Identify and describe some of the malware employed by terrorist,
hacktivists, corporate spies, criminals, and pleasure seekers.
Review the material in the textbook related to the question. You may also want to use other sources to
help you answer the question, but the primary source for answering the question should be your textbook.
The faculty wants to be sure you understand the concepts covered in the textbook.
BCJ230 – Criminal Investigation
Criminal Investigation
Charles A. Lushbaugh, Paul B. Weston, 2012
Prentice Hall
ISBN.13: 978-0-135-11051-5