WeekThree Discussion Question #1 Pleasesubmit your individual responses to this discussion question (DQ) by Thursday, January 17, here in the Main > forum where we will discuss them as a class.The DQ...

1 answer below »

WeekThree Discussion Question #1Pleasesubmit your individual responses to this discussion question (DQ) byThursday, January 17,here in the
Main> forum where we will discuss them as a class.The DQ responseshould be between 500 words, and grammar and spelling are important. Please make sure to proofread carefully!#1.What are the primary federal laws that target Internet exploitation and Internet crime? Give examples. In your opinion, do you think the laws we have in place are effective for combating cyber crime across the spectrum? Why or why not?
Pleasesubmit your individual responses to this discussion question (DQ) bySaturday,January 19
,here in the
Main> forum where we will discuss them as a class.The DQ responseshould be between200-300 words, and grammar and spelling are important. Please make sure to proofread carefully!
#2.What do you believe to be the primary challenges that law enforcement agencies must face in investigating cyber exploitation and cyber crime? What efforts must be made to help overcome these challenges?




I need 500 words for each question a total of 1000 words


Answered Same DayDec 22, 2021

Answer To: WeekThree Discussion Question #1 Pleasesubmit your individual responses to this discussion question...

Robert answered on Dec 22 2021
126 Votes
1) Primary Federal Laws against Internet exploitation & Internet crime
Cybercrime refers to criminal activity that involves the use of a computer and the
internet. These cr
imes cover a very large and diverse range of offenses.
The cybercrime is broadly divided into two general categories:
1) The unlawful use of computer hardware, peripherals, and software for criminal
activities.
2) Use of computer network or device for the purpose of hacking viruses, worms,
bugs, etc.
Cybercrimes have been first cited way back in 1972 (the case of captain crunch).
Since then many laws have been framed to control internet crimes.
There are nine different types of internet crimes identified.
The following are some of the federal laws framed against cybercrime:
First law
The first law states that the use of communication wires with an intention to commit
crime or fraud.
Computer Fraud and Abuse Act
The Computer Fraud and Abuse act states that the unauthorized use of computer or its
peripheral. The basic problem with CFAA is that it requires proof that the person
accessed the computer without authorization.
The National Information Infrastructure Act (NIIA)
NIIA is extension concept of CFAA .it is framed to protect the computer access and
authorization from unauthorized parties.
CFAA focus on seven types of computer activities:
(1) The unauthorized access to get information related to national security,
(2) The unauthorised access to vital information such as financial or credit
information,
(3) Use of federal government computers without permission,
(4) Accessing computer intentionally for committing fraud,
(5) Damaging a protected computer;
(6) The hacking of vital information...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here