Computer Misuse Act
What it covers - 3 offences:
1. Unauthorised access
This is when you get into someone else’s computer without their permission.
2. Unauthorised access with intent to commit another crime
This is when you get into someone else’s computer without their permission and intend to do a crime involving the computer.
3. Unauthorised modification of data
This is when you get into someone else’s computer without their permission and modify someone like the data which is very important. You could get a very long prison sentence for doing this.
Definitions
1. Viruses
This can be sent by emails or links and the person who owns its can gain control of the computer the virus is on and the owner wouldn’t know or be able to do anything about it.
2. Malware
a. Adware
This is software give to computers by adverts or pop ups online.
b. Spyware
This is software which is given to person’s computer and the person doesn’t know. The owner of the spyware can go through your computer and take your private details.
3. Spam
These can be messages or emails from people how and they put adverts for advertising or malware for trying to get peoples information.
4. Hacking
This is when someone gets into your computer and controls it and can get your information.
5. Botnets
Also known as the zombie army this is when many computers without the owners knowing are being used to transmit spam or viruses.
Examples of Hacking
1. Wargames – 1981/83
This was when someone managed to hack into the United States missile control and nearly managed to set up the missile to go off. America was very embarrassed as it was a very secure system that one person managed to hack into pretty easily.
2. Gary McKinnon
This person wanted to know more about space so he manged to hack into NASA which is one of Americas securest systems and have a look through. He didn’t find much out. America wanted him in their countries and jailed but the UK managed to keep him in the country and safe.
3. Lauri Love
This person managed to breach many US government computers. He was charged.
Downloads - worksheets
1. Worms, Trojans, Hoaxes
2. Protecting Your Computer
Hacking & Cracking