Question
Investigate a Cybercrime Using the Internet, search for a news article, press release from an organization, or technical article pertaining to a recent cybercrime
Investigate a Cybercrime
- Using the Internet, search for a news article, press release from an organization, or technical article pertaining to a recent cybercrime incident. The incident you choose could be of any type covered in the module, or because the world of cybercrime moves so quickly, a new category of crime using the Internet or technology.
The news media is one source to research cybercrimes, but news stories may not always give details about the technology aspects of an incident. Along with using traditional media, it may help to use sources specializing in technology or cybersecurity. Some helpful resources include:
- Krebs on Security
- ARS Technica
- Wired: Cybersecurity
- The Hacker
- CSO
Once you have chosen and researched your incident, provide a brief summary of the incident and circumstances surrounding it.
Your write-up should include:
- A description of the targeted organization or person(s)
- The category of cybercrime for the incident
- The likely threat source (bad actor) that committed the crime
- Particular motivations law enforcement or security professionals have associated with the perpetrator (or potential motivations based on the threat source or targeted person or organization)
- How the Internet or technology enabled the perpetrator(s) to carry out the crime
Make sure to include links to the site(s) where you found the information.
Give your summary here.
Examine a Cybercrime Law
Review sections 752.794, 752.795 and 752.796 of Michigan's Act 53 of 1979 and answer the questions that follow.
2.According to the "History" at the bottom of these pages, what was the last year each of these sections was updated?
- 752.794 Click to enter text
- 752.795 Click to enter text
- 752.796 Click to enter text
3.List at least two categories of cybercrime covered in this module that would seem to be prohibited under these sections.
Click to enter text
Click to enter text
4.Are there any categories of cybercrime covered in the module that don't seem to be covered by these sections? Explain.
Click to enter text
5.Based on the pace of technology, would you consider either the categories of cybercrime or the technologies listed in these laws to be "up to date"? Explain.
Click to enter text
6.Outline at least one addition you would recommend to state lawmakers to make this law better suited for the modern cybersecurity environment.
Click to enter text
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started