Cyber law paper revetment (paper is written just need a few things added and proofread)

Anonymous
timer Asked: Dec 29th, 2018
account_balance_wallet $15

Question description

Need help finishing my term paper.

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts and reading.



The Term Paper is due at the end of Week 8. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. You are to follow APA Guidelines for citing and referencing sources. Your paper must be in your own words, representing original work. Paraphrases of others' work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.

When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper following APA guidelines.

  1. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  2. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.


Running Head: COMPUTER FRAUD AND ABUSE ACT OUTLINE 1 Title: Computer Fraud and Abuse Act Thesis: The Computer Fraud and Abuse Act cover several kinds of criminal activity or criminal behavior. The criminal activities covered comprise acquiring national security data, compromising privacy, accessing to deceive and gain value, trespassing within a government computer, destroying information or computer, and intimidating to destroy computers. I. Introduction: The Computer Fraud and Abuse Act is a rule decreed during 1986 by the Congress as a rectification to prevailing computer fraud act that had been integrated within the Comprehensive Crime Control Act of 1984 (Kosseff, 2017). Congress incorporated within the CFAA a stipulation that criminalizes traffic in passwords and comparable items. Several times, the act has been amended including during 2001 by the Patriotic Act and during 2008 by the Identify Theft. II. Topic Sentences 1. Trespassing in government cyberspace 2. Unauthorized access 3. Intent 4. Affects the use 5. Jurisdiction 6. Penalties III. Background A. The Computer Fraud and Abuse Act is a cyber-security rule which prohibits behavior or activity that victimizes computer systems. B. The act was authored to restrict federal jurisdiction to cases having a compelling interest wherein computers belonging to the federal regime or given monetary agencies are involved or wherein the involved offense is by nature interstate. The CFAA criminalized extra computer associated laws. C. The Act safeguards bank computers, government computers, and computers interconnected to the internet from damage, trespassing, spying, threats, and from being applied corruptly as deception gadgets. D. It is not an all-inclusive provision but rather it fills gaps and cracks in the safety given by other federal criminal acts. IV. Conclusion: The Computer Fraud and Abuse Act is rule decreed by the Congress during 1986 as a rectification to the prevailing computer fraud act that had been integrated within the Comprehensive Crime Control Act of 1984. Its application has considerably increased in the recent past because of the relevancy of the act (Kosseff, 2017). The increased significance of the law began later during 2001 after the Congress adopted a definition of “loss” within the CFAA that made is simpler for private plaintiffs to meet the $5000 threshold for loss or damage. COMPUTER FRAUD AND ABUSE ACT OUTLINE 2 References Kosseff, J. (2017). Cybersecurity Law. New York: Wiley Publishers.
Running head: COMPUTER FRAUD AND ABUSE ACT Computer Fraud and Abuse Act Daryl Snipes Jr American Military University 1 COMPUTER FRAUD AND ABUSE ACT Introduction 2 COMPUTER FRAUD AND ABUSE ACT 3 The Computer Fraud and Abuse Act is a rule decreed during 1986 by the Congress as a rectification to prevailing computer fraud act that had been integrated within the Comprehensive Crime Control Act of 1984 (Kosseff, 2017). The act was authored to restrict federal jurisdiction to cases having a compelling interest wherein computers belonging to the federal regime or given monetary agencies are involved or wherein the involved offense is by nature interstate. The CFAA criminalized extra computer associated laws. Congress incorporated within the CFAA a stipulation that criminalizes traffic in passwords and comparable items. Several times, the act has been amended including during 2001 by the Patriotic Act and during 2008 by the Identify Theft. Thesis: The Computer Fraud and Abuse Act cover several kinds of criminal activity or criminal behavior. The criminal activities covered comprise acquiring national security data, compromising privacy, accessing to deceive and gain value, trespassing within a government computer, destroying information or computer, , and intimidating to destroy computers. Overview of the CFAA The Computer Fraud and Abuse Act prohibit behavior or activity that victimizes computer systems. It is a cyber-security rule (Kosseff, 2017). It safeguards bank computers, government computers, and computers interconnected to the internet. It secures them from damage, trespassing, spying, threats, and from being applied corruptly as deception gadgets. It is not an all-inclusive provision but rather it fills gaps and cracks in the safety given by other federal criminal acts. Trespassing in government cyberspace COMPUTER FRAUD AND ABUSE ACT 4 The law condemns unapproved intrusion such as hacking into computers belonging to federal government whether they are employed entirely by the administration or the government share access with other parties. Unauthorized Access Whereas the query of what amounts to “access with no authorization could seem fairly forthright, Congress was ready to agree to a given level of trespassing by workers of the government in order to safeguard whistleblowers (Kosseff, 2017). Intent This covers any person who intentionally does the described unapproved entry or access into a computer belonging to the government and whose first access was unintentional but who subsequently maintains access following a non-deliberate initial contact. Affects the Use Trespassing on government computer space on computers that not solely for governmental employ is not allowed just when it affects the use by the administration or the employ for government intentions. Jurisdiction Apart from the purposes of the trespass crimes, the law addresses a number of the possibly more nettlesome queries. Penalties COMPUTER FRAUD AND ABUSE ACT 5 The penalties for conspiracy to breach or for infringements or attempted breaches of the rule are sentence not below one year and/ or a fine of not above $100, 000 for first-time offenders and sentence not above ten years and/ or fine not above $250,000 (Kosseff, 2017). Other crimes Other crimes comprise offenses such as conspiracy, attempt, restricted application and state rule, and accomplices as principals among other offenses. Drastic raise in scope During the previous ten years, the CFAA has shifted from insignificance into the public eye as Congressional changes significantly augmented its range. The application of the CFAA has considerably increased in the recent past because of the relevancy of the act (Kosseff, 2017). The increased significance of the law began later during 2001 after the Congress adopted a definition of “loss” within the CFAA that made is simpler for private plaintiff’s to meet the $5000 threshold for loss or damage. Conclusion The Computer Fraud and Abuse Act is rule decreed by the Congress during 1986 as a rectification to prevailing computer fraud act that had been integrated within the Comprehensive Crime Control Act of 1984. COMPUTER FRAUD AND ABUSE ACT References Kosseff, J. (2017). Cybersecurity Law. New York: Wiley Publishers. 6

Tutor Answer

DrMatilda
School: University of Maryland

check_circle DrMatilda marked this question as complete.

Running head: COMPUTER FRAUD AND ABUSE ACT
1

Computer Fraud and Abuse Act
Daryl Snipes Jr
American Military University

COMPUTER FRAUD AND ABUSE ACT
2

Computer Fraud and Abuse Act
Background
The Computer Fraud and Abuse Act (CFAA) was decreed in 1986 by the Congress as a
rectification to the prevailing computer fraud act that had been integrated within the
Comprehensive Crime Control Act of 1984 (Kosseff, 2017). The CFAA was authored to restrict
federal jurisdiction to cases having a compelling interest wherein computers belonging to the
federal regime or given monetary agencies are involved or wherein the involved offense is by
nature interstate. Although the creation of computers enhanced the management and security of
information in governments and corporations, it increased opportunities for committing new
crimes that were not addressed by existing statutes. For example, in the 1970s, many computer
hackers and phone phreaks did not fear prosecution because existing laws did not address
cybercrime (Taylor, Fritsch, & Liederbach, 2014). Even if such perpetrators were caught by
investigators, it was difficult to gather evidence that would convict them based on statutes that
required physical proof. As a result, the CFAA was passed to criminalize all computer associated
misconducts.
This Act provided a set of prosecutorial tools that were more powerful and
comprehensive to deal with criminal use of a computer. More specifically, it illegalizes various
computer-related activities including distributing malicious codes and implementing denial of
services attacks (Clough, 2015). In addition, the Congress incorporated within the CFAA a
stipulation that criminalizes traffic in passwords and comparable items. Over the years, the act
has been amended, for instance, in 20...

flag Report DMCA
Review

Anonymous
Thanks for the help.

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors