Thanks to visit codestin.com
Credit goes to www.scribd.com

67% found this document useful (3 votes)
1K views8 pages

Week 10 Computer Misuse and Criminal Law

The document discusses various types of computer misuse and criminal law. It outlines categories of computer misuse identified by the English Law Commission, including computer fraud, unauthorized access to computer information, unauthorized alteration or destruction of stored information, and denying authorized users access. Computer fraud is further divided into input frauds, output frauds, and program frauds. Unauthorized access involves computer hacking, defined as accessing a computer without authorization to steal or manipulate data, and eavesdropping.

Uploaded by

Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
1K views8 pages

Week 10 Computer Misuse and Criminal Law

The document discusses various types of computer misuse and criminal law. It outlines categories of computer misuse identified by the English Law Commission, including computer fraud, unauthorized access to computer information, unauthorized alteration or destruction of stored information, and denying authorized users access. Computer fraud is further divided into input frauds, output frauds, and program frauds. Unauthorized access involves computer hacking, defined as accessing a computer without authorization to steal or manipulate data, and eavesdropping.

Uploaded by

Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 8

Professional Practices

CS 625

Free Powerpoint Templates


Page 1
Computer Misuse & Criminal Law

Introduction:

The media and popular computing press abound with tales of


multi-million pound computer frauds and of the dangers to
commercial companies, governmental data banks, financial
institutions and national security from the activities of computer
hackers

Free Powerpoint Templates


Page 2
Computing and criminal activity

 Modern business process is done through utilizing computer


software and hardware, i.e. some form of computer system is
used in it.
 There has been a sharp rise in the number of crimes involving
computing; and the Internet has undoubtedly created new
security risks

Free Powerpoint Templates


Page 3
Categories of misuse
Under the study of the English criminal law, the Law Commission highlighted
a number of categories of misuse of computers
Computer fraud

Unauthorized obtaining of information from a computer


 Computer hacking

 Eavesdropping on a computer

 Making unauthorized use of computers for personal benefit

Unauthorized alteration or destruction of information stored on a computer

Denying access to an authorized user

The unauthorized removal of information stored on a computer

Free Powerpoint Templates


Page 4
Computer Fraud
 The Law Commission defined computer fraud as conduct which involves the
manipulation of a computer or internet, by whatever method, in order dishonestly to
obtain money, property, or some other advantage of value, or to cause loss
 Computer fraud is further divided into three categories

 Input frauds
e.g. intentionally entering false data or amending data into the computer

 Output frauds
Output fraud involves stealing or misusing system output

 Program frauds
Program fraud involves the dishonest alteration of a computer program

Free Powerpoint Templates


Page 5
Obtaining unauthorized access to a
computer
 The second form of misuse identified by the Law Commission
was unauthorized obtaining of information from a computer. It is
sub-divided as:
 Computer hacking:

Accessing a computer without the authorization of the owner. In


this case the person accesses the computer secretly for stealing
information, data or manipulation of data for diverse purposes

Free Powerpoint Templates


Page 6
Continued…

 Eavesdropping

Literal meaning listening or spying secretly

 Unauthorized use of a computer for personal benefit


Using computer’s authorized information for personal benefits. In this
case, the person misusing the computer is usually employee or authorized
user of the company

Free Powerpoint Templates


Page 7
Thank you!

Free Powerpoint Templates


Page 8

You might also like