Computer Crime Investigation

profileINeedHelp411
  • Design a mock phishing method that is commonly observed today.  In your method, describe details that could be asked to a victim, in order to compromise their identity or electronic account. 
  • Relate your experience of instances where you have received an email from a phishing scam. Describe how you knew the email was fraudulent and rate its capacity to confuse victims into providing the targeted information. 
    • If you have never received a phishing scam by email, provide details as to what signs, or characteristics of the email, one must look out for, in order to detect a phishing scam. 
  • Identify two types of cyber-terrorism attacks.  Describe the impact that each attack made to the organizations. Provide details on what organizations or industries across the board have done to minimize these threats from reoccurring.  
  • Evaluate government agency initiatives and programs that may have been developed, as a response to cyber-terrorism attacks.

These are discussion questions so please do not submit a research paper where I have to piece together the answer.

 

Thank you

    • 12 years ago
    • 10
    Answer(0)