This quiz will be about the law used to punish computer criminals. The quiz may cover the Internal Revenue Service, cyber terrorism, or how to avoid becoming a victim of an online scam. This is for all you information-loving persons out there!
Good Luck. I made this quiz with 2 different versions, the short version which is all multiple choice and the long version, which is all fill-in-the-blank.
At the end of the quiz you click on your score to see if you got it right. Good Luck and Have Fun!
Here are some points discussed about The Law used to punish Computer Criminals-
1. The Computer Fraud and Abuse Act (CFAA)
It is a law that prohibits unauthorized access of government computers, access to private computers without authorization, and exceeding limits on authorized access to government computers. The act was originally used to prevent computer hacking.
It was passed by the U.S. Congress in 1986 in response to the hacking of an MIT Artificial Intelligence Laboratory computer system by a student at Cornell University in 1985.
2. Cyber Terrorism
One person was charged and convicted with cyber terrorism, Kevin Mitnick. In 1998 he was sentenced to a term of supervised release for three years, six months in a halfway house and fined $50,000. He was not accused of causing any property damage.
He only stole information from computers. In some cases Mitnick’s access could be classified as cyberterrorism because he examined the capabilities of the computer system to cause significant damage. One example is his hack on Tsutomu Shimomura where he was able to listen in on his phone calls and look at his screen so that he could listen to Shimomura’s conversations while they were taking place over the telephone lines.
3. Cyber Security
The Federal Bureau of Investigation has a section called the Cyber Division, which is the operating unit dedicated to cybercrime investigations. Its mission is to investigate and prevent crime involving computers and communications.
Its goal is to help victims recover from any damage caused by computer crimes. Its primary function is to “respond to and investigate complaints received by other law enforcement agencies concerning computer-related crimes, particularly those intrusions into governmental systems that could have national security implications.”
4. The FBIs Cyber Stalking Program
Cyberstalking has been made illegal in some states, such as California and Florida. It is defined as the use of computers to stalk a victim. It is also known as cyber harassment. This involves repeated harassing, threatening or embarrassing emails, instant messages or telephone calls.
5. The Online Victim’s Project
An online victim project has been made available through the Internet to help online victims by providing information and links to various public safety organizations that can help those who were victimized online.
There are links to government agencies such as the Federal Bureau of Investigation, Attorney General’s Office, state criminal investigation unit, state computer crimes units and local law enforcement agencies with expertise in dealing with cybercrime.
This is an electronic payment from a person’s bank account or credit card to another person. The perpetrator may possibly use the information on the victim’s computer to make the transaction go through and then take money back out of their own account.
This information can be used to make a serious financial impact on the victim’s life. In this situation there is no actual physical contact or act committed by the perpetrator because they are not physically present in front of their victim, so they are not prosecuted under physical contact laws.
It is possible that a victim could be charged with extortion. However, that could change in the future if cyberstalking becomes as old as killing people in real life.
7. The PC Inspector
This is a program that checks the security of a computer system and shows potential problems with the computer’s operating system, hardware and software. It can be used to help prevent data theft. It has many functions, such as: checking the integrity of files; checking for malware; checking for viruses; and scanning for vulnerabilities.
8. The Firewalls
A firewall is a software program that protects computers against unwanted communications between systems or between networks in order to control access and exchange of information.
There are five categories for firewalls: circuit, packet, proxy, application and stateful. In order to avoid unauthorized access a firewall is placed on the computer or network. The firewall then allows only authorized communication to pass through it.