0% found this document useful (0 votes)
19 views

Assignment: Professional Practice Assignment No: 2 Submitted To: Mam Shahwana Submitted By: M.waqas Zahid Roll No: BS-IT-19-59 Class

The document discusses various types of computer misuse and crimes under UK law including hacking, data theft, copyright infringement, cyberbullying, and viruses. It also explores legal liability for software safety and issues with social media misuse like privacy concerns, cyberbullying, and excessive time spent online negatively impacting social skills.

Uploaded by

waqas zahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Assignment: Professional Practice Assignment No: 2 Submitted To: Mam Shahwana Submitted By: M.waqas Zahid Roll No: BS-IT-19-59 Class

The document discusses various types of computer misuse and crimes under UK law including hacking, data theft, copyright infringement, cyberbullying, and viruses. It also explores legal liability for software safety and issues with social media misuse like privacy concerns, cyberbullying, and excessive time spent online negatively impacting social skills.

Uploaded by

waqas zahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 11

Assignment:

Professional practice
Assignment No :
2
Submitted to:
Mam shahwana
Submitted by:
M.waqas zahid
Roll No:
BS-IT-19-59
Class:
BS-Information Technology
(Evening)
Dated:
22-12-2020
Q.1 Computer Misuse & Criminal Law?
Ans:
The Computer Misuse Act 1990 (CMA) is an act of the
UK Parliament
passed in 1990. CMA is designed to frame legislation and
controls overcomputer crime and Internet fraud. The legislation
was created to:
➢ Criminalize unauthorized access to computer systems.

➢ Deter serious criminals from using a computer in the


commission of acriminal offence or seek to hinder or impair
access to data stored in a computer

TYPES OF COMPUTER MISUSE

➢ Hacking
➢ Data misuse and unauthorised transfer or copying

➢ Copying and distributing copyrighted software, music and film

➢ Email and chat room abuses


➢ Extreme material
➢ Identity and financial abuses
➢ Fraud and theft
➢ Viruses
HACKING

➢ Hacking is an unauthorised person uses a


network,Internet or modem connection to gain access past
security passwords or other security to see data stored on
another computer. Hackers sometimes use software hacking
tools and often target,
➢ for example, particular sites on the Internet.

DATA MISUSE AND UNAUTHORISED


TRANSFER OR COPYING

➢ Copying and illegal transfer of data is very quick and easy


using online computers and large storage devices such ashard
disks, memory sticks and DVDs. Personal data,company
research and written work, such as novels
and text books ,cannot be copied without the copyright
tholder's permission .
COPYING AND DISTRIBUTING COPYRIGHTED
SOFTWARE, MUSIC AND FILM

➢ This includes copying music and movies with computer


equipment and distributing it on the Internet without the
copyright holder's permission. This is a widespread misuse of
both computers and the Internet that breaks copyright
regulations.

EMAIL AND CHAT ROOM ABUSES

➢ Internet services such as chat rooms and email have been the
subject of many well-publicised cases of impersonation and deception
where people who are online pretend to have a different identity. Chat
rooms have been used to spread rumours about well known personalities.
A growing area of abuse of the Internet is email spam, where millions of
emails are sent to advertise both legal and illegal products and services.
IDENTITY AND FINANCIAL ABUSES

➢ This topic includes misuse of stolen or fictional credit card


numbers to obtain goods or services on the Internet, and use of
computers in financial frauds. These can range from complex well
thought out deceptions to simple uses such as printing
counterfeit money with colour printers.

VIRUSES

➢ Viruses are relatively simple programs written by people and

designed to cause nuisance or damage to computers or their files.


Q :2 Software Safety, Liability & Practices?

Explore area of legal liability and machanisim of regulating for
regulating potentially hazardous activity as well as the factor
which should be taken into account for safety related application

Nowdays, computer controlled system is to be found in wide
range of drivers application such as :-

➢ INDUSTRY:
Manufacturing systems, robots etc.

➢ MEDICINE:
Intensive care monitoring ,radiotherapy etc.

➢ TRANSPORT:
Railway signaling system , aircraft ,space shuttle etc.

➢ Military and defense application.


Q:3 Social Networking & Misuse?
Ans:
Social Networking:
• Communities of people who share interests and activities
• Social networks connect people at low cost
• Most social network services such as chat, messaging,
email, video, voice chat, file sharing, blogging, discussion
groups, and so on.

MISUSE OF SOCIAL NETWORKING

➢ Social Media is beneficial when you use it right. It's NOT


for stalking people. It's for knowing where people are, what
people do, what they think, and what's happening now to
their lives.
How are social networking sites misused?

➢ Loss of Privacy
➢ Sexual Predators
➢ Cyberbullying
➢ Time Consumption
➢ Loss of Social Skills

Loss of Privacy

• basic problem that can come with the use of social


networking sites is the loss of individual privacy. This is
because all social networking sites involve placing personal
information on the internet, and it's possible for people in
almost all corners of the world to see that information.
There are privacy settings for these sites, but many young
people can be careless about this.
Cyberbullying

• A cyberbully is someone who abuses another person


through the internet or other technology. Social
networking sites are often breeding grounds for such
abuse. This is because it's so quick and easy to post a
mean comment, send an intimidating message, start a
nastyrumor, or upload embarrassing photos.

Time Consumption

• They can be very addicting and take up a lot of students


time. That time could be used for more productive
activities.
Loss of Social Skills
• It seems to be contradictory that people would lose
social skills because of social networking sites.
However, some people perceive this as another
disadvantage. Many of today's students feel more
comfortable chatting with a person online than
talking in a verbal conversation.

You might also like