Project Three cj 305

pptx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

305

Subject

Computer Science

Date

Jan 9, 2024

Type

pptx

Pages

8

Uploaded by ChiefRookPerson1004

Report
Project Three Laura Lira Fuentes Southern New Hampshire University Professor Robert Kicklighter CJ-305-T6868
Scenario Someone has come into your station to file a police report. This person has been the victim of email bank fraud. An example of the type of email the victim received can be seen below. The victim provided bank information and, as a result, his savings account has been drained. He is actively working with his bank to have the funds returned. Your agency has seen a rise in crimes of this nature. You are planning to present at a Victim Offender Impact Panel to educate your community about cybercrimes. These Victim Offender Impact Panels are community-based meetings where victims can share their experiences and criminal justice professionals can educate and empower their community. Nice to Know You Dear Beloved Friend, I know this message will come to you as surprised but permit me of my desire to go into business relationship with you. I am Miss <name redacted> a daughter to late At-badari of Libya whom was murdered during the recent civil war in Libya in March 2011, before his death my late father was a strong supporter and a member of late Moammar Gadhafi Government in Tripoli. Meanwhile before the incident, my late Father came to Cotonou Benin republic with the sum of USD 4,200,000.00 (US$4.2M) which he deposited in a Bank here in Cotonou Benin Republic West Africa for safe keeping. am here seeking for an avenue to transfer the fund to you in only you're reliable and trustworthy person to investment the fund. I am here in Benin Republic because of the death of my parent's and I want you to help me transfer the fund into your bank account for investment purpose. Please I will offer you 20% of the total sum of USD4.2M for your assistance. Please I wish to transfer the fund urgently without delay into your account and also wish to relocate to your country due to poor condition in Benin, as to enable me continue my education as I was a medical student before the sudden death of my parent's/ Reply to my alternative email:miss <name redacted>@hotmail.com, Your immediate response would be appreciated. Remain blessed, Miss <name redacted>
What happened? In this scenario the victim was scammed by email. The victim provided the scammer with their bank information and as a result the scammer took the information and drained the bank account of the victim. How to Recognize this situation as Fraud Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging. The attacker's goal is to steal money, gain access to sensitive data and login information, or to install malware on the victim's device (Merriam Webster). In this case the criminal presents a situation where they are in need of money because their money is unavailable, and the criminal puts pressure by saying they need to escape the country after their parents' death.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Other types of Cybercrimes Phishing: Using fake email messages to get personal information from internet users Identity Theft: Misusing personal information Hacking: Shutting down or misusing websites or computer networks Distributing: Can range from drugs to child pornography Grooming: making sexual advances to minors. (Veiligheid, 2016)
hallenges of pursuing Cybercrimes The unique challenges facing law enforcement in addressing cyber crime revolve around the nebulous nature of cyber crime. The initial stages of a cyber crime investigation involve a high degree of uncertainty. It is often difficult to quickly identify and assess what type of crime, if any, has been committed. (Kubie, 2001). In most cases it can take up months to solve a case because in cases like this because the suspects can delete information or get rid of the device they were using, it also makes it difficult to know who the suspect is because they are more likely using another identity.
Negative impact Cybercrimes have on the community Due to the anonymity of the offenders, the victims may never find out who their offender is. Cybercriminals can also target a variety of victims, for example, businesses, older people, even younger people by catfishing for money. Unfortunately, it is very hard to solve these crimes because to the criminals’ these types of crimes are low risk and have a high reward.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Strategies individuals should use to protect themselves from cybercrime Start with turning on Multifactor Authentication- Opting-into an extra step when trusted websites and applications ask you to confirm you’re really who you say you are. This means that when accessing an app or a website, when you sign-in you will put your email and password, and if that information is correct then it will send you a text to phone number registered to the account and asked for the pin that was sent, or now phones will let you verify it is the person by asking for a fingerprint or face ID. Use strong passwords Think before you click- if there is a text that seems off or a link that looks suspicious, do not click it because then the device could be hacked. Update Software- Criminals will exploit flaws in the system. Network defenders are working hard to fix them as soon as they can, but their work relies on all of us updating our software with their latest fixes. (Cybersecurity and Infrastructure Security Agency, 2022)
References Merriam-Webster. (n.d.). Phishing definition &amp; meaning. Merriam-Webster. https://www.merriam- webster.com/dictionary/phishing Veiligheid, M. van J. en. (2016, October 5). Forms of cybercrime. Cybercrime | Government.nl. https://www.government.nl/topics/cybercrime/forms-of- cybercrime Kubie, T. (2001, June 12). The FBI’s perspective on the cybercrime problem. FBI. https://archives.fbi.gov/archives/news/testimony/the-fbis-perspective-on-the- cybercrime- problem#:~:text=The%20unique%20challenges%20facing%20law,if%20any%2C 20has%20been %20committed. 4 things you can do to keep yourself cyber safe: CISA. Cybersecurity and Infrastructure Security Agency CISA. (2022, December 18). https://www.cisa.gov/news- events/news/4-things-you-can-do-keep-yourself- cyber-safe