CRJS 310: Cybercriminology

In this course, we learned about computer-related crimes and how law enforcement officials investigate them. We started off by describing the environment that has been created through information along with communication technologies and how this new environment facilitates different types of behavior. Furthermore, we defined and described the different types of computer-related crimes, the techniques used by officials, and the legal issues involved with combating cybercrime. In this course, I learned about many different cyber crimes and cyber related incidents that have happened. Also, I learned how to mitigate these risks. I completed many free writes within this course and a cybersecurity paper. The free writes involved various cybersecurity topics and the paper was a topic of our choice so I chose identity theft. 

In the first free write, we were to look up six cybersecurity topics and then summarized the context of each webpage.

Free-Write-2

In the second free write, I discuss cyber war and how to mitigate in order to prevent them.

Cyber-war

For the cybersecurity paper, the topic I chose was identity theft since it is one of the most common types of cybercrimes committed. Throughout my research for this paper, I learned how people make themselves vulnerable to this type of crime. In addition, I learned ways in which identity theft could be prevented.

Identity-Theft