CIS 318: Ethics for the IT Professional Week 3. Dr. Jesús Borrego Regis University. Agenda. Homework #2 Questions regarding material covered Chapter 3: Crime with computers and Internet Activities Homework 3 Questions?. Homework #2.
CIS 318: Ethics for the IT ProfessionalWeek 3
Dr. Jesús Borrego
Questions regarding material covered
Chapter 3: Crime with computers and Internet
Set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
Attacker can gain full control of the system and even obscure the presence of the rootkit
Fundamental problem in detecting a rootkit is that the operating system currently running cannot be trusted to provide valid test results
Take notes from the following videos:
TJ Maxx theft believed largest hack ever (00:53) http://www.nbcnews.com/id/17871485/ns/technology_and_science-security/t/tj-maxx-theft-believed-largest-hack-ever/
10 Notorious Cyber Crimes (2:55) http://www.youtube.com/watch?v=m0iaRn2WwPw
Cybercrime and what you can do about it (17:26) https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it#t-392377
How safe is your money? (3:17) http://money.cnn.com/video/pf/2014/02/12/pf-money-safe-cyber-crime.cnnmoney/
What are the main internet crimes?
Why is it difficult to fight internet crime?
What can police do to fight these crimes?
What can a family to do to help fight these crimes?
What can IT to do to help fight these crimes?
Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
Computer forensics investigation requires extensive training and certification and knowledge of laws that apply to gathering of criminal evidence
Pick a case study from the end of Chapte 3 (3rd or 4th edition)
In a Word document, discuss the case study in 3-4 paragraphs
Answer the questions at the end of the chapter
Submit your document before week 4, in APA style