COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Entering a computer system without permission.
A
Unauthorised access to computer material
B
Unauthorised access with the intent to commit a further crime
C
Unauthorised modification of data
D
Making, supplying or obtaining anything which can be used for computer misuse
Explanation: 

Detailed explanation-1: -Unauthorized computer access, popularly referred to as hacking, describes a criminal action whereby someone uses a computer to knowingly gain access to data in a system without permission to access that data.

Detailed explanation-2: -Hacker is commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can “hack” his or her way through the security levels of a computer system or network.

Detailed explanation-3: -The following are additional examples of malicious insider activities in order to obtain unauthorized access: Asking to “borrow” or taking another employee’s badge. Trying to “piggyback” by following another individual through access doors. Logging on to a computer using a co-worker’s password or credentials.

There is 1 question to complete.