9.1 Cyber legalities overview:
Computer-assisted crime: computer was used
as a tool to help carry out a crime.
Computer-targeted crime: crimes for
computer and its owner.
Computer is incidental: when crime was
carried out, computer is involved.
9.2 Type of legal system:
Civil law system: different locations have
different civil law. (Europe, Russia, South America, Central America)
Common law system: it uses judges and
juries of peers. It includes criminal, civil/tort. (North America, Oceania,
England)
Customary law system: local customs
Religious law system: the law based on
religious beliefs. (Middle East)
Mixed law system: two or more legal system is
used together.
9.3 Intellectual property laws and privacy:
Patent grants ownership and enables that owners
to legally enforce their rights.
Copyright protects expression of ideas.
Trademarks protect words, names, product
shapes, symbols, colors, or a combination of these used to identify products or
company.
Privacy information: full name, national
id, IP address, vehicle plate number, driver license, fingerprints,
handwriting, credit card information, birthday, birthplace, genetic
information.
9.4 Investigations
A few different attack types:
Salamis: the attacker commits several small
crimes with the hope that the overall larger crime will go unnoticed.
Data diddling: change existing data and many
times it happens before data entered into application..
Password sniffing: sniffing network traffic
with the hope of capturing passwords being sent between computers.
IP spoofing: change IP address within a
packet and spoofing others.
没有评论:
发表评论