Untitled

Description

Flashcards on Untitled, created by amanl006.303 on 16/05/2013.
amanl006.303
Flashcards by amanl006.303, updated more than 1 year ago
amanl006.303
Created by amanl006.303 over 11 years ago
43
1

Resource summary

Question Answer
What penalties can someone face if they are found guilty of these offences?
What can an organisation do to try to prevent someone from breaking into their system? 1 Use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other nasty programs out of your computer. Trojans allow hackers to take control of your computer and send spam and other harmful programs. Should you get one, a good anti-virus program knows how to quarantine and delete it without letting it cause damage. 2 Activate a firewall. Many people use
3 REASONS WHY HACKERS TRY TO BREAK INTO COMPUTER SYSTEMS? 1. Identity Theft. 2. Fraud. 3. Malicious Damage. 4. To see if they can.
Why was the Computer Misuse Act passed in 1990 Made certain activities illegal, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The Computer Misuse Act 1990 was created by the English Government to stop hackers from gaining control of another computer/computer system/computer network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed. More can be researched at the Link in the Related Links Section. The Computer misuse act protects users and customers through computer systems. This allows individuals to be safe and secure when it comes to using computer softwares.
What does the Computer Misuse Act stop? It stops hackers from gaining control of another computer system/network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed.
Three main offences that are covered by the Computer Misuse Act? Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password. Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank account unauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.
Show full summary Hide full summary

Similar

GCSE PE - 2
lydia_ward
Enzymes
daniel.praecox
Forces and Acceleration
Adam Collinge
MCAT Study Plan
Alice McClean
Revision Timetable
katy.lay
GCSE Maths: Understanding Pythagoras' Theorem
Micheal Heffernan
Testing for ions
Joshua Rees
PSBD TEST 1
amrik.sachdeva
2PR101 1.test - 10. část
Nikola Truong
mi mapa conceptual
Gloria Romero
Health and Safety at Work Act 1974 (HASWA)
Carina Storm