EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 1 : Computer Forensics in Today's World
         
Notes available : 31 You are not logged in.
Please Login for track your learning progress
   
 
Sl.No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Note No.



Bookmark this Note
Note ID: 118

Title 18 of the United States Code (18 USC)


If you want to share the link of this note, please click here to "Copy note link" and share that generated link. Link from URL may change in future.
 


Title 18 of the United States Code (18 USC) is the federal government‘s primary criminal code. It covers federal crimes and criminal procedure.
Here are some parts of 18 USC:
  • Part I: Crimes, sections 1–2725
  • Part II: Criminal procedure, sections 3001–3742
  • Part III: Prisons and prisoners, sections 4001–4353
  • Part IV: Correction of youthful offenders, sections 5001–5043
  • Part V:Immunity of witnesses, sections 6001–6005
18 U.S.C. § 1029 is a US Code section that covers fraud and related activity in connection with access devices. Unauthorized use of any type of access device entity such as a debit or credit card issued to another individual is a crime if the prosecution can prove that the defendant intentionally used the card to pay for goods and services or obtain money. Federal prosecutors typically charge someone with 18 U.S.C. 1029 in credit card cases.

18 U.S. Code § 1030, codified as the Computer Fraud and Abuse Act (CFAA) in 1986, is a federal law that addresses cyber-based crimes. The law is located in Title 18, Part I, Chapter 47, Crimes and Criminal Procedure

The law protects federal computers, bank computers, and computers connected to the Internet. It covers a number of offenses, including:
  • Causing damage to a protected computer
  • Transmitting a communication that threatens to cause damage to a protected computer
  • Transmitting a communication that threatens to obtain information from a protected computer without authorization
  • Theft of information
  • Causing damage to computer systems
  • Trafficking in passwords or access devices
  • Obtaining national security information
  • Trespassing on government computers


  Go to notes  






WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations