What questions should an investigator ask to determine whether a computer crime was committed?

What will be an ideal response?


ANSWER: In a criminal case, a suspect is charged for a criminal offense, such as burglary, murder, molestation, or fraud. To determine whether there was a computer crime, an investigator asks questions such as the following: What was the tool used to commit the crime? Was it a simple trespass? Was it a theft, a burglary, or vandalism? Did the perpetrator infringe on someone else’s rights by cyberstalking or e-mail harassment?

Computer Science & Information Technology

You might also like to view...

CD method_______ determines whether the CD-ROM drive is empty.

a) get_CD. b) get_empty. c) get_init. d) None of the above.

Computer Science & Information Technology

The three typical tiers in a web application are ________, ________ and ________.

a. user interface tier, business logic tier, information tier. b. browser tier, server tier, information tier. c. client tier, middle tier, top tier. d. None of the above.

Computer Science & Information Technology

Windows includes troubleshooters for all of the following, except _____.

A. external hard drives B. printers C. recording devices D. networks

Computer Science & Information Technology

[CD] Modify your solution to Exercise 5.5 by placing the Java code (Fig. 5.12) inside a CDATA section. Then render the document in IE5. Other than the syntax coloring, the Java code should be displayed exactly as shown in Fig. 5.12.

What will be an ideal response?

Computer Science & Information Technology