Computer Misuse Act

Beschreibung

Karteikarten am Computer Misuse Act, erstellt von sha13130580 am 04/02/2015.
sha13130580
Karteikarten von sha13130580, aktualisiert more than 1 year ago
sha13130580
Erstellt von sha13130580 vor fast 10 Jahre
12
2

Zusammenfassung der Ressource

Frage Antworten
-Computer Misuse Act- *Offense 1* Lowest level of risk Logging on to someone else's account using their password-illegal Can carry the risk of being sentenced to six months in prison or a hefty fine.
-Computer Misuse Act- *Offense 2* Personal gained access to someone else's system for the sole purpose of doing something illegal. Can enter restricted area by trial and error or by using a special program (May want to steal something from a company) Up to 5 years prison sentence or a hefty fine.
-Computer Misuse Act- *Offense 3* Unauthorized modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage (the difference is the 'intent to cause damage') If you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. Can carry up to five years in prison or a fine.
-Computer Misuse Act- *Offense 3a* Making, supplying or obtaining material that could be used in computer misuse offences Making- Includes the writing or creation of computer viruses, worms, Trojans, malware or malicious scripts. Supplying- Distribution of any above material whether you have created it yourself or obtained from somewhere else & distributed the files to others. Obtaining- Purposely obtain malicious files e.g. viruses that you know could damage a computer system then you have committed an offense. Up to five years prison and a unlimited fine.
-- Introduction -- Computer Misuse Act In 1990, they created a Computer Misuse Act to protect the following offenses: 1. Unauthorized access to computer material 2. Unauthorized access with intent to commit or facilitate a crime. 3. Unauthorized modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Ethical, Social and Legal Aspects
Samuel Allen
Französisch für Anfänger
JohannesK
KPOL PuKW
Mona Les
C1 Indirekte Rede
Anna Kania
Unsere Erde - Sonnensystem, Klima, Erdschichten etc.
Laura Overhoff
GPSY ALPS
Malte Ni
Marketing
Nico Weingärtner
PuKW STEP6 - Hummel
Salome Jeong
Vetie - Tierzucht & Genetik - Fragen Übungen
Fioras Hu
Tierhaltung/-hygiene Klausur 2017
Kim Langner
Vetie Virologie 2013
Isabelle K.