Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.

Similar presentations


Presentation on theme: "1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall."— Presentation transcript:

1

2 1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall

3 2 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

4 3 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 (http://www4.law.cornell.edu/uscode/18/1030.html)http://www4.law.cornell.edu/uscode/18/1030.html Enabling Legislation  Computer Fraud and Abuse Act of 1986  National Information Infrastructure Protection Act of 1996  Homeland Security Act of 2002 Prohibitions  Criminalizes intentional access of protected computers without authorization or in excess of authorization (Hacking)

5 4 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 Prohibitions  Criminalizes the transmission of a program, information, code, or command that intentionally causes damage without authorization of a protected computer (Denial-of-Service and Viruses)

6 5 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 18, Section 1030 Punishment  For first offenses, usually 1-5 years; usually 10 years for second offenses  For theft of sensitive government information, 10 years, with 20 years for repeat offense  For attacks that harm or kill people, up to life in prison

7 6 Figure 12-1: Laws Governing Hacking U.S. National Laws  Title 47 Electronic Communications Privacy Act of 1986 (ECMA) Prohibits the reading of information in transit and in storage after receipt  Other federal laws for fraud, etc.

8 7 Figure 12-1: Laws Governing Hacking U.S. State Laws  Federal laws only protect some computers  State laws for purely intrastate crimes vary widely

9 8 Figure 12-1: Laws Governing Hacking Laws Around the World Vary  The general situation: lack of solid laws in many countries  Cybercrime Treaty of 2001  Signatories must agree to create computer abuse laws and copyright protection  Nations must agree to work together to prosecute attackers


Download ppt "1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall."

Similar presentations


Ads by Google