Computer Misuse
Data that has been stored on a computer is, potentially,
easier to misuse than that stored on paper. Computer-based data can
be altered without leaving an obvious trace that it has changed. For
example, an exam score written in a mark book can be changed ... but
you can usually tell that the mark has changed. A mark stored on a computer
can be changed and it will look as if nothing has happened.
Malicious (harmful) programs can be introduced to a computer
that can damage the data stored on it; copy the data and send it somewhere
else; or simply change the stored data. The programs are named after
the way the get onto different computers: viruses,
worms and trojan
horses.
It is very easy to make copies of computer data without
leaving a trace that it has been done. A photocopier will also make
copies of paper-based data however, electronic copies of data can be
smuggled out easily on floppy disks, memory chips or over a network
connection.
Many computers are connected to a network or the internet.
If someone is persistent enough it is possible to use this connection
to gain access to the computer (and the data on it) from outside. Of
course, someone is able to physically break into a room and read data
from paper records, however, it is sometimes more difficult to trace
someone who has broken into a computer over a network or the internet.
The hacker is able to do this from their own room or even from another
country entirely.
All these activities are controlled by the Computer
Misuse Act of 1990.
|