1. Describe how the combination computers and telecommunications has increased crime in cyber space as discussed in the lecture notes. 2. Describe on-line fraud and different crimes committed online as discussed in the lecture notes. 3. Why are employees the most vulnerable component in the theft or loss of confidential information? 4. Describe the four eras of computer viruses as discussed in the lecture notes. attachment Berkeley_Spring2016_JUS403_ch41.doc attachment JUS403_Sp_2016_ppt_ch41.ppt

1. Describe how the combination computers and telecommunications has increased crime in cyber space as discussed in the lecture notes. 2. Describe on-line fraud and different crimes committed online as discussed in the lecture notes. 3. Why are employees the most vulnerable component in the theft or loss of confidential information? 4. Describe the four eras of computer viruses as discussed in the lecture notes. attachment Berkeley_Spring2016_JUS403_ch41.doc attachment JUS403_Sp_2016_ppt_ch41.ppt.

1. Describe how the combination computers and telecommunications has increased crime in cyber space as discussed in the lecture notes.
2. Describe on-line fraud and different crimes committed online as discussed in the lecture notes.
3. Why are employees the most vulnerable component in the theft or loss of confidential information?
4.  Describe the four eras of computer viruses as discussed in the lecture notes.
  • attachment

    Berkeley_Spring2016_JUS403_ch41.doc
  • attachment

    JUS403_Sp_2016_ppt_ch41.ppt

1. Describe how the combination computers and telecommunications has increased crime in cyber space as discussed in the lecture notes. 2. Describe on-line fraud and different crimes committed online as discussed in the lecture notes. 3. Why are employees the most vulnerable component in the theft or loss of confidential information? 4. Describe the four eras of computer viruses as discussed in the lecture notes. attachment Berkeley_Spring2016_JUS403_ch41.doc attachment JUS403_Sp_2016_ppt_ch41.ppt