You are on page 1of 3

Applied Cybersecurity: Strategies for Avoidance,

Protection & Defense Against Cybercrime, Privacy &


Big Data 1/29/2018 10:35:00 PM
Cybercrime: protection against trespasses against computers, digital piracy,
as a method for abetting crime, digital extortion, fraud and identity theft

Technology curve and crime

2 Major categories
1. computer-related versions of existing illegal acts
new crimes involving computers

cybercrime before courts: determne analog

amazon alexa case


blockchain

Protected Personal Identifyng Information (PII)


18 USC 1028 – means of identifying defined
Machine learning – learn and improve from experience
Increasing obli on civil side to protct personal data – EU general data pr
 Personal data: identified/ dentifiable specific to ___
 Establishing criminal liability for unauthorized data access/use –
when does unauthorized access to personal data become a crime
Illnois biometric information privacy act: unintended consequences
New Zealand sec 20 harmful communicatons ac
Apple v. crescent (cal.s.ct 2013) technology forward
Prof.doris.long@gmail.com
national cyber security plan 2022
1/29/2018 10:35:00 PM
1/29/2018 10:35:00 PM

You might also like