Untitled

Description

Flashcards on Untitled, created by amanl006.303 on 16/05/2013.
amanl006.303
Flashcards by amanl006.303, updated more than 1 year ago
amanl006.303
Created by amanl006.303 almost 11 years ago
43
1

Resource summary

Question Answer
What penalties can someone face if they are found guilty of these offences?
What can an organisation do to try to prevent someone from breaking into their system? 1 Use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other nasty programs out of your computer. Trojans allow hackers to take control of your computer and send spam and other harmful programs. Should you get one, a good anti-virus program knows how to quarantine and delete it without letting it cause damage. 2 Activate a firewall. Many people use
3 REASONS WHY HACKERS TRY TO BREAK INTO COMPUTER SYSTEMS? 1. Identity Theft. 2. Fraud. 3. Malicious Damage. 4. To see if they can.
Why was the Computer Misuse Act passed in 1990 Made certain activities illegal, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The Computer Misuse Act 1990 was created by the English Government to stop hackers from gaining control of another computer/computer system/computer network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed. More can be researched at the Link in the Related Links Section. The Computer misuse act protects users and customers through computer systems. This allows individuals to be safe and secure when it comes to using computer softwares.
What does the Computer Misuse Act stop? It stops hackers from gaining control of another computer system/network and carrying out malicious activities. This meant changing sites, gaining access to prohibited information and other things. All who broke the legislation would be prosecuted and could be jailed.
Three main offences that are covered by the Computer Misuse Act? Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password. Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank account unauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.
Show full summary Hide full summary

Similar

TYPES OF DATA
Elliot O'Leary
Maths Revision
Asmaa Ali
An Inspector Calls: Mr Arthur Birling
Rattan Bhorjee
GCSE AQA Biology - Unit 1
James Jolliffe
GCSE AQA Biology - Unit 3
James Jolliffe
GCSE AQA Biology 2 Plants & Photosynthesis
Lilac Potato
AS Biology Unit 1
lilli.atkin
GRE Verbal Reasoning Vocabulary Flashcards 3
Sarah Egan
Photosynthesis and Respiration
Jessica Phillips
The Skeleton and Muscles
james liew
The Children Act 2004
Carina Storm