Diaz_Lab4

pdf

School

Valencia College *

*We aren’t endorsed by this school

Course

2414C

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

4

Uploaded by KidGrasshopper3117

Report
Lab 4: Cybercrime Investigations Instructions: Read each question and answer according to each section. The answers can be found in Chapter 5 of Cybercrime: The Investigation, Prosecution and Defense of a Computer related Crime by Ralph D. Clifford . Section 1: Matching: Match the offense (Letters A- E) to the corresponding examples (1-5). Answers will only be used once. A) Title 1, Articles 2-6, Offenses against the confidentiality, integrity and availability of computer data and systems. B) Title 2, Articles 7-8, Computer related offenses C) Title 3, Articles 9, Content-related offenses D) Title 4, Article 10, Offenses related to infringements and related rights E) Title 5, Article 11-13, Ancillary liability and sanctions Question 1: __________, examples would be: computer-related forgery and computer-related fraud. Question 2: __________, examples would be: attempt and aiding or abetting, corporate liability, and sanctions and measures. Question 3: __________, examples would be: offenses related to child pornography. Question 4: __________, examples would be: illegal access, illegal interception, data interference, system interference, misuse of devices. Question 5: __________, examples would be: offenses related to infringement of copyright and related rights. Section 2: Fill in the Blank. Using the word bank provided below, fill in the answer to questions 6-16. Answers will only be used once.
WORD BANK Ribikoff Council of European Cybercrime Convention (CoE Convention) Definitional Terms Territorial Borders Article 18 Computer Data Article 22(1)(a) Article 35 Ubiquity Doctrine Article 19 Computer System Question 6: The most complicating feature in the international arena is the commission of the offense conduct across the __________ of sovereign nations, often by the mere click of a button. Questions 7: U.S. Senator __________, introduced the first piece of cybercrime legislation in the U.S. Congress in 1977. Question 8: The __________ is the first and only multilateral treaty to address computer-related crime and evidence gathering. Question 9: The United Nations identified uniformity in law and consensus over __________ as two of the impediments that had to be overcome in order to achieve meaningful cooperation and successful enforcement of the CoE Convention. Question 10: A __________ is defined as a device consisting of hardware and software developed for automatic processing of digital data. Question 11: A __________ means any representation of facts, information or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function. Question 12: __________ of the CoE Convention, addresses the hugely problematic absence in many jurisdictions of laws permitting the seizure of intangible objects, such as stored computer data, which is generally secured by seizing the data medium on which it is stored. Question 13: __________ of the CoE Convention provides that each party shall adopt legislative measures to establish jurisdiction to prosecute the offenses listed in Articles 2-11 where committed in its territory. Question 14: Under __________ of the CoE Convention, a party must be able to order a person within its territory, including third party custodian of data, such as
an ISP, to produce data, including subscriber information, that is in the person s possession or control. Question 15: __________ of the CoE Convention requires each party to designate a point of contact available on a 24 hours, 7 days per week basis. This ensures co- operation in the investigation of crimes, collection of evidence or other such assistance. Question 16: Under the __________, a crime is deemed to occur in its entirety within a country s jurisdiction if one of the constituent elements of the offense, or the ultimate result, occurred within that country s borders. Section 3: Short Answer: Read the questions and in 1-2 sentences answer the questions in the text boxes provided, as stated in the textbook. Question 17: Historically, the practical impediments to enforcement and prosecution include (name only 4): 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ 3._________________________________________________________________ __________________________________________________________________ 4._________________________________________________________________ __________________________________________________________________ Question 18: The CoE Convention provides a treaty-based framework that imposes three necessary obligations on the participating nations to: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ 3._________________________________________________________________ __________________________________________________________________
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Question 19: The CoE Convention consists of forty-eight articles divided among four chapters; those four chapters are: I. ______________________________ II. ______________________________ III. ______________________________ IV. ______________________________ Question 20: Chapter III of the CoE Convention addresses traditional and cybercrime related mutual assistance obligations as well as extradition rules. Traditional mutual assistance is covered in two situations: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________