Access over 35 million academic & study documents

Computer Fraud And Abuse Edited

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/5
Running Head: COMPUTER FRAUD AND ABUSE ACT 1
Computer Fraud and Abuse Act
Name
Course
Tutor
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
COMPUTER FRAUD AND ABUSE ACT 2
The various technological advancements have made computer use prone to
vulnerabilities. Many cases have being reported about the abuse of technology to exercise fraud.
It is thus for that reason that the federal government found it essential to come up with an Act
that is aimed at ensuring safer and secure use of the computer and associated technologies. This
law come up as an amendment to the counterfeit access device and abuse act in 1986. Since the
time this law was implemented, the society has become a safer place. People are able to use
computers and associated technology with minimal fear if any (McCormick, 2013). This is
because access to their information has being protected. These laws have also made the world of
business secure. People can now carry out their online transactions without any worries.
Additionally, the military and government information is now protected thus the possibilities of
computer related activities have being reduced to almost zero.
The Computer Fraud and Abuse Act work to ensure that various criminal activities do not
occur. There are seven types of criminal activities that are enumerated under this act. They
include:
Obtaining national security information
Threatening to damage a computer
Trafficking in passwords
Damaging a computer or information
Compromising confidentiality
Accessing to defraud and obtain value
Trespassing in a government computer

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running Head: COMPUTER FRAUD AND ABUSE ACT Computer Fraud and Abuse Act Name Course Tutor Date 1 COMPUTER FRAUD AND ABUSE ACT 2 The various technological advancements have made computer use prone to vulnerabilities. Many cases have being reported about the abuse of technology to exercise fraud. It is thus for that reason that the federal government found it essential to come up with an Act that is aimed at ensuring safer and secure use of the computer and associated technologies. This law come up as an amendment to the counterfeit access device and abuse act in 1986. Since the time this law was implemented, the society has become a safer place. People are able to use computers and associated technology with minimal fear if any (McCormick, 2013). This is because access to their information has being protected. These laws have also made the world of business secure. People can now carry out their online transactions without any worries. Additionally, the military and government information is now protected thus the possibilities of computer related activities have being reduced to almost zero. The Computer Fraud and Abuse Act work to ensure that various criminal activities do not occur. There are seven types of criminal activities that are enumerated under this act. They include:  Obtaining national security information  Threatening to damage a computer  Trafficking in passwords  Damaging a computer or information  Compromising confidentiality  ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4