From 7c696501a1c51ed334430d25c1a4eb9830a04828 Mon Sep 17 00:00:00 2001 From: Lukas Peters Date: Sat, 14 Sep 2024 11:27:17 -0400 Subject: [PATCH] expanded on background --- _posts/2024-09-12-the-line-between-adversarial-ml-and-cfaa.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/2024-09-12-the-line-between-adversarial-ml-and-cfaa.md b/_posts/2024-09-12-the-line-between-adversarial-ml-and-cfaa.md index 513438bce..546705d36 100644 --- a/_posts/2024-09-12-the-line-between-adversarial-ml-and-cfaa.md +++ b/_posts/2024-09-12-the-line-between-adversarial-ml-and-cfaa.md @@ -9,7 +9,7 @@ og_image: /assets/img/content/adversarial-ml.png
## Background -I wrote and presented this blog post for my PUBL-363 Cyber Security Policy and Law class. +I wrote and presented this blog post for my PUBL-363 Cyber Security Policy and Law class at Rochester Institute of Technology in the Fall semester of 2024. ## Introduction # CAAA and CFAA The Computer Fraud And Abuse Act (CFAA) was enacted in 1986 as part of the Comprehensive Crime Control Act (CCCA) passed by Congress in 1984. The CFAA introduced one of the earliest federal computer crime statutes which covered the conduct of a person who “accesses a computer without authorization, or, with authorization, uses the opportunity such access provides to obtain information beyond the scope of that authorization.”