100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

LCR4805 Assignment 2 (DETAILED ANSWERS) Semester 2 2024 - DISTINCTION GUARANTEED

Beoordeling
5,0
(1)
Verkocht
5
Pagina's
11
Cijfer
A+
Geüpload op
09-09-2024
Geschreven in
2024/2025

LCR4805 Assignment 2 (DETAILED ANSWERS) Semester 2 2024 - DISTINCTION GUARANTEED - DISTINCTION GUARANTEED - DISTINCTION GUARANTEED Answers, guidelines, workings and references ... QUESTION 1 A local municipality has been hit by a ransomware attack. The municipality releases the following statement: "City power has been hit by a ransomware virus. It has encrypted all our databases, applications and network. Customers will not be able to visit our website or buy electricity units until our ICT department has sorted out the matter. Customers will be updated when new information becomes available." It seems that an employee inadvertently opened an email which downloaded the ransomware virus onto the network of the municipality. The creators of this ransomware virus demand the payment of R350 000 to provide a password to the municipality which will decrypt the network. (a) Assume the creator of the email is traced and identified as Robert who lives in Port Elizabeth, South Africa. Discuss in detail whether Robert can be charged with any crime(s)? Discuss the legal position both before and after the Cybercrimes Act 19 of 2020 has come into force. Substantiate your answer by referring to legislation, case law and academic commentary: (30) QUESTION 2 Mr and Mrs Naidoo are driving home from a friend's birthday party. It has just clocked 6pm, however it is not dark yet. Mr Naidoo has not switched on his vehicle lights. Mr Naidoo is stopped by traffic officers at a roadblock. One traffic officer tries to solicit a bribe from Mr Naidoo for failure to switch on his vehicle lights. Mr Naidoo refuses, and as a result the traffic officer gives Mr Naidoo a heavy penalty for failure to switch on lights on his vehicle. Mrs Naidoo, who is sitting in the passenger seat, captures the entire incident on video with her cell phone. Mr and Mrs Naidoo lay a charge of corruption at the local police station. Can this cell phone video recording be used as evidence in a court of law? Discuss in detail by referring to applicable law. (20) QUESTION 3 An insurance company (WD) stores its customer files, which contain personal information, on a cloud server provided by a data processing company, TPD: WD and TPD have concluded a contract in terms of which TPD will only process the data on the instructions of WD. At some point in time, the personal information of a large group of customers is made public by a nacker who hacked into the server of TPD. Answer the following questions on this scenario. (a) Identify the responsible party, the operator and the data subject. (3) (b) What is WD and TPD respectively supposed to do after the breach of data that has taken place?

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Gekoppeld boek

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
9 september 2024
Aantal pagina's
11
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

LCR4805
Assignment 2 Semester 2 2024
Unique #:
Due Date:10 September 2024



Detailed solutions, explanations, workings
and references.

+27 81 278 3372

, QUESTION 1

Ransomware attacks, such as the one that targeted the local municipality in this
scenario, fall within the broad category of cybercrimes, which are regulated by
various statutes in South Africa. A ransomware virus typically encrypts data,
rendering it inaccessible until a ransom is paid to decrypt it. In this case, Robert,
the alleged perpetrator, can potentially face legal consequences under both the
common law (before the Cybercrimes Act 19 of 2020) and statutory law (after the
Act came into force). The South African legal framework before the Act relied
heavily on older laws such as the Electronic Communications and Transactions
Act 25 of 2002 (ECT Act) and common law crimes like extortion, while the
Cybercrimes Act 19 of 2020 specifically modernized and broadened the legal
tools available to address cybercrime.

Legal Position Before the Cybercrimes Act 19 of 2020

Before the Cybercrimes Act 19 of 2020, cybercrimes such as ransomware attacks
were addressed under various legal frameworks, including the ECT Act and
common law provisions. Let's explore how Robert's conduct would have been
prosecuted under this pre-Act framework.

1. Electronic Communications and Transactions Act 25 of 2002 (ECT Act)

The ECT Act contains provisions that address various cyber-related offenses,
including unauthorized access to data and interference with data:

• Section 86(1): This provision prohibits unauthorized access to data,
including the interception of data. Robert’s introduction of the ransomware
into the municipality’s network constitutes unauthorized access and
interception. By tricking an employee into downloading the virus, Robert
accessed data without permission, which is a violation of this section.
• Section 86(2): This section criminalizes interference with data, specifically
prohibiting actions that modify, destroy, or render data ineffective. The
ransomware attack clearly modifies the municipality’s data by encrypting it,
thus rendering it inaccessible. Robert’s actions would fall squarely within
the scope of this section.
• Section 86(3): This section addresses the creation or distribution of
devices or programs designed to overcome security measures. The
ransomware virus, as a tool that bypasses the municipality's security and




Varsity Cube 2024 +27 81 278 3372

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
1 jaar geleden

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
VarsityC AAA School of Advertising
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
28686
Lid sinds
8 jaar
Aantal volgers
13258
Documenten
3117
Laatst verkocht
2 dagen geleden

4,1

2820 beoordelingen

5
1491
4
581
3
392
2
117
1
239

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen