Summary: Law And Technology
- This + 400k other summaries
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding
Read the summary and the most important questions on Law and Technology
-
1 MODULE 1 - Cyberterrorism
This is a preview. There are 5 more flashcards available for chapter 1
Show more cards here -
What is malware, and what are the possible forms of malware?
Malware is malicious software, including worms, viruses, trojans and spyware, designed to cause damage, and hamper with information systems. -
How has ransomware grown?
In 2016 alone, 97,25% from all phishing emails delivered, were a form of ransomware. The final 2.75% were all other forms of malware utilities. -
What kind of ransomware attacks are there?
Ransomware attacks go in through either websites or through phishing emails. -
Who are popular industry targets for hackers?
Manufactures, utilities, technology, professional services, retail, healthcare, finance, legal, banking and insurances. From most to least popular. -
How is ransomware used as a service?
- custom-made ransomware creation services
- especially useful for people with little technological know-how
- Customized ransomware (ransom amount, payment deadline) is downloaded free of charge or for payment of a certain amount
- the creator of ransomware receives part of the ransom -
What are the laws surrounding ransomware?
You can find the regulations in the Council of Europe's Convention on Cybercrime, Budapest 2001. It shows measures to be taken at the national level for:
substantive criminal law;
procedural law. -
What are the substantive criminal law measures that need to be taken at national level according to the Council of Europe's Convention on Cybercrime.
- illegal access
- illegalinterception
- datainterference
- systeminterference
- misuse of device
-computer-related fraud/forgery
-Offences related to childpornography
-Infringements ofcopyright and related rights -
What are the procedural law measures that need to be taken at national level according to the Council of Europe's Convention on Cybercrime.
- expedited preservation of stored computer data
- expedited preservation and partial disclosure of traffic data
- Production order
- Search and seizure of stored computer data
- Real-time collection of traffic data
- Interception of content data -
What is the definition of cybercrime according to the Convention on cybercrime?
In a broad sense, any crime that can be carried out by computer means, although these are not typical elements. (example: crimes against honour)
In the strict sense, crimes that include in its typical element informatics, as the means of execution the object of conduct or as the protected legal value. (example: computer and telecommunications fraud) -
What are the characteristics of cybercrime??
A-temporality
A-Spatiality
Repetition
Automation
Anonymity
Complexity
Danosity
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding