Updating search results...

Search Resources

41 Results

View
Selected filters:
  • Hostos Community College
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Law
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
04/01/2020
Cybersecurity-Corporate Espionage
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The goals of this team activity in the area of criminal law, cybersecurity and cyber crime are to facilitate team work, critical thinking and presentation skills. Students will be grouped into two teams. As a team, they will analyze cases about corporate espionage committed by nation states and industry competitors through the questions presented in the activity. They will present their analysis to the class.

Subject:
Applied Science
Computer Science
Law
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
07/04/2020
Cybersecurity-Cybercrime-The Legal Environment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.

Subject:
Applied Science
Computer Science
Criminal Justice
Information Science
Law
Social Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
07/04/2020
Cybersecurity-Fake News
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.

Subject:
Applied Science
Arts and Humanities
Computer Science
Law
Philosophy
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
07/04/2020
Cybersecurity-Online Identity Theft
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.

Subject:
Law
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
07/04/2020
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Engineering
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
04/01/2020
Cybersecurity-The Internet of Things
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.

Subject:
Applied Science
Computer Science
Law
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
07/04/2020
Cybersecurity-The Silk Road Market
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.

Subject:
Applied Science
Computer Science
Law
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Ramson, Amy J
Date Added:
07/04/2020