{"id":358,"date":"2022-10-26T07:53:07","date_gmt":"2022-10-26T07:53:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber201s\/?page_id=358"},"modified":"2022-10-26T07:54:31","modified_gmt":"2022-10-26T07:54:31","slug":"crjs-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber201s\/crjs-301\/","title":{"rendered":"CRJS 301"},"content":{"rendered":"\n<h1 class=\"has-text-align-center wp-block-heading\">Cybercriminal: Foundations<\/h1>\n\n\n\n<p>What is cybercrime?&nbsp; How is the concept of cybercrime related to cyber law?&nbsp; What is meant when scholars say that all cybercrimes are not necessarily illegal?<\/p>\n\n\n\n<p>Any unauthorized activity involving a computer, device, or network is deemed cybercrime. Computer-assisted offenses, crimes in which the device itself is an aim, and crimes in which the computer has been incidental to the crime instead of directly related to it are the three types. Computer crime and cybersecurity are two areas associated with cyber law. Companies and individuals can safeguard themselves from cybercrime with the right cybersecurity. Cybersecurity focuses on addressing flaws in systems and servers. The primary goal of this law is to enhance data transmission over the web while keeping it secure.<\/p>\n\n\n\n<p>The types of hackers that were discussed about in class were:<\/p>\n\n\n\n<ul><li><strong>Black-Hat Hackers<\/strong>Black-hat hackers use fake identities to conduct malicious activities for a profit<\/li><li><strong>Gray-Hat Hackers<\/strong>They work both with malicious intent and as legitimate security analysts<\/li><li><strong>White-Hat Hackers<br><\/strong>White hat hackers work as security analysts to detect and fix flaws and protect against malicious hackers<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/th.bing.com\/th\/id\/R.0855f315c75e3bf3d51f4e289af77643?rik=SzX7qXQMuUYuSw&amp;riu=http%3a%2f%2fimage.slidesharecdn.com%2fcybercrimeppt-151008171327-lva1-app6891%2f95%2fcyber-crime-ppt-10-638.jpg%3fcb%3d1444324678&amp;ehk=NyiuEnHzJJnTJQ378mwzr6MmDHifQJr35kkNNbhxR2Q%3d&amp;risl=&amp;pid=ImgRaw&amp;r=0&amp;sres=1&amp;sresct=1\" alt=\"See the source image\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img decoding=\"async\" src=\"https:\/\/wallpapercave.com\/wp\/wp6781415.jpg\" alt=\"See the source image\" \/><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Cybercriminal: Foundations What is cybercrime?&nbsp; How is the concept of cybercrime related to cyber law?&nbsp; What is meant when scholars say that all cybercrimes are not necessarily illegal? Any unauthorized activity involving a computer, device, or network is deemed cybercrime. Computer-assisted offenses, crimes in which the device itself is an aim, and crimes in which&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber201s\/crjs-301\/\">Read More<\/a><\/div>\n","protected":false},"author":23492,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/pages\/358"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/users\/23492"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/pages\/358\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/pages\/358\/revisions\/364"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber201s\/wp-json\/wp\/v2\/media?parent=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}