Information security law and ethics
Answer the following questions…
3. At one time, in order to demonstrate their alleged intellectual superiority, a number of teenagers broke into computer systems that guarded records of schools, government generally, and the military. What are the current potential criminal risks associated with hacking illegally into computer systems?
4. Criminal law statutes now protect your name and identity, your communications, and your ideas. Match each of these categories with the appropriate criminal law statute and explain how each statute can be violated.
5. Online gambling and the purchase of pharmaceutical drugs over the Internet are quasi-legal activities that can only take place because the Internet allows the parties offering gambling and drugs access to those who want to be customers. Should law enforcement in the United States tolerate such activity or should it go after small nations that provide shelter for such websites? In addition to policing the physical world, should the United States police all of cyberspace?