COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Unauthorised access to computer material
|
|
Unauthorised access with the intent to commit a further crime
|
|
Unauthorised modification of data
|
|
Making, supplying or obtaining anything which can be used for computer misuse
|
Detailed explanation-1: -Unauthorized computer access, popularly referred to as hacking, describes a criminal action whereby someone uses a computer to knowingly gain access to data in a system without permission to access that data.
Detailed explanation-2: -Hacker is commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can “hack” his or her way through the security levels of a computer system or network.
Detailed explanation-3: -The following are additional examples of malicious insider activities in order to obtain unauthorized access: Asking to “borrow” or taking another employee’s badge. Trying to “piggyback” by following another individual through access doors. Logging on to a computer using a co-worker’s password or credentials.