Summary: Law And Technology

Study material generic cover image
  • This + 400k other summaries
  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Use this summary
Remember faster, study better. Scientifically proven.
Trustpilot Logo

Read the summary and the most important questions on Law and Technology

  • 1 MODULE 1 - Cyberterrorism

    This is a preview. There are 5 more flashcards available for chapter 1
    Show more cards here

  • What is malware, and what are the possible forms of malware?

    Malware is malicious software, including worms, viruses, trojans and spyware, designed to cause damage, and hamper with information systems.
  • How has ransomware grown?

    In 2016 alone, 97,25% from all phishing emails delivered, were a form of ransomware. The final 2.75% were all other forms of malware utilities.
  • What kind of ransomware attacks are there?

    Ransomware attacks go in through either websites or through phishing emails.
  • Who are popular industry targets for hackers?

    Manufactures, utilities, technology, professional services, retail, healthcare, finance, legal, banking and insurances. From most to least popular.
  • How is ransomware used as a service?

    - custom-made ransomware creation services
    - especially useful for people with little technological know-how
    - Customized ransomware (ransom amount, payment deadline) is downloaded free of charge or for payment of a certain amount
    - the creator of ransomware receives part of the ransom
  • What are the laws surrounding ransomware?

    You can find the regulations in the Council of Europe's Convention on Cybercrime, Budapest 2001It shows measures to be taken at the national level for:
    substantive criminal law;
    procedural law.
  • What are the substantive criminal law measures that need to be taken at national level according to the Council of Europe's Convention on Cybercrime.

    - illegal access
    - illegal interception
    - data interference
    - system interference
    - misuse of device
    - computer-related fraud/forgery
    - Offences related to child pornography
    - Infringements of copyright and related rights
  • What are the procedural law measures that need to be taken at national level according to the Council of Europe's Convention on Cybercrime.

    - expedited preservation of stored computer data
    - expedited preservation and partial disclosure of traffic data
    - Production order
    - Search and seizure of stored computer data
    - Real-time collection of traffic data
    - Interception of content data
  • What is the definition of cybercrime according to the Convention on cybercrime?

    In a broad sense, any crime that can be carried out by computer means, although these are not typical elements. (example: crimes against honour)

    In the strict sense, crimes that include in its typical element informatics, as the means of execution the object of conduct or as the protected legal value.  (example: computer and telecommunications fraud)
  • What are the characteristics of cybercrime??

    A-temporality
    A-Spatiality
    Repetition
    Automation
    Anonymity
    Complexity
    Danosity

To read further, please click:

Read the full summary
This summary +380.000 other summaries A unique study tool A rehearsal system for this summary Studycoaching with videos
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart