ABSTRACT
Many traditional crimes are now being aided or abetted through the use of
computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the following text, key research findings in the area of traditional American criminal investigations are summarized. Similarities and differences between traditional and computer crime investigations are then presented, and consequent implications are discussed. Pragmatic suggestions as to how American computer crime investigative task forces can most competently fulfill their intended objectives are given in conclusion via a hypothetical example of a specialized unit. It is hoped that past knowledge can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future.
TABLE OF CONTENTS
TITLE PAGE…………………………………………………………………….1
CERTIFICATION PAGE……………………………………………………….2
DEDICATION. 3
ACKNOWLEDGEMENT. 4
ABSTRACT. 5
TABLE OF CONTENTS. 6
CHAPTER ONE. 8
1.0 INTRODUCTION. 8
1.1 STATEMENT OF PROBLEM.. 8
1.2 IMPORTANCE OF THE STUDY. 8
1.4 DEFINITION OF THE STUDY. 9
1.5 ASSUMPTION OF THE STUDY. 9
CHAPTER TWO. 10
2.0 LITERATURE REVIEW.. 10
TOPOLOGY. 11
SPAM.. 12
FRAUD. 12
OBSCENE OR OFFENSIVE CONTENT. 13
HARASSMENT. 14
CHAPTER THREE. 15
3.0 DRUG TRAFFICKING. 15
3.1 CYBER TERRORISM.. 15
3.2 CYBER WARFARE. 17
3.3 DOCUMENTED CASES. 17
CHAPTER FOUR. 21
4.0 COMBATING COMPUTER CRIME. 21
CHAPTER FIVE. 26
5.1 CONCLUSION. 26
5.2 LIMITATION OF THE STUDY. 26
5.3 SUGGESTION FOR FURTHER RESEARCH. 26
REFERENCE. 27
CHAPTER ONE
1.0 INTRODUCTION
Criminal investigation has been a topic of study for academics and practitioners alike, and is defined as ‘the process of legally gathering evidence of a crime that has been or is being committed’ occurred, and works toward building a case that may lead to the successful prosecution of the offender(s). Many research studies have sought to determine the best way in which the investigative process can be conducted and managed.
1.1 STATEMENT OF PROBLEM
Computer crime investigation is not far-reaching since it can affect the personal records of the individuals involved in a particular crime. It can impact the financial resources of a bank, causing confusion and, potentially, affecting customer accounts. PURPOSE OF THE STUDY
1.2 IMPORTANCE OF THE STUDY
Adding the ability to practice sound computer forensics will help you ensure the overall integrity and survivability of your network infrastructure. You can help your organization if you consider computer forensics as a new basic element in what is known as a “defense-in-depth”1 approach to network and computer security.
1.4 DEFINITION OF THE STUDY
COMPUTER CRIME–refers to any crime that involves a computer and a network.
Netcrime– refers to criminal exploitation of the Internet.
1.5 ASSUMPTION OF THE STUDY
Cyber crime can result in confidential information being compromised; affecting the price of the victim’s publicly traded shares. It can be an attack on a corporation’s marketing information, causing misinformation to be communicated to the sales force.
DISCLAIMER: All project works, files and documents posted on this website, UniProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. UniProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. All creative work builds on what came before. Nothing is completely original.” - Austin Kleon. The paid subscription on UniProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.