CJ 308 Project One Template

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

101

Subject

Accounting

Date

Feb 20, 2024

Type

docx

Pages

11

Uploaded by CaptainOxide1916

Report
CJ 308 Project One Template Cybersecurity Guide Note: To complete this template, replace the bracketed text with your own content. Remove this note before you submit your paper. Overview The relevance of this guide is to be able to educate the many different types of cybercrime that this department is working on and responsible for. These will be defined for better understanding of the terms and possible motives that criminals use to be able to attempt the crime. Definitions [Define a minimum of five terms in your own words, for a non-technical audience.] DDoS: Also known as Distributed Denial of Service, is an attack of multiple computers that keep any user from being able to access a site. This can happen by using bots that can flood the server to stop access. PII: This is also known as personal identifying information, this is information that identifies a user or individual. [Add additional terms]
[Complete the table using your course textbook as the primary resource. Replace the bracketed text with your own content.] Types of Crimes Characteristics Indicators Motives Actors 1 Ransomware Transmission, use of malware; target is the organization Locked screen Ransom, money, cryptocurrency Army of bots, network across international lines used by hackers 2 Data breach/theft A network that was infiltrated for information to be threatened and or stolen. This includes financial account information, internet account login credentials and personal identifying information to impersonate a victim. (Bandler, 2020). Noticing there is unusual activity during login, or login information was changed without the knowledge of the victim. There may be lost digital data assets. The motives are usually to gain financial assets and sell the information to gain more money. Multiple individuals are involved such as the one breaching the data and the third party.
Types of Crimes Characteristics Indicators Motives Actors 3 Phishing Emails that are sent that induce people to wire money under false pretenses, or phony online applications for loans, a bank is the direct or indirect target. (Bandler, 2020). Emails that are not normal and may come with an attachment to open the link. Financial gain and sensitive information to personal accounts. individuals 4 Identity Theft This involves the use of the other persons identity but gaining access to a victim’s internet accounts, financial accounts, or medical insurance (Bandler, 2020). The maybe unusual activity on bank statements or credit card statements. Steal money, goods, or services, and to operate under another person’s identity. (Bandler, 2020). Hacker, individual
Types of Crimes Characteristics Indicators Motives Actors 5 Harassment Threating the victim and intruding on their lives personal information about the victims is leaked to other individuals. This can also include other types of cybercrime, including account takeovers, computer intrusions, data destruction, and impersonation. (Bandler, 2020). Numerous emails threats and notice of email being compromised or other information. extortion, disruption. Money. Group of hackers or an individual.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help