Question

Computer Security Can we use the legal system (Laws, Regulations, Police forces, etc.) to protect computer...

Computer Security

Can we use the legal system (Laws, Regulations, Police forces, etc.) to protect computer systems? Give 3 simple reasons

0 0
Add a comment Improve this question Transcribed image text
Answer #1

3 main reasons for using legal systems for computer system security are:

1. Defining acceptable behavior:

Laws identify acceptable behavior and prevent harm. This is also true in terms of data, computer systems, online crimes, etc. Cybercrime law establishes rules and policies to be followed to protect human rights, services and facilitate standard communication channels between countries. It is important for standalone users as well as big organizations.

2. Defining illegal acts:

An act is considered illegal when it is not approved by law not because it harms someone. Laws and regulations define the rights of persons, states, and organizations. Many countries encourage law enforcement to specifically deal with issues related to computer systems such as data breach etc. If the justification for a crime even a minor breach doesn't exist in law, it is easily overlooked.

  3. Risk mitigation:

Preventive legislation is necessary to prevent damage to a system or person by cybercrime. It includes ensuring that the tools, processes and other security measures are implemented effectively to prevent harm to the system. It also involves lawful authorization or legal access to communication for certain parties in a state or organization.  


Add a comment
Know the answer?
Add Answer to:
Computer Security Can we use the legal system (Laws, Regulations, Police forces, etc.) to protect computer...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as...

    Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as a tool for anarchy Reflects lax attitudes and management failures Protects information and the systems that use, store and transmit it Results from power irregularities and ISP disruptions In an indirect attack approach The criminal breaks into a system using his or her own computer The nefarious message appears to be coming from a trusted source Data traveling over a network is monitored without...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • Note: We use u, v, w. etc. to denote u. v, w, etc. and R to...

    Note: We use u, v, w. etc. to denote u. v, w, etc. and R to denote R. Question 1 a. Suppose Then find the value of g 2a) (h +2b) (i +2c) 3b За 2d 3c 2f b. Suppose A and B are n x n matrices with A invertible. Prove that det (A B) det B det A c. Suppose A is a 3 x 3 matrix such that det (A) - Find det d. Suppose A is...

  • Background: TLG has explained to the GC owners that it is vital to understand the legal system and processes, including...

    Background: TLG has explained to the GC owners that it is vital to understand the legal system and processes, including the court system and jurisdiction of the courts. This is especially important as GC plans to conduct business over the internet and thus, will have potential transactions throughout the U.S. and, possibly, globally. For an in initial meeting between GC owners and TLG, Winnie and Ralph asked you to present an overview of the law and the legal system. You...

  • Computer security and system management

    Step-By-Step Assignment Instructions less  Assignment Narrative:  Suppose that you were just hired by a medium size company.  You are replacing a previous system admin that really didn't understand what they were doing.  Your supervisor would like you to suggest ways of building and protecting their Linux server environment based off of your interview (based off of what you learned in this course).    They are proposing the following for a new business venture and would like you to help.  The criteria...

  • Question 1 (50pts): We have AM modulation and FM modulation for radio transceiver/receiver systems. Can we use pulse width modulation for a radio transceiver/receiver system? Explain why or why not...

    Question 1 (50pts): We have AM modulation and FM modulation for radio transceiver/receiver systems. Can we use pulse width modulation for a radio transceiver/receiver system? Explain why or why not Question 1 (50pts): We have AM modulation and FM modulation for radio transceiver/receiver systems. Can we use pulse width modulation for a radio transceiver/receiver system? Explain why or why not

  • We were unable to transcribe this imageThe Atlantic Medical Clinic can purchase a new computer system...

    We were unable to transcribe this imageThe Atlantic Medical Clinic can purchase a new computer system that will save $5,000 annually in billing costs. The computer system will last for three years and have no salvage value. Use Excel or a financial calculator to solve. Round answers to the nearest dollar. Required: Up to how much should the Atlantic Medical Clinic be willing to pay for the new computer system if the clinic's required rate of return is: Present Value...

  • Please be as descriptive as you can In Chapter 3, we have studied techniques for solving...

    Please be as descriptive as you can In Chapter 3, we have studied techniques for solving linear systems. Given the coeffi- cient matrix for the system, we can use these techniques to classify the system, describe the qualitative behavior of solutions, and give a formula for the general solution. In this lab we consider a two-parameter family of linear systems. The goal is to better under- stand how different linear systems are related to each other, or in other words,...

  • Paul Gray mentioned he was concerned about the security of his clients and their own management...

    Paul Gray mentioned he was concerned about the security of his clients and their own management of passwords and accounts. Improper password management can lead to cases of fraud and misuse of the system. One such type fraud is that victims' account passwords can be stolen and their share trading accounts can be misused for making unauthorized transactions that result in the victims making losses. This crime can be executed by the suspect installing key loggers in public computers, such...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT