Page 264 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 264

Any computer used exclusively by a financial institution

                    Any computer used by the government or a financial institution
                    when the offense impedes the ability of the government or

                    institution to use that system

                    Any combination of computers used to commit an offense when
                    they are not all located in the same state






                          When preparing for the CISSP exam, be sure you’re able to

                  briefly describe the purpose of each law discussed in this chapter.




               CFAA Amendments

               In 1994, Congress recognized that the face of computer security had
               drastically changed since the CFAA was last amended in 1986 and
               made a number of sweeping changes to the act. Collectively, these
               changes are referred to as the Computer Abuse Amendments Act of

               1994 and included the following provisions:
                    Outlawed the creation of any type of malicious code that might

                    cause damage to a computer system

                    Modified the CFAA to cover any computer used in interstate
                    commerce rather than just “federal interest” computer systems

                    Allowed for the imprisonment of offenders, regardless of whether
                    they actually intended to cause damage

                    Provided legal authority for the victims of computer crime to
                    pursue civil action to gain injunctive relief and compensation for

                    damages

               Since the initial CFAA amendments in 1994, Congress passed
               additional amendments in 1996, 2001, 2002, and 2008 as part of
               other cybercrime legislation. We’ll discuss those as they come up in
               this chapter.

               While CFAA may be used to prosecute a variety of computer crimes, it
   259   260   261   262   263   264   265   266   267   268   269