computer misuse act

HideShow resource information

You need to be familiar with the following ideas about data[datainformation without context, eg a list of students with numbers beside their names is data, when it's made clear that those numbers represent their placing in a 100 metre race, the data becomes information ] and computer misuse: that data stored electronically is easier to misuse; thatsoftwaresoftwareA general term used to describe an application or a program. should not be copied without permission; the consequences of software piracypiracy:acquiring, profiting from, using or making changes to copyrighted material without prior permission; that hacking can lead to corruption of data, either accidentally or on purpose.

Types of computer misuse

Misuse of computers and communications systems comes in several forms:

Hacking

Hacking is where an unauthorised person uses anetworknetworka group of interconnected computers, Internet or modemmodema piece of hardware that connects a computer to the Internet connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.

Data misuse and unauthorised transfer or copying

Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard diskshard diska device used to store vast amounts of data, the data is stored on a diskmemory sticksmemory sticka thumb-sized portable storage device used primarily for transferring files between computers and DVDsDigital Versatile Disc (DVD)used to store data, eg a movie. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.

Copying and distributing copyrighted software, music and film

This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright[copyrightLegal protection given to authors to help prevent unauthorised copying of their work. ] holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations.

Email and chat room abuses

Internet services such as chat rooms [chat roomaccessed on the Internet, users can meet to chat in real-time, messages are typed out but voice chat rooms exist too ] and emailemail:electronic mail - a message written or typed on a computer and sent electronically rather than by post have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used…

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »