1 / 17

Computer Offenses

Computer Offenses. Chapter #76. 7601: Definitions. ACCESS: communicate with any computer, sys-tem or network COMPUTER: electronic device performing logic, math, or memory COMPUTER DATA: information contained within COMPUTER NETWORK: interconnection of two or more computers.

skah
Download Presentation

Computer Offenses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Offenses Chapter #76

  2. 7601: Definitions • ACCESS:communicate with any computer, sys-tem or network • COMPUTER:electronic device performing logic, math, or memory • COMPUTER DATA: information contained within • COMPUTER NETWORK:interconnection of two or more computers

  3. Definitions (con’t) • COMPUTER OPERATION:function for which the computer was designed • COMPUTER PROGRAM:data related instruc-tions causing specific functions • COMPUTER SOFTWARE:set of programs • COMPUTER SYSTEM:set of related, connected or unconnected computers / devices • COMPUTER VIRUS:computer program that causes unauthorized activities

  4. Definitions (con’t) • DATABASE:formalized lists of information • DENIAL-OF-SERVICE ATTACK:attempt to prevent legitimate use of computer / system (flooding network, disrupting connections, or service) • DEPRIVE:withhold from using • ECONOMIC VALUE:market value of items damaged, disrupted or destroyed • ELECTRONIC MAIL SERVICE PROVIDER:intermediary who provides electronic mail

  5. Definitions: • ELECTRONIC MAIL TRANSMISSION SYS-TEM (INFORMATION):information used to find the origin of the electronic mail • FAX:transmission of a document through phone or electronic means • FINANCIAL INSTRUMENT:anything trans-mitted of value – checks, drafts, etc • INTERNET SERVICE PROVIDER:furnishes internet access

  6. Definitions • PERSON:individual, corporation using services • PROPERTY:all tangible and intangible elements of a computer system • TELECOMMUNICATION DEVICE:all parts of a computer system that assist in transmission of data • WIRELESS ADVERTISEMENT:electronic means of marketing products • WWW:all aspects of the internet

  7. 7603: Jurisdiction • Can be prosecuted either: • From location it was committed or • From location it was received

  8. 7603: Restitution • Upon conviction: • 1) cost of repair or replacement • 2) loss of profits • 3) cost of restoring lost data

  9. 7604: Concurrent Jurisdiction Can be prosecuted either by: County District Attorney or State Attorney General

  10. 7605: Defenses • 1) Believed he / she was entitled by law to hack into the system • 2) Believed he / she had permission to do so

  11. 7611: Unlawful Use of Computer • A PERSON COMMITS THE OFFENSE OF UNLAWFUL USE OF COMPUTER IF: • 1) accesses or exceed authorization to access, damage, or destroy computer or systems • 2) intentionally accesses without authorization to disrupt operation of computer system • 3) I. or K. without authorization gives out pass-words or confidential information for a system • Penalty: F-3

  12. 7612. Disruption of Service • I. or K. gets involved in a plan to commit a “denial of service attack” upon any sys-tem to “block or im-pede or deny” access to the system • F-3

  13. 7613: Computer Theft • Entering a computer system with the intent to deprive him / her thereof • F-3

  14. 7614: Unlawful Duplication • Makes or causes to be made unauthorized copy in any form in-cluding but not limit-ed to printed or elec-tronic data, programs, or software • F-3 (under $2500) • F-2 (over $2500)

  15. 7615: Computer Trespass • K. or without authority uses a computer or network to: • 1) temporarily or permanently remove data, soft-ware or programs • 2) causes a computer to malfunction regardless of time • 3) alter or erase any data, programs, or software • 4) create or alter financial documents • 5) cause physical injury to the property of another

  16. 7615: Computer Trespass (con’t) Penalty: F-3

  17. 7616: Distribution of Computer Virus • I. Or K. sells, gives, or distributes a computer program that has the capability to: • 1) prevent, impede, control, delay or disrupt a system • 2) degrade, damage, or destroy a system • F-3

More Related