COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
The Data Protection Act
|
|
Regulation of Investigatory Powers Act
|
|
Computer Misuse Act
|
|
Freedom of information Act
|
Detailed explanation-1: -The Computer Fraud and Abuse Act (CFAA)
Detailed explanation-2: -Without his permission you access his amazon account and order a new computer console. you’re playing an online game, but your friend is scoring higher than you. you use a ‘booter’ to knock them off-line and thereby win the game. you hack into a police network.
Detailed explanation-3: -The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act: It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking .
Detailed explanation-4: -The Computer Fraud and Abuse Act of 1984 The CFAA criminalizes certain types of computer abuse by banning “unauthorized access” of computers and networks. The law has been used to successfully prosecute both high-and low-level hackers for both civil and criminal matters.