Diaz_Lab3

pdf

School

Valencia College *

*We aren’t endorsed by this school

Course

2414C

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

4

Uploaded by KidGrasshopper3117

Report
Lab 3: Cybercrime Investigations Instructions: Read each question and answer according to each section. The answers can be found in Chapter 4 of Cybercrime: The Investigation, Prosecution and Defense of a Computer related Crime by Ralph D. Clifford . Section 1: Matching: Match the Case (Letters A- H) to the corresponding questions (1-8). Answers will only be used once. A) United States v. Mitra B) United States v. Morris C) United States v. O Brien D) United States v. John E) United States v. Ivanov F) United States v. Hsu G) United States v. Weaver H) United States v. Poehlman Question 1: In __________, the First Circuit upheld a sentencing enhancement of two levels based on computer knowledge, which the court found constituted special skills, warranting the enhancement. Question 2: In __________, the defendant was convicted for intentionally accessing a federal interest computer and thereby causing damage after releasing a destructive program onto the Internet. Question 3: In __________, the court concluded that the defendant obtained something of value within the meaning of Section 1030 (a)(4) when he obtained root access to a protected computer. Question 4: In __________, the U.S. District Court for the Central District of Illinois held that under the Stored Wire and Electronic Communications Act and the Wiretap Act, a court may compel an Internet Service Provider to comply with a subpoena and produce the contents of its subscriber s email.
Question 5: In __________, the defendant, while searching alternative lifestyles Internet sites for adult companions, encountered a government agent posing as a mother seeking a sexual mentor for her three daughters. Question 6: In __________, the defendant was convicted for interfering with a computer-based emergency services communication system. Questions 7: In __________, an employee of one company sent an email to an employee of a competitor s company, which outlines and requested information relating to the competitor s technology. Question 8: In __________, the court held that exceeding authorized access can include exceeding the purposes for which access is authorized. ’” Section 2: Fill in the Blank. Using the word bank provided below, fill in the answer to questions 9-16. Answers will only be used once. WORD BANK Section 1030 (a)(3) Section 1030 (a)(4) Pure Hackers Section 1030 (a)(7) Section 1030 (a)(6) Section 1030 (a)(5) Operation Web Snare Identity Theft Penalty Enhancement Act (ITPEA) Question 9: __________ prohibits online extortion through the transmission of any threats to cause damage to obtain information from, to impair confidentiality of information obtained from, or to demand something of value in relation to damage of a protected computer with the intent to extort something of value. Question 10: __________ is the principle anti-hacking subsection in the CFAA. Question 11: Under __________, the CFAA protects government computers and prohibits intentionally accessing a nonpublic computer of a U.S. department or agency without authorization. Question 12: The __________ adds two years to the prison sentence received by any individual convicted of an enumerated felony who knowingly and without lawful authority transfers, possesses, or uses a means of identification of another person.
Question 13: __________ was the biggest federal crackdown on cybercrime to date. It included more than 160 investigations, 140 search and seizure warrants, and the arrest or convictions of more than 150 individuals. Question 14: In __________ the CFAA prohibits trafficking in passwords that could be used to access a protected computer, where it is done knowingly and with intent to defraud. Question 15: __________ prohibits access to a protected computer, without or in excess of authority, with the intent to defraud or obtain anything of value. Question 16: __________ are outsiders who access systems, without any authorization, for their own interest and not for economic profit, and traditionally lack the criminal intent to damage systems. Section 3: Short Answer: Read the questions and in 1-2 sentences answer the questions in the text boxes provided, as stated in the textbook. Question 17: An offender will be liable under section 1030(a)(5) if the defendant conducts damage that: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ 3._________________________________________________________________ __________________________________________________________________ 4._________________________________________________________________ __________________________________________________________________ Question 18: Section 1832 of the EEA requires the government to establish that: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3._________________________________________________________________ __________________________________________________________________ Question 19: Section 1202 of Title 17 protects against the concealment of copyright infringement caused by tampering with copyright management information (CMI). CMI includes: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ 3._________________________________________________________________ __________________________________________________________________ 4._________________________________________________________________ __________________________________________________________________ Question 20: To prove copyright infringement after the enactment of the NET Act, the prosecution must show: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ 3._________________________________________________________________ __________________________________________________________________ 4._________________________________________________________________ __________________________________________________________________