CRIM 380 Lecture Notes - Lecture 1: Baby Boomers, Generation Z
Document Summary
Look at new crimes & responses to crimes. Discuss legal & regulatory environments in cyberspace. Computer - something that processes, adds, subtracts info. Software - what is running on computer - what cannot be touched. Hardware - physical item - what can be touched. Faulty backup exposed estimated 1. 4b email records containing. Theft occurred in 2013, but not disclosed until late 2016. Break-ins & thefts getting so frequent that they are getting to be background noise. Data went up for sale on dark markets soon afterwards. Average time it takes organizations to identify attack - 191 days. Average time to contain breach - 58 days after discovery. I-generation = different than generation x & baby boomers. Ppl less inclined to drive, data, etc. Computer not central to crime but may contain evidence. Ex - addresses found in computer of murder suspect. Computer is tool used to commit crime. Ex - child pornography, criminal copyright infringement & fraud.