ipl-logo

The Electronic Communications Privacy Act Of 1986

532 Words3 Pages

One of the earliest law of cybercrime is the Electronic Communications Privacy Act of 1986. There are many different types of crimes that can be done on a computer. Some of these crimes can be hacking, website defacement, worms and viruses. What are these threats to our computers? What is hacking?

According to Merriam-Webster a hacker is “a person who secretly gets access to a computer system in order to get information, cause damage.” Do you know this word was first seen in the 14th century? Do you know a cracker or cyberpunk is another word for hacker? According to Computer Forensics “in addition to 18 U.S.C. 1030, 18 U.S.C. 1361-1362 cover crimes such as computer hacking and website defacement, and prohibit malicious mischief.” Most hackers get charge when they gain unauthorized access to a protected computer, with 18 U.S.C. 1030. If they alter files or deletes files in a protected computer, they are doing 18 U.S.C. 1030(a)(5)(C). There are many more we can talk about in this section. What is website defacement? …show more content…

Websites’ appearance change - pictures and/or words are scrawled across the defaced website.” According to Computer Forensics a webpage defacement is “a type of attack in which one or more individuals alter or replace the content of a website without authorization.” Some examples of this can be activists who are politically motivated. They even got a name for them, they are called “hacktivism”. Some just do web defacement just for amusement purposes. What are worms and

More about The Electronic Communications Privacy Act Of 1986

Open Document