Untitled

Descripción

Fichas sobre Untitled, creado por amanl006.303 el 16/05/2013.
amanl006.303
Fichas por amanl006.303, actualizado hace más de 1 año
amanl006.303
Creado por amanl006.303 hace más de 11 años
43
1

Resumen del Recurso

Pregunta Respuesta
What penalties can someone face if they are found guilty of these offences?
What can an organisation do to try to prevent someone from breaking into their system? 1 Use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other nasty programs out of your computer. Trojans allow hackers to take control of your computer and send spam and other harmful programs. Should you get one, a good anti-virus program knows how to quarantine and delete it without letting it cause damage. 2 Activate a firewall. Many people use
3 REASONS WHY HACKERS TRY TO BREAK INTO COMPUTER SYSTEMS? 1. Identity Theft. 2. Fraud. 3. Malicious Damage. 4. To see if they can.
Why was the Computer Misuse Act passed in 1990 Made certain activities illegal, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The Computer Misuse Act 1990 was created by the English Government to stop hackers from gaining control of another computer/computer system/computer network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed. More can be researched at the Link in the Related Links Section. The Computer misuse act protects users and customers through computer systems. This allows individuals to be safe and secure when it comes to using computer softwares.
What does the Computer Misuse Act stop? It stops hackers from gaining control of another computer system/network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed.
Three main offences that are covered by the Computer Misuse Act? Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password. Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank account unauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.
Mostrar resumen completo Ocultar resumen completo

Similar

CÁLCULOS con [ 3 · 5 · 7 ]
JL Cadenas
Compositores del Barroco
delfunkyweb20
Mind Mapping: 10 Estrategias para Docentes
maya velasquez
Los últimos Premios Nobel de Literatura
luisalenes
5 Pasos para el Éxito en el Aprendizaje_2
Diego Santos
Fichas Verbos inglés presente, pasado y participio (131)
JOWANI BELLO MELO
ANIMALES INVERTEBRADOS
Patssy Juliana Cabrera Rachen
Anatomía del Corazón
65951
Verb tenses
maria.mos2902
CLASIFICACIÓN DE TEXTO : Tipos de texto
Paula Andrea Cabeza Nova