Class 3 : Liability Unique to Digital Context Flashcards

1
Q

Classic Attack Categories

A
  • *Confidentiality - Exposing a secret
  • *Integrity - Making changes
  • *Availability - Denying access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Electronic Harassment CL 3-805

A

Includes
- E-mail Harassment
AND
-Cyber Bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electronic communication”

A

means the transmission of information, data, or a communication by the use of a computer or any other electronic means that is sent to a person and that is received by the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Fraud and Abuse Act (CFAA) - 18USC 1030

A

(a) Whoever–
(2) intentionally accesses a computer without authorization or exceeds authorized access, and there by obtains
(c) information from any protected computer

shall be punished as provided in subsection (c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a “computer” under the CFAA?

A

If a device is “an electronic . . . or other high speed data processing device performing logical, arithmetic, or storage functions,” it is a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

protected computer

A

computer exclusively

  • *for the use of a financial government, or the united states Government or that use is affected
    • used in or affecting interstate or foreign commerce or communication

**computer connected to the internet can be said protected computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exceeds Authorized Access

A

means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fraud and related activity in connection with computers

A

Obtaining National Security Information (a)(1) 10 (20) years

Accessing a Computer and Obtaining Information (a)(2) 1 or 5 (10)

Trespassing in a Government Computer (a)(3) 1 (10)

Accessing a Computer to Defraud & Obtain Value (a)(4) 5 (10)

Intentionally Damaging by Knowing Transmission (a)(5)(A) 1 or 10 (20)

Recklessly Damaging by Intentional Access (a)(5)(B) 1 or 5 (20)

Negligently Causing Damage & Loss by Intentional Access (a)(5)(C) 1 (10)

Trafficking in Passwords (a)(6) 1 (10)

Extortion Involving Computers (a)(7) 5 (10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

18 USC 1030 (a) (1)

A

knowingly access a computer without authorization
obtained protected information
with reason to believe it could hurt the United States
And keeps it or delivers it to anyone not entitled to receive it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an injunction

A

A court order telling someone to stop doing something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly