Description
Security and Computer Crime
Security and Computer Crime
Security and Computer Crime
Security and Computer Crime
Security and Computer Crime
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Outline
Introduction
Body
Conclusion
Reference
Course title
Student name
Institution affiliation
1
Question 1
The first claim against Toka is infiltrating Becker’s computer without permission- This claim does
not hold any weight under CFAA based on the intended use and the relationship between the
defendant and the plaintiff since the Toka’s relationship with Becker is husband and wife.
The claim that Toka infected the computer with a virus is inadmissible since Becker did not make
it known that his computers were protected.
The third claim against Toka was that the viruses that attacked the computers due to her infiltration
could steal information- the court could consider her innocent since no information was reported
missing and also her intentions for using the computers were not ...