In: Computer Science
Alyssa’s ex-husband, Tom, has sent Alyssa a number of threatening e-mail messages. Alyssa has found out that her ex-husband has also maliciously posted her personal information, including her social security number, name, home address, email address, cell phone number, and bra size on sadomasochistic websites.
Tom has also used morphing technology to superimpose Alyssa’s face on pornographic images and videos on websites maintained by a third-party website operator. Tom is upset because Alyssa committed adultery during their marriage.
Based on the information in the scenario, answer the following questions:
(CYBER LAW, THE LAW OF THE INTERNET AND INFORMATION TECHNOLOGY)
Alyssa should go to police inform them about the incidence.then they file her complaint and forward those info to cyber security team on the other hand police will find location of tom and caught him.cyber security team will check whether which spam website's did this kind of illegal work they will list out those website and find the one by which her personal info is leaked out.by law they will ban those spam websites domains and try to find developers of those website.now they will proceed for the judiciary procedure for tom and spamers.
Tom and third party website will defend themself by they didnt does this kind of work and by proxy method they randomly change their ip addresses so no one can point them for any aligations.
But cyber security and law of internet and security can identify that who did this by using network provident facility i.e for many spam websites malcisious activity wify capture the information which will help cyber security team to capture the guilty.
They can also access the toms log files in which they will find the proofs for the incidence.