Computer+Misuse+Act

Introduction
[|The Computer Misuse Act] (1990) is designed to protect computer users against wilful attacks and theft of information.

**What is it?** The Computer Misuse Act states that it is a crime to:
 * access a computer without permission
 * access a computer without permission, hoping to break, change or copy files
 * change, break or copy files without permission

**Key Terms** **Hacking** - using a computer to attempt to get into another person's computer, generally to carry out some form of malicious damage

**Phishing** - sending an email claiming to be a legitimate organisation (eg bank) and requesting the user to update personal information and then stealing that information.

**Identity theft** - using stolen information (eg bank account, password) to pretend to be someone else in an attempt to withdraw cash, apply for loans etc.

**Virus** - a malicious program or code that infects a computer system. It is loaded onto a user's computer without their knowledge and runs against their wishes.

**Trojan** - a destructive program that masquerades as a benign application. May allow a hacker remote access to a target computer system.

**Worm** - a program that replicates itself over a computer network and usually performs malicious actions.

**Spyware** - a program which is installed without the user's consent an which logs data (e.g. keystrokes, data transmitted over the internet).

**Malware** - short for malicious software, designed to damage or disrupt a system (virus, trojan, worm, spyware etc.)

[|Computer Misuse Act (N5)] [|Computer Misuse Act (Higher)]
 * BBC Bytesize**

**Questions** 1. Research the Computer Misuse Act 1990. What are the main offences covered by the Act? 2. Investigate what is meant by Denial of Service (DOS). Write a short blog post explaining the term and it's impact 3. Write a blog post explaining how identity theft can take place via the Internet