Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Investigate a Cybercrime Using the Internet, search for a news article, press release from an organization, or technical article pertaining to a recent cybercrime

Investigate a Cybercrime 

 

  1. Using the Internet, search for a news article, press release from an organization, or technical article pertaining to a recent cybercrime incident. The incident you choose could be of any type covered in the module, or because the world of cybercrime moves so quickly, a new category of crime using the Internet or technology.

 

The news media is one source to research cybercrimes, but news stories may not always give details about the technology aspects of an incident. Along with using traditional media, it may help to use sources specializing in technology or cybersecurity. Some helpful resources include:

 

  • Krebs on Security
  • ARS Technica
  • Wired: Cybersecurity
  • The Hacker
  • CSO

 

Once you have chosen and researched your incident, provide a brief summary of the incident and circumstances surrounding it. 

 

Your write-up should include:

 

  • A description of the targeted organization or person(s)
  • The category of cybercrime for the incident
  • The likely threat source (bad actor) that committed the crime
  • Particular motivations law enforcement or security professionals have associated with the perpetrator (or potential motivations based on the threat source or targeted person or organization)
  • How the Internet or technology enabled the perpetrator(s) to carry out the crime

 

Make sure to include links to the site(s) where you found the information. 

 

Give your summary here.

Examine a Cybercrime Law

 

Review sections 752.794, 752.795 and 752.796 of Michigan's Act 53 of 1979 and answer the questions that follow.

 

2.According to the "History" at the bottom of these pages, what was the last year each of these sections was updated?

 

  1. 752.794 Click to enter text

 

  1. 752.795 Click to enter text

 

  1. 752.796 Click to enter text

 

3.List at least two categories of cybercrime covered in this module that would seem to be prohibited under these sections.

 

Click to enter text

 

Click to enter text

 

4.Are there any categories of cybercrime covered in the module that don't seem to be covered by these sections? Explain. 

 

Click to enter text

 

5.Based on the pace of technology, would you consider either the categories of cybercrime or the technologies listed in these laws to be "up to date"? Explain. 

 

Click to enter text

 

6.Outline at least one addition you would recommend to state lawmakers to make this law better suited for the modern cybersecurity environment. 

 

Click to enter text

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems Design Implementation and Management

Authors: Carlos Coronel, Steven Morris

11th edition

9781305323230, 1285196147, 1305323238, 978-1285196145

More Books

Students also viewed these Algorithms questions

Question

What characteristics do all land plants have in common?

Answered: 1 week ago