answersLogoWhite

0

To access a computer that does not belong to you by means of breaking in and/or not having permission to access it.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

Computer program which seems legitimate that facilitates unauthorised access?

Trojan


Describe the category of unauthorised access to computer systems and services?

It simply means 'Hacking'.


What is unauthorised reproduction of legally protected computer programs?

Making copies for your friends. Imitating computer programs with the original ones It is referred to as piracy.


What is unauthorised access from anything?

Not allowed to View, Modify, or Use.


Why hacking as defined in the law is not sufficient to cover other improper use and or access of computer and internet technology?

Because 'hacking' is just one type of unauthorised computer access. Other methods are:- key loggers, theft & cloning.


Do firewalls connect peripheralls?

No - a firewall is a piece of hardware and/or software to prevent unauthorised access to your computer over the internet.


Why are tracking devices needed?

To stop unauthorised use or taking of equipment (or persons).


List 5 risks to a user computer data?

1. List 5 risks to user's computer data


Explain why firewalls are valuable tools for denying access to unauthorised persons on your computer?

because they can stop hackers from taking or viewing your data


What is unauthorised modification?

Unauthorised modification is changing the contents of a file without the granted permission


Why should you remove the Keys from the forklift after you have finished using it?

So that unauthorised people cannot use it.


What penalties can someone face if they are found guilty of offences against the computer misuse act?

The 3 main points are:Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password.Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank accountUnauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.