1. Discuss the challenges Law Enforcement faces in dealing with computer crime.
2. Describe the history of computers.
3. Describe the three different types of hackers listed in the lecture notes.
4. Describe on-line fraud and the different crimes committed on-line.
5. Why are employees the most vulnerable component in the theft or loss of confidential information
6. Describe Phishing as discussed in the lecture notes.
7. Define cyberterrrorism.
8. Compare and contrast organized crime gangs and cyber gangs.
9. Describe the different types of cyber terrorist threats.
10. Discuss the international efforts to address cyber crime.