Untitled

Beschreibung

Karteikarten am Untitled, erstellt von amanl006.303 am 16/05/2013.
amanl006.303
Karteikarten von amanl006.303, aktualisiert more than 1 year ago
amanl006.303
Erstellt von amanl006.303 vor mehr als 11 Jahre
43
1

Zusammenfassung der Ressource

Frage Antworten
What penalties can someone face if they are found guilty of these offences?
What can an organisation do to try to prevent someone from breaking into their system? 1 Use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other nasty programs out of your computer. Trojans allow hackers to take control of your computer and send spam and other harmful programs. Should you get one, a good anti-virus program knows how to quarantine and delete it without letting it cause damage. 2 Activate a firewall. Many people use
3 REASONS WHY HACKERS TRY TO BREAK INTO COMPUTER SYSTEMS? 1. Identity Theft. 2. Fraud. 3. Malicious Damage. 4. To see if they can.
Why was the Computer Misuse Act passed in 1990 Made certain activities illegal, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The Computer Misuse Act 1990 was created by the English Government to stop hackers from gaining control of another computer/computer system/computer network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed. More can be researched at the Link in the Related Links Section. The Computer misuse act protects users and customers through computer systems. This allows individuals to be safe and secure when it comes to using computer softwares.
What does the Computer Misuse Act stop? It stops hackers from gaining control of another computer system/network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed.
Three main offences that are covered by the Computer Misuse Act? Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password. Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank account unauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Zivilrecht - Streitigkeiten BGB AT
myJurazone
Zivilrecht - Zivilprozessrecht Streitigkeiten
myJurazone
Globalization – global challenges
ExamTime Bewerter
Klausur Thrombose 1.3.3.b
Kevin Kuncic
Der elektrische Stromkreis
Robert Mairginter
Pädagogik Abitur 2016: Erziehung im Nationalsozialismus
Lena S.
Kommunikationssoziologie Grimm 1
Victoria N.
Vetie - Tierzucht & Genetik - Fragen Übungen
Fioras Hu
SQ1 - Der Schlüssel zum Erfolg?!
B G
AOW-Psychologie SS18
Anna Huber
Vetie - AVO 2018
Schmolli Schmoll