NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
The Data Protection Act
|
|
Regulation of Investigatory Powers Act
|
|
Computer Misuse Act
|
|
Freedom of information Act
|
Detailed explanation-1: -The Computer Fraud and Abuse Act of 1986.
Detailed explanation-2: -Without his permission you access his amazon account and order a new computer console. you’re playing an online game, but your friend is scoring higher than you. you use a ‘booter’ to knock them off-line and thereby win the game. you hack into a police network.
Detailed explanation-3: -The Computer Misuse Act 1990 (CMA) is the main legislation that criminalises unauthorised access to computer systems and data, and the damaging or destroying of these.
Detailed explanation-4: -The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act: It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking .