Malware employed by terrorists
- What are some of the malware employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?
- Discuss various methods of the criminal theft of information or data manipulation.
- Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.
- Discuss the process of money laundering and the methods of combating it in the computer era.