Computer Science AS OCR
-
1-1-structure-and-function-of-the-processor as5 主题
-
1-2-types-of-processor as3 主题
-
1-3-input-output-and-storage as2 主题
-
2-1-systems-software as8 主题
-
2-3-software-development as5 主题
-
2-4-types-of-programming-language as4 主题
-
3-1-compression-encryption-and-hashing as3 主题
-
3-2-databases as3 主题
-
3-3-networks as8 主题
-
3-4-web-technologies as13 主题
-
html as
-
css as
-
css-styling as
-
javascript as
-
variables-and-constants-in-javascript as
-
outputs-in-javascript as
-
selection-in-javascript- as
-
for-loops-in-javascript- as
-
while-loops-in-javascript- as
-
strings-in-javascript- as
-
operators-in-javascript- as
-
nested-statements-in-javascript as
-
functions-and-procedures-in-javascript as
-
html as
-
4-1-data-types as8 主题
-
4-2-data-structures as4 主题
-
4-3-boolean-algebra as1 主题
-
5-1-computing-related-legislation as4 主题
-
5-2-moral-and-ethical-issues as9 主题
-
6-1-thinking-abstractly as3 主题
-
6-2-thinking-ahead as1 主题
-
6-3-thinking-procedurally as3 主题
-
6-4-thinking-logically as2 主题
-
6-5-thinking-concurrently as2 主题
-
7-1-programming-techniques as9 主题
-
8-1-standard-algorithms-and-big-o-notation as8 主题
the-computer-misuse-act-1990- as
Exam code:H046
The Computer Misuse Act 1990
What is the Computer Misuse Act?
-
The Computer Misuse Act (CMA) concerns the malicious use of computers
-
The act was originally created to make sure that computer hacking was covered within the law
-
It has been updated regularly to ensure it remains relevant
-
Features can be deployed to minimise the threat from unauthorised access for example digital signatures or certificates
-
Firewalls can be used to prevent external people accessing the system. They are key in preventing DoS or DDos attacks
Primary Offences Under the CMA
-
The Computer Misuse Act has 3 primary offences:
-
Unauthorised access to computer materials
E.g. If a student finds out a teacher’s password and then accesses their computer and opens their files. -
Unauthorised access with intent to commit further offences
E.g. If the student finds out a teacher’s password and then accesses their computer with the intent to increase their marks on their last test result. -
Unauthorised modification of computer files
E.g. If the student finds out a teacher’s password and then accesses their computer and increases their mark on their last test result.
-
The consequences of each offence are worse depending on whether it’s offence 1, 2 or 3 with each offence being punishable with time in prison.
Case Study
Two individuals were sentenced under the Computer Misuse Act for Theft of Data (opens in a new tab)
-
The Information Commissioner’s Office (ICO) has led the successful prosecution of 2 individuals for violating the CMA by stealing personal information to make scam calls
-
Kim Doyle who is now a former employee of the RAC was found guilty of transferring personal data to to accident claims firm without permission
-
This included data such as road traffic accident data, names, phone numbers and registration numbers
-
She pleaded guilty to conspiracy to secure unauthorised access to computer data, and selling unlawfully obtained personal data
-
Kim Doyle and William Shaw have been handed an 8 month prison sentence which was suspended for 2 years
Examiner Tips and Tricks
-
You need to make sure that when answering a question on the Computer Misuse Act that you not only describe the law but relate it to the relevant scenario asked
-
How does the Computer Misuse Act affect the company in the scenario?
-
What are the consequences of the actions taken?
-
Worked Example
“The Computer Misuse Act means that computer users are criminalised for simply trying to learn how systems work”
Discuss whether or not you agree with this statement.
9 marks
How to answer this question:
-
Describe your knowledge of the Computer Misuse Act
-
Mention the three main offences
-
Apply to a scenario, in this case the question hasn’t given us a full scenario so we can use our own
-
Keep the argument balanced, once you’ve spoken about one side, then speak about the other
-
Then write your conclusion and use your own opinion
Answer:
Example answer that gets full marks:
The Computer Misuse Act (CMA) is a provision for securing computer material against unauthorised access or modification to the system.
Under the CMA there are three main offences that you can be prosecuted for; The unauthorised access to a computer system, the unauthorised access to the computer system with intent to make changes and unauthorised access to the computer system and making changes.
Users can still investigate how computer systems work; they would just need to get authorisation before doing so. For example you could ask the owner of the computer system to allow access first or you could create a virtual computer system and use this to investigate.
The CMA could however be broken by accessing an email account of somebody without permission. Ultimately users need to make sure that they are aware of the law when accessing any computer system.
In conclusion I disagree with the statement “The Computer Misuse Act means that computer users are criminalised for simply trying to learn how systems work” as users are able to educate themselves on the details of the CMA easily online and therefore should know the consequences of accessing a computer system without the right authorisation. There are plenty of online platforms, programs and systems that are accessible to access virtually and would not be in breach of the CMA.
Responses