Computer Misuse Act

Descripción

Fichas sobre Computer Misuse Act, creado por sha13130580 el 04/02/2015.
sha13130580
Fichas por sha13130580, actualizado hace más de 1 año
sha13130580
Creado por sha13130580 hace más de 9 años
12
2

Resumen del Recurso

Pregunta Respuesta
-Computer Misuse Act- *Offense 1* Lowest level of risk Logging on to someone else's account using their password-illegal Can carry the risk of being sentenced to six months in prison or a hefty fine.
-Computer Misuse Act- *Offense 2* Personal gained access to someone else's system for the sole purpose of doing something illegal. Can enter restricted area by trial and error or by using a special program (May want to steal something from a company) Up to 5 years prison sentence or a hefty fine.
-Computer Misuse Act- *Offense 3* Unauthorized modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage (the difference is the 'intent to cause damage') If you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. Can carry up to five years in prison or a fine.
-Computer Misuse Act- *Offense 3a* Making, supplying or obtaining material that could be used in computer misuse offences Making- Includes the writing or creation of computer viruses, worms, Trojans, malware or malicious scripts. Supplying- Distribution of any above material whether you have created it yourself or obtained from somewhere else & distributed the files to others. Obtaining- Purposely obtain malicious files e.g. viruses that you know could damage a computer system then you have committed an offense. Up to five years prison and a unlimited fine.
-- Introduction -- Computer Misuse Act In 1990, they created a Computer Misuse Act to protect the following offenses: 1. Unauthorized access to computer material 2. Unauthorized access with intent to commit or facilitate a crime. 3. Unauthorized modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Mostrar resumen completo Ocultar resumen completo

Similar

Ethical, Social and Legal Aspects
Samuel Allen
Capitales Europeas
Diego Santos
Ecuaciones diferenciales lineales de segundo orden
Juan Beltran
MAPA CONCEPTUAL DE POLITICAS PUBLICAS
pamm_1805
TEOREMA de PITÁGORAS - Del Mapa Mental
JL Cadenas
Conclusiones acerca de Platón
Diego Santos
Línea del Tiempo: La Creación de la Tierra
Valdeavellano
ATMÓSFERA
Ulises Yo
Mapa conceptual sobre ALGORITMOS
William Giraldo
TRIÁNGULOS y CUADRILÁTEROS
Ulises Yo
Test Estructuras II: Tipos de esfuerzos I
Pedro Landín