.

Sunday, May 12, 2019

What is meant and understood by the term computer misuse Essay

What is meant and understood by the term computer misuse - Essay instanceences with malicious activity such as hacking and viruses, which absorb been difficult to police due to jurisdictional difficulties and difficulties with personal individualism tracking of offenders (Finch, 2001).This analysis particularly focuses three different aspects of potential computer misuse realisely identity theft, online harassment (otherwise referred to as cyberstalking) and denial of service attacks (DDOS).Numerous press reports demonstrate how top financial institutions have fallen prey to cybercrime (Lloyd, 2004). The most common example is when an identity thief uses sensitive personal education to open a credit card account in a customers name through phishing (Thomas & Loader, 2000). Phishing is a high tech scam and uses spam to deceive customers into disclosing credit card numbers, jargon account information, passwords and other sensitive information, with banks such as Abbey National and Natwest having fallen prey to phishing attack (Thomas & Loader, 2000).In phishing cases, offenders rely on the consumer trust in the familiar brand often by using the somatic branding style and logo to manipulate the consumer into a false conception of a pre-existing commercial message relationship. This not only infringes the Electronic Commerce Regulations 2002 and The Privacy and Electronic Communications (EC Directive) Regulations 2003 (the Regulations), which prohibit unsolicited trade communications the use of brand name, style and logo also infringes the business intellectual property rights, which devalues the blessing in the business incurring significant financial losses.In its previous form, the Act covered two types of computer related offences firstly the unauthorised access to computer material and unauthorised modification of computer material. However, these offences were created before the Internet boom and did not foresee the full impact of online misuse s uch as hacking, viruses and spamming. This falls into a grey area legally which

4 comments:

  1. Your blog is very good and helpful for new student.
    Thank for sharing this information with us.
    I am glad.
    scape swanston

    ReplyDelete
  2. WOW ! Really a wonderful post. Thanks for posting such an informative & useful post with us.
    keep posting & inspire us like this post.
    Nice article.i love your all ideas.Glad for your excellent writing.Keep sharing more.
    aspen student life dublin

    ReplyDelete
  3. I am really happy to say it’s an interesting post to read .
    I learn new information from your article , you are doing a great job .
    Keep it up
    Student One Adelaide Street

    ReplyDelete
  4. Really great very nice blog post, Thanks for sharing this interesting and very informative content. Always keep sharing.
    axo new cross london

    ReplyDelete