Question

In: Computer Science

(a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful? (b) Why would...

(a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful? (b) Why would cyberstalking be classified as a cyberrelated crime, according to this distinction? (c) Among cyberrelated crimes, is it useful to distinguish further between cyberexacerbated and cyberassisted crimes? (d) Why would cyberstalking be categorized as a “cyberexacerbated” rather than a cyberassisted crime? (e) Why not simply call every crime in which cybertechnology is either used or present a cybercrime? (f) Would doing so pose any problems for drafting coherent cybercrime legislation? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

pIease answer aII questI0ns

Solutions

Expert Solution

A.) yes they are very usefull because the cyber security where a computer network,software or hardwareis the targeted where the cyber crime where the human or the humans data is the target.The victims are the corporations and goverment are in Cyber specific. the victims of Cyber crime is families and individuvals. cybersecurity is no merely a set of guideness and actions intented to prevent cyber crime are,as well as the academic areas that study them.Cyber crime is the tends to focus more on protection individuals and families as they navigate online life

B.) Cyberstalking be assified as a cyberrelated crime, according to this distinction because it is the use of internet or other electronics means to stalk an individual person.This crime includes monitoring,identify theft,therads,socitationfon for sex or gathering informationsthat may uses to threaten.

C.)Cyberexacerbated crimes are a type of cyber-related crime, but they are much worse than cyber-assisted crimes. These crimes have increased significantly due to cybertechnology. Most crimes have evolved to maintain their own categories due to the shear volume of crimes and their slight uniqueness due to their ease with the use of cybertechnology.The first are Cyber-assisted crimes. These are crimes in which cybertechnology is simply used to aid a crime, such as committing tax fraud or being assaulted with a computer. The other category is known as Cyberexacerbated crimes, which are crimes that have increased significantly due to cybertechnology.

D.)Cyber-exacerbated crimes are crimes in which the actual offensedoes not occur in cyberspace. Rather, these crimes were made easier, or enabled, bycyberspace.Theactivities performed in cyberspace, though, certainly assist in the committal of these crimesCrimes:Any crime in which cyberspace or computing technology plays aminor role.An example is income-tax cheating (with a computer). The actual crime is income-taxcheating. The computer had an insignificant role.Regardless of which defintion you apply, realize that there are different types of cybercrimesand the different types require different approaches for improving your computer safety. Youcan’t defend against an attack if you can’t define it.

E.)Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The general public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

F.)Cyber law is any law that applies to the internet and internet-related technologies. Cyber law is one of the newest areas of the legal system. This is because internet technology develops at such a rapid pace. Cyber law provides legal protections to people using the internet. This includes both businesses and everyday citizens. Understanding cyber law is of the utmost importance to anyone who uses the internet. Cyber Law has also been referred to as the "law of the internet."

Categories of Cyber Crime

Generally, there are three major categories of cybercrimes that you need to know about. These categories include:

  • Crimes Against People. While these crimes occur online, they affect the lives of actual people. Some of these crimes include cyber harassment and stalking, distribution of child pornography, various types of spoofing, credit card fraud, human trafficking, identity theft, and online related libel or slander.
  • Crimes Against Property. Some online crimes happen against property, such as a computer or server. These crimes include DDOS attacks, hacking, virus transmission, cyber and typo squatting, computer vandalism, copyright infringement, and IPR violations.
  • Crimes Against Government. When a cybercrime is committed against the government, it is considered an attack on that nation's sovereignty and an act of war. Cybercrimes against the government include hacking, accessing confidential information, cyber warfare, cyber terrorism, and pirated software.

Related Solutions

What are the key distinctions between a private placement and a public offering? Why would Rule...
What are the key distinctions between a private placement and a public offering? Why would Rule 144A increase foreign private placements? Answer Should not be less than 750 words.
What are the key distinctions between a private placement and a public offering? Why would Rule...
What are the key distinctions between a private placement and a public offering? Why would Rule 144A increase foreign private placements?
What are the remaining distinctions between banks, savings associations and credit unions? Will these distinctions be...
What are the remaining distinctions between banks, savings associations and credit unions? Will these distinctions be maintained after Dodd-Frank?
A) define balance of payment B)why would it be useful to examine Ghana balance of payment...
A) define balance of payment B)why would it be useful to examine Ghana balance of payment data. C) discuss the primary accounts used to record balance of payments data and give examples of items recorded under each account.
Explain thoroughly the distinctions between the following pairs of terms: (a) Parameter and statistic (b) Sample...
Explain thoroughly the distinctions between the following pairs of terms: (a) Parameter and statistic (b) Sample size and number of samples
A total of 150 crimes were reported by the sheriff last year. Of the 150 crimes,...
A total of 150 crimes were reported by the sheriff last year. Of the 150 crimes, 39 were committed by criminals under 20 years of age, 36 were committed by criminals over 40 and 82 were violent crimes. There were 27 violent crimes under the age of 20 and 14 violent criminals over the age of 40. Type of Crime Under 20 20-40 Over 40 Total Violent 27 41 14 82 Non Violent 12 34 22 68 Total 39 75...
contrast Alfred Marshall's distinctions between: (a) supplementary and prime costs; (b) immediate present, short run, and...
contrast Alfred Marshall's distinctions between: (a) supplementary and prime costs; (b) immediate present, short run, and long run; (c) increasing and decreasing cost industries; and (d) internal and external economies
Explain the important distinctions between each pair of terms: (a) mass and weight; (b) intensive and extensive properties;
Explain the important distinctions between each pair of terms: (a) mass and weight; (b) intensive and extensive properties; (c) substance and mixture; (d) systematic and random errors; (e) hypothesis and theory.
Explain the important distinctions between each pair of terms: (a) cathode rays and X-rays (b) protons and neutrons
Explain the important distinctions between each pair of terms: (a) cathode rays and X-rays (b) protons and neutrons (c) nuclear charge and ionic charge (d) periods and groups of the periodic table (e) metal and nonmetal (f) the Avogadro constant and the mole 
1 a) What is the difference between an AADT and an ESA? b) Why would you...
1 a) What is the difference between an AADT and an ESA? b) Why would you consider adopting a longer design life for a pavement? c) What are three different methodologies for forecasting traffic volumes? What are their strength
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT