Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Misuse Act 1990.

Similar presentations


Presentation on theme: "Computer Misuse Act 1990."— Presentation transcript:

1 Computer Misuse Act 1990

2 Introduction The Computer Misuse Act was established in 1990 as a result of two computer hackers, Robert Schifreen and Stephen Gold, breaking into British Telecom. Because of this, a law was introduced that encompassed computer hacking, viruses, worms and Trojans. The Computer Misuse Act is an important cornerstone to computer professionalism because it is relevant to every day computer activity.

3 Section One Section one of the computer misuse act states that a person guilty of an offence if: They cause a computer to perform any function with intent to secure access to any program or data held in a computer; They intend to secure unauthorised access They are fully aware of their actions The intent a person has to commit an offence does not need to be directed at: Any particular program or data A program or data of any particular kind A program or data held in a particular computer The punishment for such an offence is conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5, on the standard scale of both.

4 Section Two Section two of the computer misuse act states that a person guilty of an offence if they commit an offence under section one with intent of facilitating commission of further offences (even if the following offence is not possible). The punishment for such an offence is conviction to imprisonment for a term not exceeding five years or a fine or to both.

5 Section Three Section three applies to the unauthorised modification of secure data. This includes: Hindering the operation of any computer Impairing the readability of the data Any modification of any kind The punishment for such an offence is conviction to imprisonment for a term not exceeding five years or a fine or to both.

6 Conclusion This learning resource contains the facts about computer misuse. It is recommended to read around this subject to gain a comprehensive knowledge of act. To test you knowledge, please spend a few minutes on the following quiz.

7 Multiple Choice Questions

8 What is the maximum amount of time you can be imprisoned under the Computer Misuse Act?
A) Six months B) One year C) Five years D) Life

9 What is the maximum amount of time you can be imprisoned under the Computer Misuse Act?
A) Six months B) One year C) Five years D) Life Sections two and three of the computer misuse act state that if you knowingly commit a serious crime whilst gaining unauthorised access to a computer system or assist the progress of a Trojan or virus, you can be imprisoned for up to five years.

10 Are you breaking the law if you only attempt to gain unauthorised access, but fail in doing so?
Yes No It depends

11 Are you breaking the law if you only attempt to gain unauthorised access, but fail in doing so?
Yes No It depends It is an offence to even attempt to break into a system. Most of the time, the attack will be undetected as it has failed and it is unlikely that legal action will take place. However, if you are found trying to break into a computer system then you can be imprisoned.

12 Is it an offence in the computer misuse act if you look over someone’s shoulder while they enter their password? Yes No It depends

13 Is it an offence in the computer misuse act if you look over someone’s shoulder while they enter their password? Yes No It depends This may be covered by a company’s code of conduct or other laws, but it is not within the scope of the computer misuse act. Most password fields are hidden on modern systems anyway.

14 When was the computer misuse act created?
1985 1990 1995 2000

15 When was the computer misuse act created?
1985 1990 1995 2000 The computer misuse act was created in 1990 by UK Parliament. However, it was criticised at the time for being implemented too hastily and has undergone several revisions since then.

16 Robert Schifreen and Stephen Gold committed which crime which was responsible for the creation of the computer misuse act? Hacked into BT Created a virus that compromised NASA Electronically stole bank details Created the first botnet

17 Robert Schifreen and Stephen Gold committed which crime which was responsible for the creation of the computer misuse act? Hacked into BT Created a virus that compromised NASA Electronically stole bank details Created the first botnet Robert Schifreen and Stephen Gold hacked into BT between 1984 and 1985 using their home PCs. However, BT was accused of not taking security seriously as the username obtained was with password 1234.

18 Credits


Download ppt "Computer Misuse Act 1990."

Similar presentations


Ads by Google