Index | Title Page | Introduction | Techniques | Challenges | Conclusion | Bibliography |
The Information Age has forever changed the way people connect with each other and our world as a whole. From the creation of the internet in the 1950's to the use of smart phones, the world is empowered with information. Any person with an internet service provider (ISP) can search anything by endless search engines including Google Coining the saying,"It is not what you know it is how fast you can find out". Most people are walking around with a very powerful computer/phone in their hands. This allows people to go about the day with all the information of the internet at their fingertips. Yet, with all the positives of the Information Age, new categories of crime have emerged. These computer crimes include gaining and manipulation of information is available to us. (Solomon p.4)There is very specific branch of law enforcement that deals specifically with these new computer crimes. They are computer forensics. They are people whom use computers to hunt, investigate and present evidence of computer crimes. Most internet crimes can be classified into black hat hacking, internet scams, corporate fraud and security concerns are Viruses, worms and Trojan Horses. This is an important to know the functions and behaviors of each to protect your computer and data from these threats