined what it is that makes our society a social institution and why it is such but in order for that idea to be applied to organized crime we would need to look at our social institution and the people that exist within it from the other side of the spectrum.…

    • 815 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Anthany Nilhas RN IU315

    • 533 Words
    • 2 Pages

    4. (3 points) Identify and briefly describe the three categories of "genuine cybercrime" that was examined.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer technology can be used to implement plans of action to commit crimes. This type of criminal is labeled as cybercriminal. Cybercriminals may hack into personal financial accounts to access funds. They might attack website databases in order to gain access to consumer details, such as social security numbers, that can be used to take out credit cards or loans in another person’s name. Also…

    • 820 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Since the society has become progressively dependent on networks for business, the management of company’s information online has developed into an issue to be concerned. AIS, which is short for Accounting Information System, is not merely related to accounting information management as the business develops around the world. In the various explanations of AIS in the Lecture 1, p12130 Accounting Information System, presented at the University of Nottingham Ningbo by Trevor Bayley, Vaassen (2002) defined AIS as provides information for decision-making and accountability to internal and external stakeholders providing the right conditions for decision making and ensures that no assets illegitimately exit the organisation. In terms of practice of business by networks, the security of information is important. This essay will first describe a related News story. Then, several ways of illegally getting access to essential information by hackers will be provided. Moreover, considering the formation and reality of network business, the essay will analyse how to guarantee the security of a company from two aspects, externally and internally. Finally, a brief conclusion will be provided.…

    • 1586 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Cybercrime

    • 277 Words
    • 2 Pages

    References: Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601-629. Retrieved from http://search.proquest.com/docview/218442330?accountid=35812…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hackers

    • 6354 Words
    • 26 Pages

    5. Phil Williams, Cert Coordination Center. "Implications for Business." Organized Crime and Cyber-crime (2002): 1-7.…

    • 6354 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Fiorentini, G. and S. Peltman. (1997). The Economics of Organized Crime. Cambridge: Cambridge University Press.…

    • 2977 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”1…

    • 2019 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The advent of computers has brought significant changes. In recent years, with the development of technology, people use an Internet more than in the past. Many people think computers lead to Internet crime. The increase in internet crime has bought many disadvantages. This essay describes the main causes and effects of internet crime.…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    white collar crime

    • 42804 Words
    • 172 Pages

    Our generation is witnessing a wave of economic crimes as never before. It looks impossible to come out of them. In such conditions many questions arise before us. The most important of those is, whether there was ever a fear of these economic crimes of such a great intensity that it will become impossible for us to deal with them? If yes, why we have not felt alarm of this fear? In order to get the logical answer to these questions, it is important to understand the concept of white collar crimes given by E. H. Sutherland, who terms these economic crimes as Socio-economic crimes because this class of crimes affect the entire society.…

    • 42804 Words
    • 172 Pages
    Better Essays