Computer Misuse

Description

Mindmap all about computer misuse ;)
Vivia Shukla
Mind Map by Vivia Shukla, updated more than 1 year ago
Vivia Shukla
Created by Vivia Shukla almost 5 years ago
20
0

Resource summary

Computer Misuse
  1. The Computer Misuse Act 1990
    1. A law that determines if people are allowed to access computers and be able to modify the data on the computer system.
      1. It makes 'Unauthorised access' illegal, including hacking or other techniques to use a computer system uninvited.
        1. Such as using someone's password to get into their computer without them allowing you to
        2. 'Unauthorised Access' with intentions to commit further crime (such as fraud) is taken as an even more serious offence.
          1. Logging in as someone else, using an account account for something is an offence
          2. 'Unauthorised Modification' is also illegal. This is where you change data without permission or deliberately infecting a computer with a virus.
            1. Deleting files, changing files
            2. Making, supplying or gaining material that could be used in computer misuse offences
              1. Such as viruses
            3. Implications of a hacker gaining access to business-owned computers:
              1. Businesses will lose income if the hackers shut down their e-commerce system (electronically buying or selling products via online services/the Internet.
                1. Loss of reputation for businesses as people are unconvinced that their system is secure.
                  1. A risk of virus or malware infection that may be undetected but could send information to the criminal/hacker.
                    1. A cost to update and improve security to prevent further attacks.
                    2. Data Protection Act
                      1. Aims to protect anyone who has personal information stored on a computer system.
                      2. Information commissioner
                        1. The person that oversees companies who wish to store their customers' personal information.
                        2. Data controller
                          1. Organisation that stores data on an individual by registering with the information commissioner
                            1. The Data Subject is the person whose data is being stored, and they must give consent for their data to be stored.
                              1. They then have many rights
                                1. They are allowed to see any information held on them
                                  1. They may have to pay a fee for this
                                  2. They may ask to change data if they are not sure it is correct
                                    1. They can claim conpensation if their rights are broken
                                      1. They can prevent automated decision making
                                        1. However, the Data Subject cannot see information held on them if it is involved n national security or a police investigation.
                                    2. RESPONSIBILITIES
                                      1. Storing data no longer than necessary
                                        1. Measures of protection, e.g passwords, encryption (encoding a message so that only authorised users can access it)
                                          1. storing only relevant information
                                            1. ensuring the data is accurate and up to date
                                              1. Using data honestly, for a purpose agreed with the user.
                                                1. Not sending data to outside countries without first ensuring that it is secure and can be kept safe by legislation (laws) in that country.
                                                2. The Data Processor does not own the data, but will use the data on behalf of the Data Controller, following the same rules and regulations.
                                                3. The Copyright, Designs and Patents Act
                                                  1. Protects the creative work of individuals or businesses
                                                    1. They own 'copyright' so they can determine what to do with it, whether that is selling it, or simply being credited for their work.
                                                      1. They protect the original creators by making it a crime for anyone to download, use and share the copyright work without first paying, or sometimes just asking for permission
                                                      2. Protects from...
                                                        1. Software piracy, by illegal download or illegal distribution.
                                                          1. Use of software without the relevant license.
                                                            1. Theft of intellectual property, e.g. designs for 3D printers or text and written work
                                                              1. Using or downloading images without permission of the copyright owner
                                                                1. The illegal download of videos and audio files
                                                            2. The Communications Act 2003
                                                              1. It covers various different communications media, protecting against certain issues
                                                                1. Offensive and indecent images
                                                                  1. Sending such images of others is another offence covered by the Act, and deliberately sharing images with such content on social media can be an offence under the Act.
                                                                  2. Threatening behaviour online
                                                                    1. 'Trolling' is when you post comments to deliberately cause distress, and the Communications Act tries to prevent such threats happening. However, the law needs to be updated due to the fact that online trolls can cause offence wihout threat.
                                                                    2. Piggybacking
                                                                      1. When you use someone else's Internet connection of Wifi without their consent or without intention to pay.
                                                                  3. Why do hackers hack?
                                                                    1. To steal or modify information
                                                                      1. Disrupt business, pure mischief or a challenge
                                                                        1. Steal money, personal gain
                                                                          1. Make a point - political reasons, get revenge on people with opposing views
                                                                          Show full summary Hide full summary

                                                                          Similar

                                                                          How Legislation Affects Computer Users - Cambridge Nationals ICT
                                                                          Beth Coiley
                                                                          How Legislation Affects Computer Users - Cambridge Nationals ICT
                                                                          Jeanette O'Connor
                                                                          The Flowering Plant and Photosynthesis
                                                                          lalalucy13
                                                                          Tourism 1
                                                                          Scott Church
                                                                          chemistry: c2
                                                                          kristy baker
                                                                          GCSE REVISION TIMETABLE
                                                                          holbbox
                                                                          DNA Basics
                                                                          Sarah Juliette B
                                                                          Dr Jekyll and Mr Hyde THEMES
                                                                          deanakentish
                                                                          Phrasal Verbs
                                                                          Felipe Veintimilla
                                                                          BM 13 - COMENIUS, HERBART, DEWEY, HÖNIGSWALD
                                                                          christoph wimmer
                                                                          Boston Tea Party
                                                                          Shelby Smith