CRIM 380 Lecture Notes - Lecture 1: Baby Boomers, Generation Z

29 views4 pages

Document Summary

Look at new crimes & responses to crimes. Discuss legal & regulatory environments in cyberspace. Computer - something that processes, adds, subtracts info. Software - what is running on computer - what cannot be touched. Hardware - physical item - what can be touched. Faulty backup exposed estimated 1. 4b email records containing. Theft occurred in 2013, but not disclosed until late 2016. Break-ins & thefts getting so frequent that they are getting to be background noise. Data went up for sale on dark markets soon afterwards. Average time it takes organizations to identify attack - 191 days. Average time to contain breach - 58 days after discovery. I-generation = different than generation x & baby boomers. Ppl less inclined to drive, data, etc. Computer not central to crime but may contain evidence. Ex - addresses found in computer of murder suspect. Computer is tool used to commit crime. Ex - child pornography, criminal copyright infringement & fraud.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents