Question 1
Cyber criminal activities started in the 1960s when MIT train enthusiast realized that they could alter the operations of their model trains (Power, 2017). This realization led to the creation of the term hacking which means the ability to find a faster and non-conventional way of making things work faster. This activity led to the advent of computer hacking early computers by hacking and changing their codes use I early computer programs in 1961. In 170s, the malicious hacking into computers became more pronounced when cybercriminals realized that they could hack pho calls by making long distance calls. Phreakers came across the right codes, combed through the bell telephone company, impersonated operators and made several illegal phone calls just to find out how they could alter the entire phone system (Power, 2017).
The 1980s and 990s are considered the golden era in hacking as many people gained access to computers for personal use. Hacking changed from being a fun activity to a criminal act. Children were able to gain access to different computers for the fun of it. They also accessed other computers illegally as they were playing games. Hackers from the 1990s to current generation have gone to the highest levels in hacking. They have access to government information, bank details, personal information and they can literally gain access to any computer (Power, 2017). They have the knowledge, skills, and ability to create malware and programs that allow them to do this.
Delegate your assignment to our experts and they will do the rest.
Question 2
The “new cybercriminal” is a term used to describe current cybercriminals who use different sophisticated methods t gain access to computers, government information, company information, and ban statements among other things (Power, 2017). The new cyber criminal uses sophisticated malware and programs to help them gain access to their target audience. They also have the ability to seal their trails thus making it hard for law enforcement officers to find them with ease.
Question 3
The 1960s–1990s: THE MIT train model enthusiast realizes that they can alter the operations of their train by changing some of its codes. Hackers used the IBM 704 computer to further their hacking activities (Power, 2017). In the 1970s, hacking entered the phone world and criminals realized that they could use codes to make long distance phone calls. In the 1980 more sophisticated hackers emerged. They were more concerned with creating viruses, hacking system to steal sensitive information, and pirating software.
In the 1990s, hacker became more notorious they launched the first computer worm, conducted the first digital bank heist, and stole propriety software (Power, 2017). This is the time when law enforcement officers made most high profile hackers arrests such as Robert Morris, Kevin Mitnick, and Vladimir Levin among others. In the 2000s, criminals became even more ambitious. They used their technical skills and knowledge to create malware, spyware, and other software that can be used to access public and private information. Both the government and big companies such as Amazon, eBay, and business firms such as Walt Disney became victims of hacking (Power, 2017). The 2010s to date have also seen a significant rise in cybercriminal activities such as the creation of dark web, cyber bullying, and other sophisticated criminal activities.
Question4
Digital evidence refers to information transmitted or stored in binary form and may be used in a court of law (Power, 2017). Examples include computer and laptop hard drives, flash drive, PDA, mobile phones and CD among others.
Question 5
Hacking is the term used by cyber criminals to refer to the act of altering the operations of computers (Power, 2017). Many times hackers come up with programs that change how a computer works to enable them to get access to given types of information.
Question 6
By the 1980s, the FBI was catching up with many hackers who ad illegal access to organizational and government computers and thus stealing information. Therefore, Congress decided to pass the Computer Fraud and Abuse Act which made hacking a crime, illegal, and punishable by law (Floridatech, 2018). The punishment included long jail terms and payments of large amounts of money.
References
Floridatech. (2018). A brief history of time. Florida : Floridatech.com. Retrieved from https://www.floridatechonline.com/blog/information-technology/a-brief-history-of-cyber-crime/.
Power, K. (2017). The Evolution of Hacking. Portland, OR: The TripWire.com. Retrieved from https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-evolution-of-hacking/.