Editing Aaron projects/CFAA
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 162: | Line 162: | ||
== Scenarios == | == Scenarios == | ||
: ''Add yours below | : ''Add yours below'' | ||
* ''War Games'' scenario: someone breaks into a secured machine, accesses government secrets, and uses them to wreak havoc | * ''War Games'' scenario: someone breaks into a secured machine, accesses government secrets, and uses them to wreak havoc | ||
Line 172: | Line 172: | ||
* Using Access to Perform Identity Theft: Nonaurtorized access & distribution of personal or financial information by authorized users exceeding their granted access rights. | * Using Access to Perform Identity Theft: Nonaurtorized access & distribution of personal or financial information by authorized users exceeding their granted access rights. | ||
* Worm introduction: Engineering or introducing code to enable access to unauthorized data via autoreplication & propagation. | * Worm introduction: Engineering or introducing code to enable access to unauthorized data via autoreplication & propagation. | ||