activity2-Questions
docx
keyboard_arrow_up
School
Northern Virginia Community College *
*We aren’t endorsed by this school
Course
276
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
4
Uploaded by AgentOxide13865
Activity 2
“Criminals in Cyberspace” Video Questions
Write complete sentences for credit!
1.
What is “Michelangelo”? Where did it hit the hardest?
Answer. The FBI has sent out a nationwide advisory regarding the computer virus known as "Michelangelo". In contrast to the masterworks by the renowned artist on the Sistine Chapel ceiling, this virus is a dangerous program that is scheduled to run on a particular day. It struck forcefully, spread quickly,
and mostly affected hundreds of pharmacists' PCs in South Africa. The destructive potential of the Michelangelo virus in the digital realm is evident, as about 1,350 PCs in the area have already sustained damage from it.
2.
What was the Hitachi/Mitsubishi scandal mentioned in the video?
Answer. In the video was mentioned that the FBI called the Hitachi/Mitsubishi controversy a possible historical case of industrial espionage. Of the 21 charges, 13 were from Hitachi and five from Mitsubishi. Corporate espionage has increased by 142% annually and 500% in the last six years, bringing attention to the growing trend of computer crime.
3.
Who is Markus Hess? Why was he significant?
Answer. In West Germany, 28-year-old computer programmer Markus Hess was accused of hacking. His involvement in hacking activities that attracted the attention of German and US authorities is what makes him significant.
4.
What on the black market was more valuable than drugs?
By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited.
Activity 2
Answer. On the black market, computer chips were mentioned as being more valuable than drugs, pound for
pound.
5.
Who is David Lamacchia?
Answer. David LaMacchia was a Junior at MIT. He was charged with a crime after allegedly permitting copies of $1 million worth of commercial software to be copied from his computer bulletin board.
6.
What went wrong with the release of the DeScribe software program?
Answer. When hackers published the DeScribe software tool for free online without the developer's permission, it became viral and caused problems.
7.
What is the estimated loss from stolen Intellectual Property each year? Answer. The estimated loss from stolen Intellectual Property each year in the United States between $5 and 25 billion from software industry alone.
8.
What happened to the National Weather Service? Answer. Hackers were able to access the computer data of the National Weather Service during a cyberattack. The hackers accessed sensitive and private data without authorization. The National Weather Service's backup mechanism fortunately prevented more serious outcomes because the hackers were on the verge of damaging or shutting down the computer systems.
9.
What is “Innocent Images”? Answer. The Innocent Images is s FBI investigation aimed to stop child pornography using computers.
10. What is the Communication Decency Act? What year was it implemented? By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited.
Activity 2
Answer. Concerns over the availability of pornography on the internet led to the creation of the
Communication Decency Act in February 1996. The purpose of this act was to outlaw the online
transmission of pornographic material.
11. Why did computer investigations start out as a federal duty?
Answer. Because local domestic law enforcement organizations frequently lack the resources, expertise, and
equipment necessary to respond to computer-related offenses adequately, computer investigations start as a federal duty.
12. What is CERT? What does it do? Answer. CERT stands for Computer Emergency Response Team. Specialized groups or teams known as CERTs are tasked with handling and reacting to cybersecurity issues. Their main goal is to help and support people in managing and lessening the effects of assaults, vulnerabilities, and dangers related to cybersecurity.
13. Who is in charge of the internet? Answer. The internet is not governed by anyone. A network manager does not exist. At the internet level, there is no network administration.
14. What is the Information Warfare Center? Answer. The Central Intelligence Agency, or CIA, is behind the Information Warfare Center. The center was founded to handle information warfare-related issues, emphasizing new risks brought about by evolving
technology.
15. What computer related laws were added in 1996? By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Activity 2
Answer. Related laws that were added in 1996 were electronic blackmail and other crimes to federal computer crime laws.
By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited.