ISSC451_Discussion4

docx

School

American Military University *

*We aren’t endorsed by this school

Course

451

Subject

Law

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by fighters18jfighters18j

Report
Hello everyone, "A Denial of Service attack uses multiple systems to attack one or more systems or websites with the specific intent of denying service." (Shah, 2012) DoS attacks should be illegal because the hacker or criminal could conduct a DoS attack with the explicit purpose of denying service from the moment the hacker or criminal plants a remote-control program on a victim's computer that has internet access. According to the law, you must have three things to prove beyond a reasonable doubt that a crime occurred, which are motive and opportunity. Virus attacks cause a disruption of files and hard drives by copying, destroying, infecting, alters, or takes control of the programs and data associated with system (Schneider, 2012) These types of attacks cause significant disruption to individuals, businesses, governments, and countries as individuals or groups are demonstrating a system can be disrupted and controlled and can potentially reap the benefits of a personal ideological motivations, financial, and political goals and objectives. These types of attacks should be punishable no matter how minor or juvenile the threats are as they can potentially cause significant damage which can be difficult to recover from. Cyberstalking is simply stalking and harassment by using a computer and the Internet. The target is individuals, groups, and even can include an organization. Cyberstalking is sending unwanted messages, and some will even make multiple accounts on social media platforms in order to follow and torment the victim. Offenses that can fall under cyberstalking are the following: slander, defamation of character, solicitation for sex, identity theft, and threats. (Bocij, et al 2012). An example of cyberstalking in 2016 was a college student in Florida harassing another woman in California for a bad choice to do pornography. Multiple calls, texts and emails were sent to the victim over many months until it started to affect the California women’s personal and professional life. The FBI got involved and tracked the Florida student down. She was sentenced to 22 months in prison for cyberstalking. I have attached a link as I could not find a reference. Southern District of Florida | Miami Student Sentenced for Cyberstalking on Facebook and Instagram | United States Department of Justice Ways to protect oneself from cyberstalking or exploitation can include: Not sharing personal information on social media platforms Be aware of who you add and talk to on social media. Don't share your location on social media. Change passwords regularly and make sure they are secure. Make sure to report any unwanted or solicited messages and save all data and evidence so that you can have that available to law enforcement if one was to involve them (Bhasin, Mehta, 2019). John Caldwell References: Bhasin, D., & Mehta, A. (2019). Cyber Stalking: New Age Terror. Int'l JL Mgmt. & Human., 2, 320. Bocij, P., Griffiths, M. D., & McFarlane, L. (2002). Cyberstalking: A new challenge for criminal law.   The Criminal Lawyer ,   122 , 3-5.
Schneider, J. (2012). Haraway's Viral Cyborg.   WSQ: Women's Studies Quarterly ,   40 (1), 294-300. Shah, P. G. (2012). Network security protocols for wireless sensor networks: a survey.   Australian Journal of Wireless Technologies, Mobility and Security ,   1 (1), 1-12.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help