Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored...
-
Upload
conrad-burke -
Category
Documents
-
view
226 -
download
0
Transcript of Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored...
![Page 1: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/1.jpg)
Computer Misuse
By:Alex Meadows Michael Read
![Page 2: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/2.jpg)
How can you misuse a computer?
• Accessing data stored electronically• Copying software without permission• Corrupting data• Email and Chat room Abuse• Pornography• Grooming• Identity and financial abuses• Viruses
![Page 3: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/3.jpg)
Hacking
• Defined as breaking into your IT system without consent.
• It is still an offence if no damage is done and no files are deleted
• Precautions such as Firewalls, Anti-Virus and secure passwords should be taken against hacking
![Page 4: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/4.jpg)
Computer Misuse Act (1990)
• The act defines three specific offences:– Unauthorised access to computer material– Unauthorised access to a computer with intent to
commit or facilitate the commission of a serious crime
– Unauthorised modification of computer material
![Page 5: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/5.jpg)
Computer Misuse Punishments
• Unauthorised access to computer material including copying software stored on the computer:– 6 months in prison or a £5,000 fine
• Unauthorised access with intent to commit further offences i.e. spreading viruses– 5 years in prison or an unlimited fine
• Changing computer information
![Page 6: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/6.jpg)
Cyber-x type activities
• Taking malicious forms of offline communications online…– Cyber bullying– Cyber terrorism– Cyber stalker
![Page 7: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/7.jpg)
…in the headlines today!
• A man incited riots on Facebook in Wales. The man was sentenced under the malicious communications act for four years.
• A disgruntled IT supplier hacked a estate agent website and replaced pictures of houses with pornography. The person was convicted under the computer misuse act.
![Page 8: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/8.jpg)
How does computer misuse affect…
• Extra security to prevent unauthorised access to confidential data
• As an ISP, BT have to block access to illegal file sharing websites
• OFCOM regulations to tackle equivalence issues
• The different BT Group businesses have to operate from different building areas
![Page 9: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/9.jpg)
How does computer misuse affect…
• Extra security to prevent unauthorised access to confidential data
• Payments are dealt with by a 3rd Party to fully comply with the Data Protection Act
• Strict selling guidelines
![Page 10: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/10.jpg)
• Extra security to prevent unauthorised access to confidential data
• Obliged to alert users of ‘hoax’ websites• Filter inappropriate content• Prime arena for cyber-x activities
How does computer misuse affect…
![Page 11: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/11.jpg)
How the computer misuse act impacts the way in which an organisations products and services are offered
• General points to note– Increased internet security– Employee awareness programmes– Data Protection systems
![Page 12: Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.](https://reader033.fdocuments.in/reader033/viewer/2022051316/5697bfd21a28abf838cab879/html5/thumbnails/12.jpg)
Any Questions?