LAW 602 Lecture Notes - Lecture 10: Ontario Securities Commission, Cybercrime, Regulatory Offence
Document Summary
Cyber space prone to same hazards, risks, annoyances found in real space, as well as lack of jurisdictional boundaries, physical constraints, feature of anonymity. Criminals able to defy conventional jurisdictional constraints, weave attacks through multiple jurisdictions. Constraints that govern physical interactions do not apply to cyber space. In cyber space no requirement for physical proximity to commit crime. Conduct illegal, unethical in one jurisdiction may be considered legal in another. Cyber space allows individuals to conceal their identities in ways not possible in real, physical world. Cyber attacks impact mainstream computing devices such as laptop and desktop computers. Attractive to attackers due to their prevalence and popularity. Cyber criminals likely to turn attention toward non-mainstream platforms in future, especially if lucrative rewards. As email security improves, attackers will turn to more sophisticated platforms, such as web browsers; data hiding through encryption attractive to criminals.