Mitigating White-Collar Crime: Exploring Computer Crime and Credit Card Fraud

An assignment discussing white-collar crime, focusing on computer fraud and credit card security.

Charlotte Young
Contributor
4.8
45
10 months ago
Preview (3 of 7 Pages)
100%
Log in to unlock

Page 1

Mitigating White-Collar Crime: Exploring Computer Crime and Credit Card Fraud - Page 1 preview image

Loading page ...

Running Head:WHITE-COLLAR CRIME1White-Collar CrimeStudent’s NameInstructor’s NameCourse TitleDateIn your paper, you discuss two types of white-collar crimes: Computer Crime and Credit CardFraud. How do these crimes typically occur, and what are their impacts onindividuals andorganizations? Additionally, what tools and techniques can security professionals employ toreduce the occurrence of these crimes? Be sure to provide examples and explain the effectivenessof these strategies.Word Count Requirement: 500-600 words

Page 2

Mitigating White-Collar Crime: Exploring Computer Crime and Credit Card Fraud - Page 2 preview image

Loading page ...

Page 3

Mitigating White-Collar Crime: Exploring Computer Crime and Credit Card Fraud - Page 3 preview image

Loading page ...

WHITE-COLLAR CRIME2IntroductionThis paperfocuseson the various tools and techniques available to the securityprofessional in order to mitigate white-collar crime.It discussesComputer Crime and CreditCard Fraudwhite-collar crimes.It discusseshow these crimes are committed, their impacts onorganizations, and the tools a security professional has available to reduce opportunities for suchcrimes to occur.HowCrimes areCommittedComputerCrimeComputer crimehas been theCriminal activitystraightly associatedtoUtilizationofcomputers,particularlyillegal trespasswithin thecomputer systemanddatabase of other,manipulationandtheftaboutstoredandonline dataalong withsabotage of equipmentas well asdata.Enhanced number of local and international criminals has been usingInternet fortheillegalreasons. Computersalong with rest of theelectronic devicesmay alsobeutilized forcommittingcrimes(Cyber Crime, 2013).Just byconnecting to Internetwe have beenmaking ourselfthepotential targetaboutcriminals.Daily, criminalshave been utilizingautomatedtechniques forscanningtheunprotectedandvulnerable computers. Criminalscantargetus particularlyorwe canbe subjectofregularattack.If particulartargetand only therandom attack, therehave been twomajortechniques through thatour computermaybe affectedthroughcyber crime:Twoinstances havebeen Trojans and spyware. Trojanshave been the kindofmalware masqueradinglike anything
Preview Mode

This document has 7 pages. Sign in to access the full document!