Call/WhatsApp: +1 914 416 5343

Computer science questions

Briefly define or describe each of the following (or answer the question asked):
1. Consider the federal Computer Fraud and Abuse Act (CFAA).

(a) What is access? (Describe and distinguish the virtual or narrow perspective of access compared to the physical or broad perspective on access)
(b) What is unauthorized access? (Describe and distinguish code-based, norm-based, and contract-based sources of authorization; briefly describe the pros and cons of each from the security perspective — how effective is each to protect the owner or custodian of data?)
(c) What is a computer?
(d) What is a protected computer? What computer, if any, would not be a “protected” computer?
2. Consider the CFAA
(a) What are the seven offenses? (Describe the elements of each, and identify which of them is the broadest offense)
(b) What are the criminal penalties within the CFAA? (Be sure to identify the factors within the CFAA that might enhance the penalty¬, and do not use the sentencing guidelines in answer to this question)
(c) What are the civil penalties?