CRJ 3341 Oakland Wk 19 Computer Fraud Scholarship Cybercrime Case Study

User Generated

napuberqNFG

Business Finance

Oakland University

Description

Students will select one prosecuted case of cybercrime and apply what you have learned from the course to analyze that case. The case can be selected from the Department of Justice Computer Crime website or another news source. I must approve the selected case and a brief outline via email by February 28. The paper must be 5 to 7 pages in length and have a title page with your name and title of the paper. All papers should be double spaced, have 12 pt. Times New Roman font, 1 inch margins all around, full paragraphs (must by 4 or more complete sentences, page numbers, APA style (link to Purdue OWL on MOODLE), and sections should have headers (e.g. Introduction, etc…). The sections of the paper must include: INTRODUCTION (about 1 page) • Why is the study of cybercrime important? • Introduce the case and the cybercrime committed. • Must include a thesis statement. CASE ANALYSIS (about 2 pages) • Analyze the cybercrime involved. o What was the motive? o What weakness was exploited? o What evidence led to the arrest? • Apply at least 3 concepts from the course. • Apply at least 2 theories discussed in class. DISCUSSION and RECOMMENDATIONS (about 2 pages) • What could be done to prevent this cybercrime from happening in the future? o On an individual level o On an institutional level (e.g. organization, business, etc…) o On a societal level (e.g. government, law enforcement, etc…) CONCLUSION (about ½ page) • Summarize your analysis and recommendations. REFERENCES • References must follow APA format. • List all sources used (even the text book) in the paper.

Case: https://www.justice.gov/usao-wdtn/pr/student-pleads-guilty-computer-fraud-trying-preserve-scholarship

Unformatted Attachment Preview

CRJ 3341 – Cybercrime Winter 2019 Schwartz Case Study Paper Assignment Due: March 28 at the start of class Students will select one prosecuted case of cybercrime and apply what you have learned from the course to analyze that case. The case can be selected from the Department of Justice Computer Crime website or another news source. I must approve the selected case and a brief outline via email by February 28. The paper must be 5 to 7 pages in length and have a title page with your name and title of the paper. All papers should be double spaced, have 12 pt. Times New Roman font, 1 inch margins all around, full paragraphs (must by 4 or more complete sentences, page numbers, APA style (link to Purdue OWL on MOODLE), and sections should have headers (e.g. Introduction, etc…). The sections of the paper must include: INTRODUCTION (about 1 page) • Why is the study of cybercrime important? • Introduce the case and the cybercrime committed. • Must include a thesis statement. CASE ANALYSIS (about 2 pages) • Analyze the cybercrime involved. o What was the motive? o What weakness was exploited? o What evidence led to the arrest? • Apply at least 3 concepts from the course. • Apply at least 2 theories discussed in class. DISCUSSION and RECOMMENDATIONS (about 2 pages) • What could be done to prevent this cybercrime from happening in the future? o On an individual level o On an institutional level (e.g. organization, business, etc…) o On a societal level (e.g. government, law enforcement, etc…) CONCLUSION (about ½ page) • Summarize your analysis and recommendations. REFERENCES • References must follow APA format. • List all sources used (even the text book) in the paper. CRJ 3341 – Cybercrime Winter 2019 Schwartz Sample Case Study Outline Case: Third Member of International Computer Hacking Ring Pleads Guilty to Hacking and Intellectual Property Theft Conspiracy http://www.justice.gov/usao/de/news/2015/01-20.html INTRODUCTION • • Why is cybercrime important? Background of hacking ring CASE ANALYSIS • • • • • Motive – Money, get rich quick Opportunity – Vulnerabilities and network weak points to gain access to Microsoft, Valve Corporation, Activision Blizzard Evidence – Individual who turned over counterfeit Xbox to FBI, Skype and chat conversations Concepts o Hacking o Vulnerabilities o Poor network defenses Theories o Rational Choice o Strain Theory o Social Learning o Subcultural Theories DISCUSSION and RECOMMENDATIONS • • • Individual – Avoid groups promoting malicious hacking and criminal activities Institutional – Better control over vulnerabilities and network defenses Societal – International law enforcement cooperation and stricter hacking laws CRJ 3341 – Cybercrime Winter 2019 Schwartz Case Study Outline Case:​ ​Student Pleads Guilty to Computer Fraud, Trying to Preserve Scholarship https://www.justice.gov/usao-wdtn/pr/student-pleads-guilty-computer-fraud-trying-preserve-scho larship INTRODUCTION ● Why is cybercrime important? ● Background of ​Computer Fraud CASE ANALYSIS ● Motive ○ Trying to preserve scholarship ● Opportunity ○ Vulnerabilities with known passwords/credentials to gain access to grades, exams, answers to exams, and more ● Evidence ○ Records obtained during the investigation showed the IP address in question was assigned to Geddati's residence in Memphis during the period of unauthorized access to the Rhodes accounts. ● ​Concepts ○ ​Hacking ○ Vulnerabilities ○ Password safety ● Theories ○ ​Rational Choice ○ Strain Theory DISCUSSION and RECOMMENDATIONS ● Individual – Study and actually work for your grades, avoid acts of hacking ● Institutional – Better control over vulnerabilities (passwords, credentials, etc) ● Societal – International law enforcement cooperation and stricter hacking laws
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CYBER CRIME

1

Cyber Crime
Student’s Name
Institution Affiliation
Course

CYBER CRIME

2

Introduction
Cybersecurity, the protection of interconnected computer systems from attackers, has
been an issue of concern mainly during this era whereby most operations and transactions are
dependent on computer systems. Computer devices are ordinarily prone to attack. At times,
various vulnerabilities arise thereby making the devices susceptible to attack. As a result, it is
crucial to study the concept of cybercrime. Studying cybercrime is also equally important as it
enables an individual to understand the threats, vulnerabilities, and countermeasures associated
with cybersecurity. Over the past years, there have been multiple cases associated with
cybercrime. Some of these cases have either been committed by armatures or experienced
hackers. A good example of a security breach, through identity theft, was a case which involved
a student, Michael Geddati, 20, of Rhodes College Memphis. The security attack committed by
this student would seem as one with no weight. However, it was a violation of both the federal
and institutional law.
It happened so that Michael, the accused, had illegally penetrated the school’s system,
taking the role of the administrator (instructors), and altering his marks to favor him best. The
accused had maliciously obtained the credentials and passwords of his instructors who were
taking him through the semester’s courses. Having obtained these sensitive pieces of data,
Michael went ahead to download exams and the associated keys unlawfully. He also altered with
the marks in the system, changing them to his favor. The malicious access into the system was
identified by one of Michael’s professors as he realized that the online and offline records
associated with Michael’s grades were not at par. During the investigation, various supporting
pieces of data were obtained. These included the IP address of the end device used to penetrate
the system and the mac address of the device. According to this case, it is evident that computer

CYBER CRIME

3

systems are susceptible to attack, but the level of attack also depends on how fast the crime is
identified.
Michael’s Motive
The step that Michael took to change his marks was substantially related to retaining his
scholarship as it was mostl...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags