100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

LCR4805 Assignment 2 (DETAILED ANSWERS) Semester 2 2024 - DISTINCTION GUARANTEED

Puntuación
5.0
(1)
Vendido
5
Páginas
11
Grado
A+
Subido en
09-09-2024
Escrito en
2024/2025

LCR4805 Assignment 2 (DETAILED ANSWERS) Semester 2 2024 - DISTINCTION GUARANTEED - DISTINCTION GUARANTEED - DISTINCTION GUARANTEED Answers, guidelines, workings and references ... QUESTION 1 A local municipality has been hit by a ransomware attack. The municipality releases the following statement: "City power has been hit by a ransomware virus. It has encrypted all our databases, applications and network. Customers will not be able to visit our website or buy electricity units until our ICT department has sorted out the matter. Customers will be updated when new information becomes available." It seems that an employee inadvertently opened an email which downloaded the ransomware virus onto the network of the municipality. The creators of this ransomware virus demand the payment of R350 000 to provide a password to the municipality which will decrypt the network. (a) Assume the creator of the email is traced and identified as Robert who lives in Port Elizabeth, South Africa. Discuss in detail whether Robert can be charged with any crime(s)? Discuss the legal position both before and after the Cybercrimes Act 19 of 2020 has come into force. Substantiate your answer by referring to legislation, case law and academic commentary: (30) QUESTION 2 Mr and Mrs Naidoo are driving home from a friend's birthday party. It has just clocked 6pm, however it is not dark yet. Mr Naidoo has not switched on his vehicle lights. Mr Naidoo is stopped by traffic officers at a roadblock. One traffic officer tries to solicit a bribe from Mr Naidoo for failure to switch on his vehicle lights. Mr Naidoo refuses, and as a result the traffic officer gives Mr Naidoo a heavy penalty for failure to switch on lights on his vehicle. Mrs Naidoo, who is sitting in the passenger seat, captures the entire incident on video with her cell phone. Mr and Mrs Naidoo lay a charge of corruption at the local police station. Can this cell phone video recording be used as evidence in a court of law? Discuss in detail by referring to applicable law. (20) QUESTION 3 An insurance company (WD) stores its customer files, which contain personal information, on a cloud server provided by a data processing company, TPD: WD and TPD have concluded a contract in terms of which TPD will only process the data on the instructions of WD. At some point in time, the personal information of a large group of customers is made public by a nacker who hacked into the server of TPD. Answer the following questions on this scenario. (a) Identify the responsible party, the operator and the data subject. (3) (b) What is WD and TPD respectively supposed to do after the breach of data that has taken place?

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
9 de septiembre de 2024
Número de páginas
11
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

LCR4805
Assignment 2 Semester 2 2024
Unique #:
Due Date:10 September 2024



Detailed solutions, explanations, workings
and references.

+27 81 278 3372

, QUESTION 1

Ransomware attacks, such as the one that targeted the local municipality in this
scenario, fall within the broad category of cybercrimes, which are regulated by
various statutes in South Africa. A ransomware virus typically encrypts data,
rendering it inaccessible until a ransom is paid to decrypt it. In this case, Robert,
the alleged perpetrator, can potentially face legal consequences under both the
common law (before the Cybercrimes Act 19 of 2020) and statutory law (after the
Act came into force). The South African legal framework before the Act relied
heavily on older laws such as the Electronic Communications and Transactions
Act 25 of 2002 (ECT Act) and common law crimes like extortion, while the
Cybercrimes Act 19 of 2020 specifically modernized and broadened the legal
tools available to address cybercrime.

Legal Position Before the Cybercrimes Act 19 of 2020

Before the Cybercrimes Act 19 of 2020, cybercrimes such as ransomware attacks
were addressed under various legal frameworks, including the ECT Act and
common law provisions. Let's explore how Robert's conduct would have been
prosecuted under this pre-Act framework.

1. Electronic Communications and Transactions Act 25 of 2002 (ECT Act)

The ECT Act contains provisions that address various cyber-related offenses,
including unauthorized access to data and interference with data:

• Section 86(1): This provision prohibits unauthorized access to data,
including the interception of data. Robert’s introduction of the ransomware
into the municipality’s network constitutes unauthorized access and
interception. By tricking an employee into downloading the virus, Robert
accessed data without permission, which is a violation of this section.
• Section 86(2): This section criminalizes interference with data, specifically
prohibiting actions that modify, destroy, or render data ineffective. The
ransomware attack clearly modifies the municipality’s data by encrypting it,
thus rendering it inaccessible. Robert’s actions would fall squarely within
the scope of this section.
• Section 86(3): This section addresses the creation or distribution of
devices or programs designed to overcome security measures. The
ransomware virus, as a tool that bypasses the municipality's security and




Varsity Cube 2024 +27 81 278 3372
$3.08
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Reseñas de compradores verificados

Se muestran los comentarios
1 año hace

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
VarsityC AAA School of Advertising
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
28686
Miembro desde
8 año
Número de seguidores
13258
Documentos
3117
Última venta
2 días hace

4.1

2820 reseñas

5
1491
4
581
3
392
2
117
1
239

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes