It covers the history, causes, and development of cybercrime through studies of surveys, types of crime, legal measures, and system and human vulnerabilities. It will also examine the effects of cybercrime through the experiences of victims and law enforcement and look at the motives and attitudes of hackers and other cyber criminals.
- Setting the scene
- Analysing cybercrime
- Principles of law and computer misuse
- Computer hacking
- Traditional cybercrime
- Psychological cybercrime
- Telecommunications crime
- Viruses and worms
- Denial of service attacks
- Digital evidence
If you complete the module successfully, you should be able to:
- follow trends in cybercrime.
- relate computer security methodologies to criminal methods.
- detect criminal activity in a computerised environment.
- apply the criminal and civil law to computer criminality.
- understand how viruses, logic bombs and hacking are used by criminals.
- appreciate the views of the public, business, governments, and the media to occurrences of cybercrime.
- understand the need to gather and preserve digital evidence correctly so that legal actions can be brought.
This module is assessed by a two-hour unseen written examination.
- Information Warfare and Security (D Denning) Addison Wesley 1998
- Cybercrime: The transformation of crime in the Information Age (D Wall) Polity Press 2007
- Information Technology Law (I Lloyd) Oxford University Press 2011