Computer+Misuse+Act

Introduction
[|The Computer Misuse Act] (1990) is designed to protect computer users against wilful attacks and theft of information.

What is it?
The data protection act states that it is a crime to:
 * access a computer without permission
 * access a computer without permission, hoping to break, change or copy files
 * change, break or copy files without permission

Key Terms
Hacking - using a computer to attempt to get into another person's computer, generally to carry out some form of malicious damage Phishing - sending an email claiming to be a legitimate organisation (eg bank) and requesting the user to update personal information and then stealing that information Identity theft - using stolen information (eg bank account, password) to pretend to be someone else in an attempt to withdraw cash, apply for loans etc. Virus - a malicious program or code that infects a computer system. It is loaded onto a user's computer without their knowledge and runs against their wishes Trojan - a destructive program that masquerades as a benign application. May allow a hacker remote access to a target computer system Worm - a program that replicates itself over a computer network and usually performs malicious actions Spyware - a program which is installed without the user's consent an which logs data (e.g. keystrokes, data transmitted over the internet) Malware - short for malicious software, designed to damage or disrupt a system (virus, trojan, worm, spyware etc.)

Computer Misuse Act Videos
media type="youtube" key="ZLPvKYhRsSk" height="390" width="480"

media type="youtube" key="B6APzz4FZG4" height="390" width="640"

Task
Research the Computer Misuse Act 1990. What are the main offences covered by the Act?

Task
1. Investigate what is meant by Denial of Service (DOS). Write a short blog post explaining the term and it's impact 2. Write a blog post explaining how identity theft can take place via the Internet
 * Higher Only**