- Describe the jurisdictional issues that challenge Law Enforcement in dealing with computer crime as discussed in the lecture notes.
- Describe the hierarchy of cyber criminals as discussed in the lecture notes.
- Discuss the different motivations that inspire people to hack into computers.
- Describe the three different types of hackers listed in the lecture notes.
-
Berkeley_Spring2016_JUS403_ch3.doc
-
JUS403_Sp_2016_ppt_ch3.ppt