an outbreak of a computer virus, known as the Melissa virus: Which legal justification should be used by the FBI to pursue this matter?

Cyber-Security
Paper, Order, or Assignment Requirements

. Recently, there was an outbreak of a computer virus, known as the Melissa virus. The FBI is determining whether the virus meets the requirements in the criminal code for an investigation. Which legal justification should be used by the FBI to pursue this matter?

Creation of computer viruses are illegal.
Approval from Microsoft was not granted using Microsoft’s Outlook program to spread the virus.
The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

As a systems administrator, where can you go, On-Line, to obtain solutions to computer viruses.
Federal Bureau of Investigation (FBI)
National Security Agency
Carnegie Mellon’s Computer Emergency Response Team (CERT)
John’s Hopkins Applied Physics Laboratory

The Electronic Communications Privacy Act includes all of the following statements except:
Forbids trespass by all persons and businesses, not just government, where they “obtain or alter data, or prevent authorized access
Requires intent to defraud
Does not require a specified minimum dollar value of damages
Up to one year in prison and US$ 250K fines if for personal or commercial gain

In 1992, Federal law enforcement agents arrested five members of a hacker group. They were charged with breaking into the personnel department’s computer system and changing some evaluations. What was the computer security threat in this scenario?
Fraud
Data Modification
Theft

The article “Tale of a Virus Attack” emphasizes which aspect of Information Security?
Legal Issues
Risk Management
Response and Recovery
Access Control

Select the security service not provided by PKI technology.
Non-repudiation
Digital Signatures
Biometric I&A
Key recovery capability

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"