Computer Misuse Act

Beschreibung

Karteikarten am Computer Misuse Act, erstellt von fra14141942 am 03/02/2015.
fra14141942
Karteikarten von fra14141942, aktualisiert more than 1 year ago
fra14141942
Erstellt von fra14141942 vor mehr als 9 Jahre
13
2

Zusammenfassung der Ressource

Frage Antworten
Computer Misuse Act -Used mainly against hacking -Prior to 1990 no legislation in place to tackle hacking -Computer misuse act passed n 1990 Recognised the following offences 1. Unauthorised access to computer material 2. Unauthorised access with intent to commit or facilitate a crime 3. Unauthorised modification of computer material 4. Making, supplying or obtaining anything which can be used in comouter misuse offences
Offence 1 -Unauthorised access to computer material -Lowest level of offence - One most people have done -This is when you guess or use someone's password to log into their area -Even if nothing is done to the files it is still breaking the act
Offence 2 -Unauthorised access with intent to to commit or facilitate a crime -This is when someone deliberately enters someone else's system with the purpose of doing something illegal -May of guessed or stole password -Could use trail and error or special programs to log into the system -Also could use phising to get the information -Could want information or to take money.
Offence 3 Unauthorised modification of computer material -If there is no intent then it is not breaking the act -This is when someone modifies or deletes data with the intent to cause damage to a person or company -Also purposely introducing a virus onto someone system breaks the act -Also if you knowingly transmit a virus to someone it breaks this act.
Offence 3a/4 Making, supplying or obtaining material that could be used in computer misuse offences Making: -This is writing or creating computer viruses, worms, trojans, malware, malicious scripts etc. Supplying: This is distributing of any of this material whether you have created it or not. Obtaining: If you obtain these materials then you know could be dangerous to systems then it is breaking the act
Penalties Offence 1: Up to six months in prison and/or a hefty fine Offence 2: Up to a five year prison sentence and /or a hefty fine Offence 3: Up to a five year prison sentence and /or a hefty fine Offence 3a: Up to a five year prison sentence and /or an unlimited fine
Problems -Very few cases have actually been prosecuted under this legislation -Even when it does the sentences tend to be lenient -Once the person is caught then it is too late because the damage is already done -It is hard to prove if someone is doing this by intent, most of the time the person says that they did not know it was illegal or that they didnt know what they was doing. -It is also hard to prove that it was actually that person that was on the account, a lot of people say that someone else must of logged onto there account.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Ethical, Social and Legal Aspects
Samuel Allen
Einstufungstest Italienisch Niveau A2.2
SprachschuleAktiv
PuKW Step 6 Teil 2
Mona Les
Grundzüge der Evolution und Struktur der Biosphäre
Weltraumkatze Fanroth
Einführung in die BWL: Kapitel 5
Anjay
working in a globalized wolrd
Alexandra Do
Lf. 2 Büroprozesse gestalten und Arbeitsvorgänge organisieren
Sarah Schneider
Vetie - Pharma 2017
Fioras Hu
Vetie Virologie 2015
J R
Chirurgie Kl. Wdk Vetie
Anne Käfer
Vetie Histopatho 2014
Ann-Kathrin Riedel