Feb 8 by
a file upload
Feb 2 at 12am - Feb 8 at 11:59pm
This assignment was locked Feb 8 at 11:59pm.
Answer the following questions.
1. What are some of the malware employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?
2. Discuss various methods of the criminal theft of information or data manipulation.
3. Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.
4. Discuss the process of money laundering and the methods of combating it in the computer era.
You've already rated students with this rubric. Any major changes could affect their assessment results.