Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.

Similar presentations


Presentation on theme: "Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission."— Presentation transcript:

1 Computer Misuse By: Alex Meadows Michael Read

2 How can you misuse a computer? Accessing data stored electronically Copying software without permission Corrupting data Email and Chat room Abuse Pornography Grooming Identity and financial abuses Viruses

3 Hacking Defined as breaking into your IT system without consent. It is still an offence if no damage is done and no files are deleted Precautions such as Firewalls, Anti-Virus and secure passwords should be taken against hacking

4 Computer Misuse Act (1990) The act defines three specific offences: – Unauthorised access to computer material – Unauthorised access to a computer with intent to commit or facilitate the commission of a serious crime – Unauthorised modification of computer material

5 Computer Misuse Punishments Unauthorised access to computer material including copying software stored on the computer: – 6 months in prison or a £5,000 fine Unauthorised access with intent to commit further offences i.e. spreading viruses – 5 years in prison or an unlimited fine Changing computer information

6 Cyber-x type activities Taking malicious forms of offline communications online… – Cyber bullying – Cyber terrorism – Cyber stalker

7 …in the headlines today! A man incited riots on Facebook in Wales. The man was sentenced under the malicious communications act for four years. A disgruntled IT supplier hacked a estate agent website and replaced pictures of houses with pornography. The person was convicted under the computer misuse act.

8 How does computer misuse affect… Extra security to prevent unauthorised access to confidential data As an ISP, BT have to block access to illegal file sharing websites OFCOM regulations to tackle equivalence issues The different BT Group businesses have to operate from different building areas

9 How does computer misuse affect… Extra security to prevent unauthorised access to confidential data Payments are dealt with by a 3 rd Party to fully comply with the Data Protection Act Strict selling guidelines

10 Extra security to prevent unauthorised access to confidential data Obliged to alert users of ‘hoax’ websites Filter inappropriate content Prime arena for cyber-x activities How does computer misuse affect…

11 How the computer misuse act impacts the way in which an organisations products and services are offered General points to note – Increased internet security – Employee awareness programmes – Data Protection systems

12 Any Questions?


Download ppt "Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission."

Similar presentations


Ads by Google