100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Study guide

Computer Misuse

Beoordeling
-
Verkocht
-
Pagina's
12
Geüpload op
19-05-2020
Geschreven in
2019/2020

The internet is the greatest tool and forum for human creativity ever developed. It allows us to be creative in a way unlike any other tool and it allows for the sharing of the fruits of our creativity and fore collaborative creativity in a way we never imagined possible. Terms such as user-generates content, remix, fanfiction and many others have entered our conscience. However, every creative act may be seen by copyright holders to be a destructive act or an act of parasitical creation. How do we encourage this outpouring of creativity while protecting the interests of copyright holders? These notes examine the legal regulation of user-generated content and fanfiction in a problem-based scenario as well as discussing whether computer-generated works should qualify for copyright protection.

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Gekoppeld boek

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
19 mei 2020
Aantal pagina's
12
Geschreven in
2019/2020
Type
Study guide

Onderwerpen

Voorbeeld van de inhoud

Week 4:
Cybercrime:
Objective:
- Analyse different forms of computer misuse, critically evaluate the current legal response to these forms of computer
misuse and compare this response to alternative approaches.
- Todays’ topics:
o Cyber security risks & practice
o Hacking
o The legal response to hacking
o Alternative approaches
Computer misuse:
- Umbrella term as under the Computer Misuse Act 1990  includes a range of offences
The internet is for… crime?
- ‘On the internet, no one knows you’re a dog’
o Provides protection from social censure
o May facilitate fraud (use of proxies for identification)
 Deep web allows criminals to network
- Broad reach of the internet
o Large market for criminal services  they can move freely
o More challenging to police
Internet
Cyber Security Enabled Crime
Risks and Practice:
- Questions that have been asked:
o Iscybercrime
Why cybercrime something different
deserves than regular
separate crime? Should we conceptualise it differently?
attention:
Internet Enabled Crime:
- Why cybercrime deserves separate attention:
Lower risks &
Difficulties for Fewer online No face-to-face
high rewards for
enforcement barriers interaction
criminals


Intelligence
Massive
Personal, financial agencies and
potential for Right to privacy
& national security illegal access to
disruption
digtial info
-
o We’ve bred a new type of criminal
o Disruption:
 National security  impacting society as a whole
Cyber Security Is…
- A socio-technical systems problem
- Security problems almost always stem from a mix of technical, human and organisational causes
- Techniques of threat and attack analysis and mitigation
- Protection and recovery technologies, processes and procedures for individuals, business and government
- Policies, laws and regulation relevant to the use of computers and the Internet
Threats:
- Almost one in five small business owners say their company has had a loss of data in the past year. Small business
owners are particularly hurt by cyberattacks. According to recent data 63 percent of small business owners view data as
their new currency, and that a single data hack could have associated costs ranging from $82,200 to $256,000.
o Norman Guadango, Carbonite
- Cyberattacks now cost companies $200,000 on average, putting many out of business
- Risks:
o Data Loss
o Ransomware and Extortion
o Industrial IoT attacks industrial technology being attacked
o Internal Threats
o Physical Security Risks

, Threats

Unauthorized access Internal Data theft, corporate
and access control attacks Hacking espionage, identity theft




Attack Virus, Spear Phishing,
Social
Malware, Phishing, traditional
Vectors Botnet
Engineering
SE



Cloud
Extortion Ransomware attacks Dropbox, iCloud,
& OneDrive, Etc
breaches
-
Cyber-attack:
- Definition:
o A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or
alter confidential personal or organisational data.
- Insider Attacks:
o Attacks to an organisation carried out by someone who is inside that organisation.
o Difficult to counter using technical methods as the insider may have valid credentials to access the system.
- External Attacks:
o Attacks to an organisation carried out by an external agent.
o Requires either valid credentials or the exploitation of some vulnerability to gain access to the systems.
Insider attacks:
- Very common- nearly 75% are insider attacks
Cyberattacks by states:
- Massive political implications
Cyberattacks by terrorist groups:
- ISIS hacking the US
Malware:
- Software that has some malicious intent and which is installed on a user’s computer without that user’s consent.
- Key loggers
o Software installed on a computer that captures keystrokes and sends these to a remote system
o Used to try and get personal information to gain access to sites such as banks
- Ransomware
o Software that runs on a user’s computer and demands that the user pays some other organisation. If they don’t,
the information on their computer will be destroyed.
- Malware can usually spread itself from one computer to another either as a virus or as a worm
- Computer malware can cause destruction at a physical level
o Nuclear plants
 Used by the US and Israel against Iran to stop them developing nuclear weapons
o Hospitals
 Encrypted the data of hospitals, marking it hard for the hospital to access data
o Public transport
o Smart cities
- Worms
Smurfware:
- GCHQs SMURT ARMY can hack smartphones
o They go far in trying to detect crimes
Malware:
- Crypto-checking
Hacking:
Defining Hacking:
- Origins of the word ‘hacker’ = a ‘quick fix’
- Difficult to find consensus as to a definition:
o “gain unauthorized access (to data in a computer)” (OED [Oxford Dictionary])
o “unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or
network” (Digital Guards Database) [implies a level of connectivity]
- Common elements/activities?
o Theft of information
o Malware
o Changing websites
Forms of computer misuse:
- Mail-bombing
- Spam
€4,69
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
topqualitynotes London School of Economics
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
58
Lid sinds
6 jaar
Aantal volgers
43
Documenten
97
Laatst verkocht
1 maand geleden
Law Notes, Essay Guides, Interviews + Commercial Awareness !!

Tips for interviews - focusing primarily on commercial awareness in the legal sector First-class law notes! Ideal for both essay writing and exam revision. Contains detailed lecture notes, academic articles and textbook notes.

4,5

2 beoordelingen

5
1
4
1
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen