Step 6: Computer Crime Comparison Table
Now that you have identified CFAA clones from at least three states, you will compare and contrast them with one another and the CFAA. Be sure to include specific vulnerabilities that the statutes are intended to address regarding computer access. Document your conclusions in the first section of the Computer Crime Comparison Table titled “Statute Comparisons.” This table will aid you in developing your solutions.
Submit your table for feedback.
Step 5: Identify State Statutes
Now that you have analyzed the federal statute addressing computer fraud and abuse, you will identify computer crime statutes, or Computer Fraud and Abuse Act state clones from three different states. Note and review these statutes carefully as you will use them in the following step.