Computer Misuse Act

Beschreibung

Karteikarten am Computer Misuse Act, erstellt von sha13130580 am 04/02/2015.
sha13130580
Karteikarten von sha13130580, aktualisiert more than 1 year ago
sha13130580
Erstellt von sha13130580 vor mehr als 9 Jahre
12
2

Zusammenfassung der Ressource

Frage Antworten
-Computer Misuse Act- *Offense 1* Lowest level of risk Logging on to someone else's account using their password-illegal Can carry the risk of being sentenced to six months in prison or a hefty fine.
-Computer Misuse Act- *Offense 2* Personal gained access to someone else's system for the sole purpose of doing something illegal. Can enter restricted area by trial and error or by using a special program (May want to steal something from a company) Up to 5 years prison sentence or a hefty fine.
-Computer Misuse Act- *Offense 3* Unauthorized modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage (the difference is the 'intent to cause damage') If you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. Can carry up to five years in prison or a fine.
-Computer Misuse Act- *Offense 3a* Making, supplying or obtaining material that could be used in computer misuse offences Making- Includes the writing or creation of computer viruses, worms, Trojans, malware or malicious scripts. Supplying- Distribution of any above material whether you have created it yourself or obtained from somewhere else & distributed the files to others. Obtaining- Purposely obtain malicious files e.g. viruses that you know could damage a computer system then you have committed an offense. Up to five years prison and a unlimited fine.
-- Introduction -- Computer Misuse Act In 1990, they created a Computer Misuse Act to protect the following offenses: 1. Unauthorized access to computer material 2. Unauthorized access with intent to commit or facilitate a crime. 3. Unauthorized modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Ethical, Social and Legal Aspects
Samuel Allen
2 C Entwicklungspsychologie März 2012
petra.drewitz
Bildungszitate
Laura Overhoff
Der Erste Weltkrieg
Laura Overhoff
Einführung in das wissenschaftliche Arbeiten
Flo Ma
Kunststoffe - Einführung
Fabian B.
Klinische Psychologie Teil 2
Lisa Mariá Hchil
Kommunikationssoziologie (KSOZ) Grimm 2017/18
Benedikt Zöchling
Vetie Pharmakologie 2018
Tropsi B
Vetie Pharma 2015
Anna Auferkamp
Vetie Spezielle Pathologie 2020
Svea Schill