Regarding cybercrime law, the argument by Kristoffer is sufficient as the most important crime that has the potential to bring damage to information within an organization is that which deals with fraud. Computer fraud is taking shape and is being experienced in different organizations. The proliferation of the internet and the increase in computer access has heightened computer fraud. Computer fraud cybercrime law is therefore the most important law that has been put in place. Computer fraud act has been changed and amended several times to adapt to the changing face of computer fraud. There has been the need to have many amendments to thus crime laws (Atallah, 2001). Any law that gets a lot of amendments means that changes are experienced on a daily routine. Computer fraud is becoming a significant type of law as more organizations dispose their information and profiles on the internet. I, therefore, support the author that this is becoming an important law that has ever been developed (Casey, 2011).
Organizations have turned to the use of emails in order to undertake communication. Email communications still are the best and popular communication that is being used by organizations today. With the rise of social networks, hackers are turning to these new ways of communication to hack into company information and profiles for sensitive information. These communication channels are the most sensitive because employees are required to communicate their progress in their work. There is no better channel of communication that can supersede of email and use of social networks. These are the best channels so far. Attacks through emails are the most advanced and have the most devastating effects of companies. There are no strong mechanisms that have been put in place to ensure that email communication is safe (Casey, 2011).
References
Atallah, M.J. (2001). Information security and assurance. New Jersey, (NJ): Pearson Prentice Hall.
Casey, E. (2011). Foundations of digital forensics. In Digital evidence and computer crime: Forensic science, computers, and the Internet (3rd Ed.). (pp. 3-34). London, England: Academic Press.