answersLogoWhite

0

Unauthorized access, you can be tagged as a hacker or simply as a malicious person trying to access others computer system.

Some country can punished you in this petty crime.

There is now a such law for Cyber crimes.

Hope my answer helped you.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

Describe the category of unauthorised access to computer systems and services?

It simply means 'Hacking'.


What is unauthorised use of computer?

To access a computer that does not belong to you by means of breaking in and/or not having permission to access it.


What is the definition of computer missuse?

Refers to hacking , actions of people who gain access to people who gain access to computer systems when they have no right to do so. The technical term for this is "Unauthorised access" and the computer misuse act, hacking is a criminal offence and id recommend not to.


Computer program which seems legitimate that facilitates unauthorised access?

Trojan


When did The Public-Access Computer Systems Review end?

The Public-Access Computer Systems Review was created in 1990.


Do firewalls connect peripheralls?

No - a firewall is a piece of hardware and/or software to prevent unauthorised access to your computer over the internet.


What services are offered at the computer cafe, including access to webmail?

The computer cafe offers various services, including internet access, printing, scanning, and access to webmail services.


Explain why firewalls are valuable tools for denying access to unauthorised persons on your computer?

because they can stop hackers from taking or viewing your data


List 5 risks to a user computer data?

1. List 5 risks to user's computer data


How does a USB lock actually work?

A USB lock works by physically blocking USB ports from unauthorised access, thus preventing unauthorised data transfer, which reduces the risk of data leakage, data theft and computer viruses.


Why hacking as defined in the law is not sufficient to cover other improper use and or access of computer and internet technology?

Because 'hacking' is just one type of unauthorised computer access. Other methods are:- key loggers, theft & cloning.


What is a sentence for unauthorized?

Unauthorized access was prohibited. So we came back.