answersLogoWhite

0


Best Answer

Concept: The entry of a user into a system that he does not have permission to use. A user gained access to another user's system. Access can be access to information as well as the power to send commands to maliciously change the system.

Effect: Case sensitive information is now freely available to anyone, and can be used for fraud like insider trading. Blackmailing can also take place. Information can be altered to portray biased information, and systems can be crashed by the planting of viruses and worms, in order to sabotage a company.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

Most companies have a computer network (a group of computers all running of a server) or computer bank. People outside of the company do not have access to the network. If your a high rank in your job then you would generally have more access. Whereas lower people if they got into certain parts of the network that they are not allowed in this would be unauthorised access. Hackers however can get in. You have fire walls stopping hackers from getting in the the network, but they are more like fire doors, they are always open or there is always a way in. In a business situation in this network there could be account information, so someone with the right know how could get into the company bank account. There are millions of people out there who are capable of doing this myself included. But there is a very small percentage who would actually steal cash from a company.

MistroJoe

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

Malicious hacking into the data base of a company is a way that a company's competitors may gain knowledge of sensitive data. Depending upon what type of data had been gathered, it could obviously then be used to the advantage the hacker in the business arena.

This answer is:
User Avatar

User Avatar

Wiki User

9y ago

The effects of unauthorized access to computer systems can be destructive. This may tamper with the system and confidential information and data may also be accessed and used in the wrong manner.

This answer is:
User Avatar

User Avatar

Wiki User

16y ago

Unauthorised access would mean any kind of access without the permission

of either the rightful owner or the person in charge.

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

Most contractors do not have a soecial license outside of their license to practice. Make sure to do background check if you're genuinely worried about their history.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is unauthorised access to computer systems and how can this type of computer crime affect a business.?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Describe the category of unauthorised access to computer systems and services?

It simply means 'Hacking'.


What is unauthorised use of computer?

To access a computer that does not belong to you by means of breaking in and/or not having permission to access it.


What is the definition of computer missuse?

Refers to hacking , actions of people who gain access to people who gain access to computer systems when they have no right to do so. The technical term for this is "Unauthorised access" and the computer misuse act, hacking is a criminal offence and id recommend not to.


Computer program which seems legitimate that facilitates unauthorised access?

Trojan


When did The Public-Access Computer Systems Review end?

The Public-Access Computer Systems Review was created in 1990.


Do firewalls connect peripheralls?

No - a firewall is a piece of hardware and/or software to prevent unauthorised access to your computer over the internet.


Explain why firewalls are valuable tools for denying access to unauthorised persons on your computer?

because they can stop hackers from taking or viewing your data


List 5 risks to a user computer data?

1. List 5 risks to user's computer data


How does a USB lock actually work?

A USB lock works by physically blocking USB ports from unauthorised access, thus preventing unauthorised data transfer, which reduces the risk of data leakage, data theft and computer viruses.


Why hacking as defined in the law is not sufficient to cover other improper use and or access of computer and internet technology?

Because 'hacking' is just one type of unauthorised computer access. Other methods are:- key loggers, theft & cloning.


What is a sentence for unauthorized?

Unauthorized access was prohibited. So we came back.


What is unauthorised access from anything?

Not allowed to View, Modify, or Use.