The Computer Misuse Act

  • Created by: Howzat
  • Created on: 21-11-18 16:49

The Computer Misuse Act

What computer misuses are covered by this law?

  • Hacking 
  • Creating malware e.g a worm
  • Using a keylogger
  • Defacing a website
  • Encrypting a device and demanding a ransom
  • Distrubuting phishing emails
  • SQL Injection
  • Pharming
1 of 2

The Computer Misuse Act

Section 1- 

The intent to gain access into a computer system and find data. For example, gaining access to a colleagues account without their permission is illegal.

Section 2-

The manipulation of private data. 

Section 3-

Gaining access to a computer system with the intent of damaging the systems operations e.g stealing data. 

Section 3ZA-

Gaining access to a computer system with the intension of causing series damage. Large scale attacks for example.

2 of 2

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all UNIT 1 resources »