UNIVERSITY EXAMINATIONS: 2018/2019
EXAMINATION FOR THE DEGREE OF BACHELOR OF APPLIED
COMPUTING
BAC3215 CYBER CRIMINOLOGY
FULL TIME/PART TIME
DATE: APRIL, 2019 TIME: 2 HOURS
INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions.
QUESTION ONE
a) Data encryption is considered as a good practice when sharing information online.
However, some of the Cyber offenders use this technology to hide their bad deeds from
the legal laws. Having this in mind;
i) Define the term data encryption (2 Marks)
ii) Briefly discuss how this technology hinders criminal investigations.(10 Marks)
b) Explain how cyber forensics can be used in criminal investigation to find Cyber offenders
such as child pornography. (10Marks)
c) Explain how viruses, Trojan horses and spams are acts of crime indicating how they
violate reliability and availability of computer systems. (8Marks)
QUESTION TWO
a) Describe computer as a tool for committing crimes. (8Marks)
b) Briefly discuss any four types of Cybercrime. (8 Marks)
c) Discuss factors encouraging cybercrime (4Marks)
QUESTION THREE
a) Explain briefly why ethical hacking is necessary. (6 Marks )
b) Outline the technical and non-technical skills of an ethical hacker (6 Marks)
c) Even when everyone acknowledges that a computer crime has been committed, computer
crime is hard to prosecute. Explain four reasons why it is hard to prosecute computer
crimes. (8Marks)
QUESTION FOUR
a) Explain how the Internet has transformed traditional crimes. (6Marks)
b) Briefly explain the reasonable expectation of privacy in computers as storage devices
(6 Marks)
c) State and explain the various techniques used by hackers when penetrating a network of
an organization ( 8 Marks)
QUESTION FIVE
With reference to the Computer Misuse and Cybercrimes Act;
a) Discuss the purposes and objectives of the Act (10 Marks)
b) Explain the Establishment, Composition and Functions of the National Computer and
Cybercrimes Co-ordination Committee (10 Marks)