BS Computer Science 5th
Professional Practice
Computer Misuse & Criminal Law
Computer Misuse & Criminal Law
Introduction:
The media and popular computing press abound
with tales of multi-million pound computer frauds
and of the dangers to commercial companies,
governmental data banks, financial institutions
and national security from the activities of
computer hackers
Computing and criminal activity:
1. Modern business process is done through
utilizing computer software and hardware, i.e.
some form of computer system is used in it.
1. There has been a sharp rise in the number of
crimes involving computing; and the Internet
has undoubtedly created new security risks
Categories of misuse
Under the study of the English criminal law, the Law
Commission highlighted a number of categories of misuse of
computers
1. Computer fraud
2. Unauthorized obtaining of information from a computer
 Computer hacking
 Eavesdropping on a computer
 Making unauthorized use of computers for personal benefit
3. Unauthorized alteration or destruction of
information stored on a computer
4. Denying access to an authorized user
5. The unauthorized removal of information
stored on a computer

BS CS 5 Week 8 lecture 1.pptx

  • 1.
    BS Computer Science5th Professional Practice Computer Misuse & Criminal Law
  • 2.
    Computer Misuse &Criminal Law Introduction: The media and popular computing press abound with tales of multi-million pound computer frauds and of the dangers to commercial companies, governmental data banks, financial institutions and national security from the activities of computer hackers
  • 3.
    Computing and criminalactivity: 1. Modern business process is done through utilizing computer software and hardware, i.e. some form of computer system is used in it. 1. There has been a sharp rise in the number of crimes involving computing; and the Internet has undoubtedly created new security risks
  • 4.
    Categories of misuse Underthe study of the English criminal law, the Law Commission highlighted a number of categories of misuse of computers 1. Computer fraud 2. Unauthorized obtaining of information from a computer  Computer hacking  Eavesdropping on a computer  Making unauthorized use of computers for personal benefit
  • 5.
    3. Unauthorized alterationor destruction of information stored on a computer 4. Denying access to an authorized user 5. The unauthorized removal of information stored on a computer