MCJ6374 Create and investigate your own computer criminal!

Asked by bizgrad
Dated: 27th Nov'18 01:01 PM
Bounty offered: $7.00
Course Project Part I
Create and investigate your own computer criminal!
You must make this person up from scratch; do not outline a real person or case. You will invent
a cybercriminal, and identify the following information:
1. Name and background (education, family, etc.) 2. Where the criminal lives 3. Where the
criminal works
Now, create a fact pattern (narrative) explaining in detail this person’s crime or crimes. (Fact
pattern is a term used in many areas, especially law. In law, the term fact pattern simply means
the true and accurate description of what happened in a crime, or alternatively, events leading
to a lawsuit.)
Include the following:
1. How do they do what they do (equipment, funding, etc.)? 2. Under what psychological
theories and profiles do they fall? 3. Are they a member of any specific criminal organization? 4.
What is their classification, and how are they identified as such (hacker, script kiddie, etc.)?
Next, develop a fact pattern where this person commits their ultimate crime. Walk us through
the steps of the crime: how is it carried out, upon whom is it carried out, and what is the
ultimate goal of the criminal? Use as much detail as possible. Do they use a virus? Are they
infiltrating a company they work for? How? What kinds of systems do they use? What kind of
systems do they infiltrate?
Your paper should be at least two pages in length. APA format is required for all citations and
Information about accessing the Blackboard Grading Rubric for this assignment is provided
Create and investigate your own computer criminal!
Answered by bizgrad
Expert Rating: 2396 Ratings
Dated: 27th Nov'18 01:01 PM
5 words and 1 attachment(s).
Tutorial Rating: Not Rated
Sold 1 times.
(preview of the tutorial; some sections have been intentionally blurred)


Preview of MCJ-6374.docx
activity     routine   theory He     a       generate   so that     provide       Since   was under     of       controlled   his moves     him       programming   to engage     unethical       visible   once a     the       no   out of     a       leverage   dead The     Jowie       who   protected fully     the       internet   they exploit     opportunity       hacking   bank accounts     people       to   Jowie