Monday, 2 April 2012

Computer Misuse Act and Copyright and Parents Act

The Computer Misuse Act was formed in 1990 and was aimed to deal with misuses of computers as they were becoming more popular around the world. The Act clearly states what is classed as causing an offence, some examples include:
  • Deliberately planting or transferring viruses to other computers which causes damage to the computer system and its data
  • Using somebody else's or an organisations' computer to carry out work
  • Hacking into another users' computer system intending to view information or alter it
  • Using a computer to commit fraud in any way
As computers became more popular throughout the world, hackers started to evolve. A hacker is somebody who gains unauthorised access to an ICT system. The main way they do this is by using the internet to hack into computers which share information through the Internet. Hackers can use the information that they gain in many ways, for an example, they may have viewed private data about another person with the intent to use it as black mail in the future. They may also damage or alter the data if they feel the need to. However, a hacker may not do anything with the information they have gained, therefore the owner may not find out about it.

As hackers became more common, computer users had to find a way to stop these people invading their computer systems. Firewalls are software and hardware which filter out unauthorized requests from people outside the network. They are also designed so that only certain data can be in the network, i.e false data cannot be inputted by a hacker if they get into the system and want to change it. It is now recommended that networks that use the Internet invest in a firewall.

Computer viruses cause a major threat to ICT systems. A virus replicates itself and transfers to other computers. This problem won't be too bad if you have a stand alone computer, but if you have several computers connected in one large network then this will be a massive problem. Viruses can display unnecessary messages on the computer screen, delete programmes, use up storage (making programmes run slowly) and spy your access to the internet. Spying on the internet is a massive problem because hackers can then obtain your personal information and use your credit card details to do things such as order expensive goods online that you don't want or know about.

All computers should be fitted with a virus checker or scanner which detects and deletes viruses before they effect your computer. However, it is important to update your viruse scanner or checker on a regular basis so that you will be protected against the latest viruses.

To help your computer into not catching a virus, here are some tips that you should follow when using your computer:

  • Ignore emails with file attachments or hyperlinks from people you don'y know or trust
  • Do not download information or access strange websites which are likely to have viruses that will damage your computer
  • Do not allow other people to use memory sticks in your computer until they have been scanned first
  • Install a virus checker/scanner

There are many physical methods that a person with valuable data can do to prevent unauthorized people from gaining access to their work. Here are some examples:
  • A computer user could clamp their computer to their desk, meaning that it can only be moved by the person with the key (who is the owner of the computer and the information inside) this may make it impossible for the computer to be moved without being damaged, which will mean that the information inside may also be damaged which defeats the idea of trying to steal the machine.
  • CCTV cameras can be positioned around the building so that intruders will be caught. They could also be positioned in the same room as the computer so that it can be protected against other staff members who may have access to the building, but not the computer.
  • Locks can be attached to doors so that the only people who have access are those with keys. However, these locks may be broken by some people who are desperate to steal information/misuse the computer. Though this will make it obvious to the owner that their computer is lost or damaged when they return to their property.
  • The location of the computer is important. For an example, you may want to locate your computer in a high building so that people walking past cannot see. You may also want to disguise the building as much as possible so that it doesn't look like a target.
The Copyright Law was created in 1988 when people began to spend a lot of time and money on creating their own pieces of work. Some examples of this include music, images, pieces of software and books. The Copyright designs and Parents Act protects an individual's property from being copied. Below are some examples of actions which are illegal to carry out:

  • Copying or downloading software illegally
  • Copying images or text without permission or claiming it as your own
  • Using peer to peer file sharing software i.e Limewire which got closed down
  • Running more copies of software than is allowed by the site licence
Once you have created your own work, there are some methods which you can use to protect it from plagiarism. Plagiarism is when you pass on somebody else's work as your own. An example of this is completing your ICT coursework but copying off the person next to you. If using somebody else's work is acceptable with what you are doing then you must state the name of the person who originally created it, where you got it from and when you got it.

Below is a link to a powerpoint about the Copyright Law: http://www.teach-ict.com/gcse/theory/dpa/theory/ict_legislation/legislation.html

No comments:

Post a Comment