COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Unauthorised access to computer material
|
|
Unauthorised access with the intent to commit a further crime
|
|
Unauthorised modification of data
|
|
Making, supplying or obtaining anything which can be used for computer misuse
|
Detailed explanation-1: -Crimes in which the computer is the target include the theft of intellectual property or marketing information, blackmail, or sabotage of operating systems and programs. In all of these crimes, the offender uses the computer to obtain information or to damage operating programs.
Detailed explanation-2: -Hacking: Hacking is usually understood to be the unauthorized access of a computer system and networks.
Detailed explanation-3: -"Unauthorized access” entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to these and other actions that interfere with computers, systems, programs or networks.