Chapter 6
- What is the Bank Secrecy Act of 1970? How has the advent of computer technologies created ways around this Act?
- What is phishing? How does phishing fit into the problem of identity theft?
Chapter 7
- What is the difference between a virus and other types of malicious code?
- What are the most common types of viruses?
- What variables are used to distinguish and classify viruses?
- What is a Trojan horse? What are the various types of Trojan horses?
- What is a worm? How do worms differ from traditional viruses?
- What are virus hoaxes? Why are the hoaxes sometimes more dangerous than an actual virus?
- Describe how the creation of malicious software is changing due to varying motives?
Chapter 8
- What are the various types of exploitation that can occur over the Internet?
- What are the characteristics of the typical victims of Internet exploitation crimes?
- What are the characteristics of the typical perpetrators of Internet exploitation crimes?
- What is cyberbullying, and how is it different from real- world bullying?
- What is cyberstalking?
- What types of offenses can occur that could be defined as cyberstalking?
- What are the primary types or categories of stalkers?
- What are the primary federal laws that target Internet exploitation?
- How prevalent is child pornography on the Internet?
- How do pedophiles and other child exploiters use the Internet to commit their crimes?
- What role does child pornography play in child moles-tation?
- How has the Internet changed the landscape of prosti-tution and the sex trade?
- What is sex tourism?
- What are the primary challenges that law enforcement agencies face in investigating cyber exploitation?
Writing Requirements
- 3–4 pages in length, in APA format (excluding cover page, abstract, and reference list)
0 comments