Professional Documents
Culture Documents
Computer Science Online Zoom Lesson - Computer Misuse Act 1990
Computer Science Online Zoom Lesson - Computer Misuse Act 1990
Keywords:
Brute force
Dictionary attack
Hacking
Do Now:
1. People who have data stored about them are called data subjects.
2. Personal data is about an individual who can be identified from that data.
3. Sensitive data is about an individual but could be used to discriminate against them.
Challenge:
In order to ensure that companies cannot share my data I would sign an agreement so that they
can’t share my data without my permission lest they wish to break the law and make themselves
liable to legal actions. However, agreeing to the company’s terms and conditions is nowadays a must
as people cannot use their programs without agreeing to it.
The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers
and viruses.
What is hacking?
Hacking can be defined as a series of steps wherein certain intruders are able to gain access to
critical or private systems which they would not normally have access to but get past that through
employing techniques such as backdoors or other exploits.
Computer hackers – Unauthorised user who attempts to or gains access to an information system.
Guessing the password to access someone else’s email account could be prosecuted as an
offence of unauthorised access to computer material.
Brute force
-trial and error – guessing at the correct code (0000) like a PIN number
Changing frequently
Limit attempts
Lockdown for an amount of time
Dictionary attack
- Working from a set list of words (common passwords, or phrases)
Using random characters, not using obvious words (password, names, colours)
Uncommon words together
Tuesday 26th January 2021