Using this week’s required resources as a general conceptual starting

Using this week’s required resources as a general conceptual starting point, reconstruct an existing cybersecurity-related law or policy to better protect the general public from cybercrime.  As you do so, please be sure to apply the underlying facts, procedures (legal, ethical and/or technical), and concepts that you believe are relevant to your reconstruction idea.    

Example:  Use as example only!

Hello Class,

The law I find to be most relevant to discuss this week is the Computer Fraud and Abuse Act (CFAA) (18 U.S.C. §1030).  When it comes to cybercrime, CFAA is what can be used to prosecute individuals that commit cybercrimes. The law covers down on most cyber threats in a broad since. What I mean is the law leaves open the possibility to prosecute individuals for the resulting act and not necessarily the tool or technique used. This is not a bad thing because it helps the law stay applicable when cybercrime methods adapt overtime.

When it comes to the level of punishment that an individual might face under CFAA, I would say it is acceptable, but I would make sure that a level of additional monitoring on the charged individual is in effect on their computer usage. This might seem to be a breach of privacy, but it would be a part of their sentence. Similar to how individuals have tracking monitors on them when they are placed on house arrest, the tracking monitoring would be placed on their computers. To deter individuals from just going to an internet cafe or library, I would make it where if they do not report their usage of network accessible devices prior to usage with their IP address and Mac Address then they could face additional penalties or lose access to any computer device (Findlaw’s Team, 2019).

I believe the eight categories that CFAA charges can fall in are an accurate level of ranging high to low threats committed or attempted. The charges and outcomes should be based on the level of category that is committed. For example, the apprehension of Nation Security information should be seen as the most threatening of the bunch and should result in the highest penalties. This seems to be the case due to the level of misconduct being based on the amount of harm caused, which is determined by the Federal sentencing guidelines (Litvak, 2022).

If I could alter CFAA in any way, it would be to alter the level of power the law has under civil offenses. It seems that it has become a tool to threaten individuals that might have had goodwill intensions of helping individuals know they have issues with their coding and security. For example, Mike Lynn who discovered security vulnerabilities in Cisco’s IOS software. This vulnerability acted as a backdoor to Cisco’s products and could affect their customers which had implemented this IOS. Due to Cisco being afraid this might get released to the public and result in new cyber threats, they attempted to use the CFAA is a tool to threaten him from releasing his findings. This issue with CFAA in civil offenses is it does not require the same level of proof and damning evidence to try to charge individuals with it. I think the law is good in a general sense, but it needs to provide a level of protection to individuals like Mike Lynn which ultimately got bullied into not releasing his research. Now, I understand his finding could have been harmful to Cisco, but it could have been handled better without involving the CFAA. It might be a tricky addition to the law and possibly outside of its general purpose, but I would add penalizing guidelines to individuals that attempt to use the CFAA in civil cases without plausible cause.

Thank you for reading my post, everyone. Have a good rest of the week!

V/R 

Brian Allum

References:

Findlaw’s Team (Ed.). (2019, May 2). Hacking laws and punishments. Findlaw. Retrieved November 30, 2022, from https://www.findlaw.com/criminal/criminal-charges/hacking-laws-and-punishments.html

H.R.4718 – 99th Congress (1985-1986): Computer Fraud and Abuse Act of 1986. (1986, October 16). https://www.congress.gov/bill/99th-congress/house-bill/4718

Litvak, I. (2022, November 1). What are the laws against cybercrime? The Litvak Law Firm. Retrieved November 30, 2022, from https://nyccrimelawyer.com/what-are-the-laws-against-cybercrime/

Parikh, D. (2017, March). Organized cybercrime and the state of user privacy – IJIRST. http://www.ijirst.org/. Retrieved December 1, 2022, from http://ijirst.org/articles/SALLTNCSP035.pdf

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

patient file

Your final project for this course will be a patient record analysis. You will apply the knowledge of anatomy, physiology, and pharmacology that you have developed during this course in a thorough review of existing patient information in the Final Project Patient File. Specifically, you will review a patient’s history

610 6-1 Discussion: Improve, Part Two—Mitigating Unwanted Consequences

 The Essential Workplace Conflict Handbook. Including the IMPROVE Supplementary Document. Next, in your initial post, address the following: • In what ways do you perceive the Improve phase as being informed by the other phases of DMAIC that you have worked with in the course thus far? • How can

Code of conduct

 For this assignment, Write a paper about employee codes of conduct using information from your textbook and at least two other scholarly sources. First, research employee codes of ethics, especially for the medical field. Next, find some examples of employee codes of ethics from medical facilities and choose the one

Human Growth and Development

Scenario: Simon Whitaker is 42 years old and has suffered from mental illness since his late teens. He lives in a flat in a large housing estate. He lost his job as a warehouse cleaner after he was admitted to hospital the last time he became ill, two years ago.

Exporting Security

Write a 2 page argumentative essay on the links provided below. Link 1: https://www.airuniversity.af.edu/SSQ/Book-Reviews/Article/1292320/exporting-security-international-engagement-security-cooperation-and-the-changi/ Link 2:https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review Link 3: https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review #Exporting #Security

Organizational culture and values

 Details: Prepare a 10-minute presentation (10-15 slides, not including title or reference slide) on organizational culture and values. Describe how alignment between the values of an organization and the values of the nurse impact nurse engagement and patient outcomes. Discuss how an individual can use effective communication techniques to overcome

Document Analysis

Document Analysis (5% – c. 500 words) Primary sources are writings that were produced by individuals or groups at the time of the historical events or issues that they deal with. A number of such documents have been placed on Blackboard, organized by course unit. This assignment requires you to

M3D1: Big Data

The discussion will examine the social interaction of participants regarding an issue or situation and its impact on research data. This discussion addresses the following module outcomes: •MO1: Become familiar with the process of conducting marketing research methods and research tools •MO2: Review the process marketers use for identifying and

Case Study 1 and 2 Pneumonia and Addison diseases

Review the case study and answer all questions with a scholarly response using APA and include 2 scholarly references. Answer both case studies on the same document and upload 1 document to Moodle. Case Studies will be uploaded to Moodle and put through TURN-It-In (anti-Plagiarism program) Turn it in Score

Should schools ban unhealthy snack machines?

 Your outline should include: An explanation of the controversial issue, why is it controversial? Identify which position or side you will take in your paper, and explain why. If you don’t agree with the position you are taking discuss how this could affect your argument on the topic. If you

The Outcome of Inequality of Wealth and Income

Research Topic: Submit an idea for a research study based on a business/economic problem. • Write the title of the study. • Explain your overarching aim for the study. • What is the problem? • What is the significance of it? • Draft at least two research questions. Due 1/27

“practice of professional engineering”

1. “practice of professional engineering” means any act of planning, designing, composing, evaluating, advising, reporting, directing or supervising that requires the application of engineering principles and concerns the safeguarding of life, health, property, economic interests, the public welfare or the environment, or the managing of any such act; (“exercice de

Curriculum Development and Evaluation

 Learning Materials: Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapter 13) Books are on website Vital Source user name is sred9196@yahoo.com, the password is Bungalow9@ • Exercise #1: Address an educational need among nursing staff at a health care agency. In the

Epidemiology and Surveillance

Research the public health agency in Chicago, IL and develop a presentation on its structure, response capabilities, surveillance tools, and role in emergency management. In your response, include a description of the community served by the department (Chicago), its emergency response structure, surveillance systems that are used at hospitals, biohazard

General Psychology Application

 General Psychology Application Essay Over the course of the class, we have discussed a number of different psychological concepts and theories. For your paper you will be asked to connect a real life experience or observation with a concept or theory from lecture and/or your textbook. Your assignment should include

Issues and Trends in Curriculum Development

 Learning Materials: • Iwasiw, C., Goldenberg, D., & Andrusyszyn, M. (2009). Curriculum development in nursing education (2nd ed.). Boston: Jones & Bartlett. (Chapters 13 and 14) • Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapters 16 and 17) PowerPoint • Chapter 13

Foundation of Nursing Module 2.1 ( Discussion)

Module 2.1 – Discussion Nursing Theories and Theorists Instructions: After reading the assigned chapters, please post two discussion questions based on the readings along with your answers to the following questions: Did any of the theories or theorist influence your own personal theory of nursing; and consequently, your own view