Computer Misuse

Beschreibung

Mindmap all about computer misuse ;)
Vivia Shukla
Mindmap von Vivia Shukla, aktualisiert more than 1 year ago
Vivia Shukla
Erstellt von Vivia Shukla vor fast 5 Jahre
20
0

Zusammenfassung der Ressource

Computer Misuse
  1. The Computer Misuse Act 1990
    1. A law that determines if people are allowed to access computers and be able to modify the data on the computer system.
      1. It makes 'Unauthorised access' illegal, including hacking or other techniques to use a computer system uninvited.
        1. Such as using someone's password to get into their computer without them allowing you to
        2. 'Unauthorised Access' with intentions to commit further crime (such as fraud) is taken as an even more serious offence.
          1. Logging in as someone else, using an account account for something is an offence
          2. 'Unauthorised Modification' is also illegal. This is where you change data without permission or deliberately infecting a computer with a virus.
            1. Deleting files, changing files
            2. Making, supplying or gaining material that could be used in computer misuse offences
              1. Such as viruses
            3. Implications of a hacker gaining access to business-owned computers:
              1. Businesses will lose income if the hackers shut down their e-commerce system (electronically buying or selling products via online services/the Internet.
                1. Loss of reputation for businesses as people are unconvinced that their system is secure.
                  1. A risk of virus or malware infection that may be undetected but could send information to the criminal/hacker.
                    1. A cost to update and improve security to prevent further attacks.
                    2. Data Protection Act
                      1. Aims to protect anyone who has personal information stored on a computer system.
                      2. Information commissioner
                        1. The person that oversees companies who wish to store their customers' personal information.
                        2. Data controller
                          1. Organisation that stores data on an individual by registering with the information commissioner
                            1. The Data Subject is the person whose data is being stored, and they must give consent for their data to be stored.
                              1. They then have many rights
                                1. They are allowed to see any information held on them
                                  1. They may have to pay a fee for this
                                  2. They may ask to change data if they are not sure it is correct
                                    1. They can claim conpensation if their rights are broken
                                      1. They can prevent automated decision making
                                        1. However, the Data Subject cannot see information held on them if it is involved n national security or a police investigation.
                                    2. RESPONSIBILITIES
                                      1. Storing data no longer than necessary
                                        1. Measures of protection, e.g passwords, encryption (encoding a message so that only authorised users can access it)
                                          1. storing only relevant information
                                            1. ensuring the data is accurate and up to date
                                              1. Using data honestly, for a purpose agreed with the user.
                                                1. Not sending data to outside countries without first ensuring that it is secure and can be kept safe by legislation (laws) in that country.
                                                2. The Data Processor does not own the data, but will use the data on behalf of the Data Controller, following the same rules and regulations.
                                                3. The Copyright, Designs and Patents Act
                                                  1. Protects the creative work of individuals or businesses
                                                    1. They own 'copyright' so they can determine what to do with it, whether that is selling it, or simply being credited for their work.
                                                      1. They protect the original creators by making it a crime for anyone to download, use and share the copyright work without first paying, or sometimes just asking for permission
                                                      2. Protects from...
                                                        1. Software piracy, by illegal download or illegal distribution.
                                                          1. Use of software without the relevant license.
                                                            1. Theft of intellectual property, e.g. designs for 3D printers or text and written work
                                                              1. Using or downloading images without permission of the copyright owner
                                                                1. The illegal download of videos and audio files
                                                            2. The Communications Act 2003
                                                              1. It covers various different communications media, protecting against certain issues
                                                                1. Offensive and indecent images
                                                                  1. Sending such images of others is another offence covered by the Act, and deliberately sharing images with such content on social media can be an offence under the Act.
                                                                  2. Threatening behaviour online
                                                                    1. 'Trolling' is when you post comments to deliberately cause distress, and the Communications Act tries to prevent such threats happening. However, the law needs to be updated due to the fact that online trolls can cause offence wihout threat.
                                                                    2. Piggybacking
                                                                      1. When you use someone else's Internet connection of Wifi without their consent or without intention to pay.
                                                                  3. Why do hackers hack?
                                                                    1. To steal or modify information
                                                                      1. Disrupt business, pure mischief or a challenge
                                                                        1. Steal money, personal gain
                                                                          1. Make a point - political reasons, get revenge on people with opposing views
                                                                          Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                          ähnlicher Inhalt

                                                                          How Legislation Affects Computer Users - Cambridge Nationals ICT
                                                                          Beth Coiley
                                                                          How Legislation Affects Computer Users - Cambridge Nationals ICT
                                                                          Jeanette O'Connor
                                                                          Spielst du Fußball?
                                                                          Nadja Blust
                                                                          must, had to, mustn't oder don't need to
                                                                          escobar.annelize
                                                                          EU, OHG, KG, GmbH
                                                                          Stefan Kurtenbach
                                                                          Molekulare Genetik
                                                                          Gökhan Yesilyayla
                                                                          Klinische Psychologie Teil 2
                                                                          Lisa Mariá Hchil
                                                                          Kurvendiskussion
                                                                          Sophia Lörsch
                                                                          Vetie - Histo & Embryo P 2014
                                                                          Fioras Hu
                                                                          Vetie - Immuno Wdh 2012
                                                                          V R
                                                                          Vetie Pharma 2017
                                                                          Larissa Görz