Computer Misuse Act

Description

Flashcards on Computer Misuse Act, created by sha13130580 on 04/02/2015.
sha13130580
Flashcards by sha13130580, updated more than 1 year ago
sha13130580
Created by sha13130580 almost 10 years ago
12
2

Resource summary

Question Answer
-Computer Misuse Act- *Offense 1* Lowest level of risk Logging on to someone else's account using their password-illegal Can carry the risk of being sentenced to six months in prison or a hefty fine.
-Computer Misuse Act- *Offense 2* Personal gained access to someone else's system for the sole purpose of doing something illegal. Can enter restricted area by trial and error or by using a special program (May want to steal something from a company) Up to 5 years prison sentence or a hefty fine.
-Computer Misuse Act- *Offense 3* Unauthorized modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage (the difference is the 'intent to cause damage') If you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. Can carry up to five years in prison or a fine.
-Computer Misuse Act- *Offense 3a* Making, supplying or obtaining material that could be used in computer misuse offences Making- Includes the writing or creation of computer viruses, worms, Trojans, malware or malicious scripts. Supplying- Distribution of any above material whether you have created it yourself or obtained from somewhere else & distributed the files to others. Obtaining- Purposely obtain malicious files e.g. viruses that you know could damage a computer system then you have committed an offense. Up to five years prison and a unlimited fine.
-- Introduction -- Computer Misuse Act In 1990, they created a Computer Misuse Act to protect the following offenses: 1. Unauthorized access to computer material 2. Unauthorized access with intent to commit or facilitate a crime. 3. Unauthorized modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Show full summary Hide full summary

Similar

Ethical, Social and Legal Aspects
Samuel Allen
Application of technology in learning
Jeff Wall
Girls' and Boys'Education - A Mind Map Nikki and Mikayla
nikkifulps
Geography Coasts Questions
becky_e
Chemistry (C1)
Phobae-Cat Doobi
Physics GCSE AQA Unit 1 quiz
Adorkable_dreamer
Summary of AS Psychology Unit 1 Memory
Asterisked
Answering Unseen Poetry questions
mcglynnsiobhan
PMP® Pre-Test by Coursefountain.com
Team Coursefountain
Aplicaciones TIC
Klaudyna Filipkowska
(YOUR EVENT)
Shelby Smith