Computer-Science-A-level-Ocr
-
3-3-networks8 主题
-
3-2-databases7 主题
-
3-1-compression-encryption-and-hashing4 主题
-
2-5-object-oriented-languages7 主题
-
2-4-types-of-programming-language4 主题
-
2-3-software-development5 主题
-
2-2-applications-generation6 主题
-
2-1-systems-software8 主题
-
1-3-input-output-and-storage2 主题
-
1-2-types-of-processor3 主题
-
1-1-structure-and-function-of-the-processor1 主题
-
structuring-your-responses3 主题
-
the-exam-papers2 主题
-
8-2-algorithms-for-the-main-data-structures4 主题
-
8-1-algorithms10 主题
-
7-2-computational-methods11 主题
-
7-1-programming-techniques14 主题
-
capturing-selecting-managing-and-exchanging-data
-
entity-relationship-diagrams
-
data-normalisation
-
relational-databases
-
hashing
-
symmetric-vs-asymmetric-encryption
-
run-length-encoding-and-dictionary-coding
-
lossy-and-lossless-compression
-
polymorphism-oop
-
encapsulation-oop
-
inheritance-oop
-
attributes-oop
-
methods-oop
-
objects-oop
-
capturing-selecting-managing-and-exchanging-data
-
6-5-thinking-concurrently2 主题
-
6-4-thinking-logically2 主题
-
6-3-thinking-procedurally3 主题
-
6-2-thinking-ahead1 主题
-
6-1-thinking-abstractly3 主题
-
5-2-moral-and-ethical-issues9 主题
-
5-1-computing-related-legislation4 主题
-
4-3-boolean-algebra5 主题
-
4-2-data-structures10 主题
-
4-1-data-types9 主题
-
3-4-web-technologies16 主题
-
environmental-effects
-
automated-decision-making
-
computers-in-the-workforce
-
layout-colour-paradigms-and-character-sets
-
piracy-and-offensive-communications
-
analysing-personal-information
-
monitoring-behaviour
-
censorship-and-the-internet
-
artificial-intelligence
-
the-regulation-of-investigatory-powers-act-2000
-
the-copyright-design-and-patents-act-1988
-
the-computer-misuse-act-1990
-
the-data-protection-act-1998
-
adder-circuits
-
flip-flop-circuits
-
simplifying-boolean-algebra
-
environmental-effects
the-computer-misuse-act-1990
The Computer Misuse Act 1990
What is the Computer Misuse Act?
-
The Computer Misuse Act (CMA) concerns the malicious use of computers
-
The act was originally created to make sure that computer hacking was covered within the law
-
It has been updated regularly to ensure it remains relevant
-
Features can be deployed to minimise the threat from unauthorised access for example digital signatures or certificates
-
Firewalls can be used to prevent external people accessing the system. They are key in preventing DoS or DDos attacks
Primary Offences Under the CMA
-
The Computer Misuse Act has 3 primary offences:
-
Unauthorised access to computer materials
E.g. If a student finds out a teacher’s password and then accesses their computer and opens their files. -
Unauthorised access with intent to commit further offences
E.g. If the student finds out a teacher’s password and then accesses their computer with the intent to increase their marks on their last test result. -
Unauthorised modification of computer files
E.g. If the student finds out a teacher’s password and then accesses their computer and increases their mark on their last test result.
-
The consequences of each offence are worse depending on whether it’s offence 1, 2 or 3 with each offence being punishable with time in prison.
Case Study
Two individuals were sentenced under the Computer Misuse Act for Theft of Data (opens in a new tab)
-
The Information Commissioner’s Office (ICO) has led the successful prosecution of 2 individuals for violating the CMA by stealing personal information to make scam calls
-
Kim Doyle who is now a former employee of the RAC was found guilty of transferring personal data to to accident claims firm without permission
-
This included data such as road traffic accident data, names, phone numbers and registration numbers
-
She pleaded guilty to conspiracy to secure unauthorised access to computer data, and selling unlawfully obtained personal data
-
Kim Doyle and William Shaw have been handed an 8 month prison sentence which was suspended for 2 years
Examiner Tips and Tricks
-
You need to make sure that when answering a question on the Computer Misuse Act that you not only describe the law but relate it to the relevant scenario asked
-
How does the Computer Misuse Act affect the company in the scenario?
-
What are the consequences of the actions taken?
-
Worked Example
“The Computer Misuse Act means that computer users are criminalised for simply trying to learn how systems work”
Discuss whether or not you agree with this statement.
9 marks
How to answer this question:
-
Describe your knowledge of the Computer Misuse Act
-
Mention the three main offences
-
Apply to a scenario, in this case the question hasn’t given us a full scenario so we can use our own
-
Keep the argument balanced, once you’ve spoken about one side, then speak about the other
-
Then write your conclusion and use your own opinion
Answer:
Example answer that gets full marks:
The Computer Misuse Act (CMA) is a provision for securing computer material against unauthorised access or modification to the system.
Under the CMA there are three main offences that you can be prosecuted for; The unauthorised access to a computer system, the unauthorised access to the computer system with intent to make changes and unauthorised access to the computer system and making changes.
Users can still investigate how computer systems work; they would just need to get authorisation before doing so. For example you could ask the owner of the computer system to allow access first or you could create a virtual computer system and use this to investigate.
The CMA could however be broken by accessing an email account of somebody without permission. Ultimately users need to make sure that they are aware of the law when accessing any computer system.
In conclusion I disagree with the statement “The Computer Misuse Act means that computer users are criminalised for simply trying to learn how systems work” as users are able to educate themselves on the details of the CMA easily online and therefore should know the consequences of accessing a computer system without the right authorisation. There are plenty of online platforms, programs and systems that are accessible to access virtually and would not be in breach of the CMA.
Responses