Problem
1. Explain the Protecting Cyberspace as a National Asset Act and why this became an act.
2. Explain computer espionage according to U.S.C. 1030(a)(1)). What are the consequences?
3. What traditional laws can be used to prosecute computer crimes?