Untitled

amanl006.303
Flashcards by amanl006.303, updated more than 1 year ago
amanl006.303
Created by amanl006.303 almost 8 years ago
43
1

Description

Flashcards on Untitled, created by amanl006.303 on 05/16/2013.

Resource summary

Question Answer
What penalties can someone face if they are found guilty of these offences?
What can an organisation do to try to prevent someone from breaking into their system? 1 Use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other nasty programs out of your computer. Trojans allow hackers to take control of your computer and send spam and other harmful programs. Should you get one, a good anti-virus program knows how to quarantine and delete it without letting it cause damage. 2 Activate a firewall. Many people use
3 REASONS WHY HACKERS TRY TO BREAK INTO COMPUTER SYSTEMS? 1. Identity Theft. 2. Fraud. 3. Malicious Damage. 4. To see if they can.
Why was the Computer Misuse Act passed in 1990 Made certain activities illegal, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The Computer Misuse Act 1990 was created by the English Government to stop hackers from gaining control of another computer/computer system/computer network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed. More can be researched at the Link in the Related Links Section. The Computer misuse act protects users and customers through computer systems. This allows individuals to be safe and secure when it comes to using computer softwares.
What does the Computer Misuse Act stop? It stops hackers from gaining control of another computer system/network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed.
Three main offences that are covered by the Computer Misuse Act? Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password. Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank account unauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.
Show full summary Hide full summary

Similar

HISTOGRAMS
Elliot O'Leary
GCSE Maths: Understanding Pythagoras' Theorem
Micheal Heffernan
Using GoConqr to teach Maths
Sarah Egan
RadioTelefonia
Adriana Forero
Salesforce Admin 201 Exam Chunk 5 (126-155)
Brianne Wright
ARCO REFLEJO
Alejandra Garcia
COMUNICACIÓN Y LENGUAJE
LUIS ALEJANDRO GOMEZ VARGAS
Educación preescolar en Colombia Ley 115 de 1994
Catherine Salamanca
LA ÉTICA EN LA EMPRESA
Elizabeth Flores
DERECHO INTERNO E INTERNACIONAL.
Ha-neul Park
TEST SOBRE LOS CONOCIMIENTOS BÁSICOS EN TICS
Luis Ángel Domínguez Ruíz