Week 7 Review and Analysis

Week 7 Review and Analysis

Week 7 Review and Analysis
Keller Graduate School of MGMT
Information Security Law


Chapter 22, Question 3, 4, & 5, Page 739. (Questions found on p743)
Question 3: At one time, in order to demonstrate their alleged intellectual superiority, a number of teenagers broke into computer systems that guarded records of schools, government generally, and the military.   What are the current potential criminal risks associated with hacking illegally into computer systems?
For starters, all of the information that is compromised could be sold and used for illegal purposes such as identity theft.   Also, if hackers were to hack into the computer systems that control our infrastructure they could possibly turn off or damage our power grids or if they were to hack into the systems that control air traffic control, they could crash airplanes and disrupt travel for millions of people.   On a larger scale if hackers were to hack into nuclear power plants they could possibly cause a nuclear meltdown. (GORMAN, 2009)

Question 4: Criminal law statutes now protect your name and identity, your communications, and your ideas.   Match each of these categories with the appropriate criminal law statute and explain how each statute can be violated.
Name and identity = “Identity Theft and Assumption Deterrence Act of 1998” (Baumer, 2011).   This statute protects individuals from having their identity stolen and used to commit a crime or make purchases in that person’s name that were not initiated by that person.
Communications = “Electronic Communications Privacy Act of 1986” (Baumer, 2011).   This statute was initially created to protect individuals from having the companies they worked for from spying on them and revealing information that they illegally obtained.   This is a very good law and I personally run into this all the time as a systems administrator.   For instance, whenever someone is under investigation from HR, HR has to have approval from the legal department before...

View Full Essay