Computer Misuse Act

Description

Flashcards on Computer Misuse Act, created by sha13130580 on 04/02/2015.
sha13130580
Flashcards by sha13130580, updated more than 1 year ago
sha13130580
Created by sha13130580 over 10 years ago
14
2
1 2 3 4 5 (0)

Resource summary

Question Answer
-Computer Misuse Act- *Offense 1* Lowest level of risk Logging on to someone else's account using their password-illegal Can carry the risk of being sentenced to six months in prison or a hefty fine.
-Computer Misuse Act- *Offense 2* Personal gained access to someone else's system for the sole purpose of doing something illegal. Can enter restricted area by trial and error or by using a special program (May want to steal something from a company) Up to 5 years prison sentence or a hefty fine.
-Computer Misuse Act- *Offense 3* Unauthorized modification of computer material This offence relates to the deletion or changes made to files with the intent to cause damage (the difference is the 'intent to cause damage') If you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act. Can carry up to five years in prison or a fine.
-Computer Misuse Act- *Offense 3a* Making, supplying or obtaining material that could be used in computer misuse offences Making- Includes the writing or creation of computer viruses, worms, Trojans, malware or malicious scripts. Supplying- Distribution of any above material whether you have created it yourself or obtained from somewhere else & distributed the files to others. Obtaining- Purposely obtain malicious files e.g. viruses that you know could damage a computer system then you have committed an offense. Up to five years prison and a unlimited fine.
-- Introduction -- Computer Misuse Act In 1990, they created a Computer Misuse Act to protect the following offenses: 1. Unauthorized access to computer material 2. Unauthorized access with intent to commit or facilitate a crime. 3. Unauthorized modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences.
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Reasons Why Development May Not Follow The Expected Pattern
jessica.godfrey
OCR GCSE Latin Vocab flash cards - all
jess99
Spanish Vocabulary- Beginner
ThomasK
Ionic Bondic Flashcards.
anjumn10
Year 11 Psychology - Intro to Psychology and Research Methods
stephanie-vee
AS Biology - Types of Carbohydrates.
pheebzda
English / FRUIT
Jan Laxckey
The Five Minute Lesson Plan Template
tom.roche_
PHR Sample Questions
Elizabeth Rogers8284
Body Systems Revision
D Arora