Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Study guide

Computer Misuse

Puntuación
-
Vendido
-
Páginas
12
Subido en
19-05-2020
Escrito en
2019/2020

The internet is the greatest tool and forum for human creativity ever developed. It allows us to be creative in a way unlike any other tool and it allows for the sharing of the fruits of our creativity and fore collaborative creativity in a way we never imagined possible. Terms such as user-generates content, remix, fanfiction and many others have entered our conscience. However, every creative act may be seen by copyright holders to be a destructive act or an act of parasitical creation. How do we encourage this outpouring of creativity while protecting the interests of copyright holders? These notes examine the legal regulation of user-generated content and fanfiction in a problem-based scenario as well as discussing whether computer-generated works should qualify for copyright protection.

Mostrar más Leer menos
Institución
Grado

Vista previa del contenido

Week 4:
Cybercrime:
Objective:
- Analyse different forms of computer misuse, critically evaluate the current legal response to these forms of computer
misuse and compare this response to alternative approaches.
- Todays’ topics:
o Cyber security risks & practice
o Hacking
o The legal response to hacking
o Alternative approaches
Computer misuse:
- Umbrella term as under the Computer Misuse Act 1990  includes a range of offences
The internet is for… crime?
- ‘On the internet, no one knows you’re a dog’
o Provides protection from social censure
o May facilitate fraud (use of proxies for identification)
 Deep web allows criminals to network
- Broad reach of the internet
o Large market for criminal services  they can move freely
o More challenging to police
Internet
Cyber Security Enabled Crime
Risks and Practice:
- Questions that have been asked:
o Iscybercrime
Why cybercrime something different
deserves than regular
separate crime? Should we conceptualise it differently?
attention:
Internet Enabled Crime:
- Why cybercrime deserves separate attention:
Lower risks &
Difficulties for Fewer online No face-to-face
high rewards for
enforcement barriers interaction
criminals


Intelligence
Massive
Personal, financial agencies and
potential for Right to privacy
& national security illegal access to
disruption
digtial info
-
o We’ve bred a new type of criminal
o Disruption:
 National security  impacting society as a whole
Cyber Security Is…
- A socio-technical systems problem
- Security problems almost always stem from a mix of technical, human and organisational causes
- Techniques of threat and attack analysis and mitigation
- Protection and recovery technologies, processes and procedures for individuals, business and government
- Policies, laws and regulation relevant to the use of computers and the Internet
Threats:
- Almost one in five small business owners say their company has had a loss of data in the past year. Small business
owners are particularly hurt by cyberattacks. According to recent data 63 percent of small business owners view data as
their new currency, and that a single data hack could have associated costs ranging from $82,200 to $256,000.
o Norman Guadango, Carbonite
- Cyberattacks now cost companies $200,000 on average, putting many out of business
- Risks:
o Data Loss
o Ransomware and Extortion
o Industrial IoT attacks industrial technology being attacked
o Internal Threats
o Physical Security Risks

, Threats

Unauthorized access Internal Data theft, corporate
and access control attacks Hacking espionage, identity theft




Attack Virus, Spear Phishing,
Social
Malware, Phishing, traditional
Vectors Botnet
Engineering
SE



Cloud
Extortion Ransomware attacks Dropbox, iCloud,
& OneDrive, Etc
breaches
-
Cyber-attack:
- Definition:
o A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or
alter confidential personal or organisational data.
- Insider Attacks:
o Attacks to an organisation carried out by someone who is inside that organisation.
o Difficult to counter using technical methods as the insider may have valid credentials to access the system.
- External Attacks:
o Attacks to an organisation carried out by an external agent.
o Requires either valid credentials or the exploitation of some vulnerability to gain access to the systems.
Insider attacks:
- Very common- nearly 75% are insider attacks
Cyberattacks by states:
- Massive political implications
Cyberattacks by terrorist groups:
- ISIS hacking the US
Malware:
- Software that has some malicious intent and which is installed on a user’s computer without that user’s consent.
- Key loggers
o Software installed on a computer that captures keystrokes and sends these to a remote system
o Used to try and get personal information to gain access to sites such as banks
- Ransomware
o Software that runs on a user’s computer and demands that the user pays some other organisation. If they don’t,
the information on their computer will be destroyed.
- Malware can usually spread itself from one computer to another either as a virus or as a worm
- Computer malware can cause destruction at a physical level
o Nuclear plants
 Used by the US and Israel against Iran to stop them developing nuclear weapons
o Hospitals
 Encrypted the data of hospitals, marking it hard for the hospital to access data
o Public transport
o Smart cities
- Worms
Smurfware:
- GCHQs SMURT ARMY can hack smartphones
o They go far in trying to detect crimes
Malware:
- Crypto-checking
Hacking:
Defining Hacking:
- Origins of the word ‘hacker’ = a ‘quick fix’
- Difficult to find consensus as to a definition:
o “gain unauthorized access (to data in a computer)” (OED [Oxford Dictionary])
o “unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or
network” (Digital Guards Database) [implies a level of connectivity]
- Common elements/activities?
o Theft of information
o Malware
o Changing websites
Forms of computer misuse:
- Mail-bombing
- Spam

Libro relacionado

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
19 de mayo de 2020
Número de páginas
12
Escrito en
2019/2020
Tipo
Study guide

Temas

$6.12
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
topqualitynotes London School of Economics
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
58
Miembro desde
6 año
Número de seguidores
43
Documentos
97
Última venta
5 meses hace
Law Notes, Essay Guides, Interviews + Commercial Awareness !!

Tips for interviews - focusing primarily on commercial awareness in the legal sector First-class law notes! Ideal for both essay writing and exam revision. Contains detailed lecture notes, academic articles and textbook notes.

4.5

2 reseñas

5
1
4
1
3
0
2
0
1
0

Documentos populares

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes