CRIM 380 Study Guide - Final Guide: Cryptanalysis, Computer Program, Money Mule

157 views22 pages

Document Summary

Breach: in 2013, yahoo compromised 1 billion user accounts. In 2014, yahoo compromised 500 million users accounts. Data went up for sale on dark markets soon afterwards. Costs to remediate a data breach is per stolen record. 64kb): crime needs 3 things: (1) presence of opportunities or targets to commit crime; (2) motivated offender; and (3) absence of capable guardians to prevent crime. Week 4: personal cybercrimes part 1 (human-trafficking and child exploitation: defining child exploitation canada: section 163. 1 of the c. c. c. Online sex ads: classic trafficking: hiding in cargo containers, sent across pacific ocean in small boats, and then smuggled through the border, internet-based trafficking: online classified sites advertise victims. Middle eastern extremist organizations: middle eastern extremist organizations on dark web: are the most active exploiters of the internet. Provided the richest multimedia contents in their web sites. Domestic groups on dark web: interact fully through forums, chat rooms, and e-

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers

Related Documents