You are on page 1of 4

Computer misuses:

Computer misuse refers to the unauthorized use of all types of computer resources. These resources are seen to include all forms of computer hardware, networks, software and data related to computer technology. Computer misuse implies the disruption of services and/or the breaking of laws and regulations, which thereby constitutes an offence and is liable on conviction to a fine or to imprisonment or both. The Computer Misuse Act is designed to protect computer users against wilful attacks and theft of information. Offences under the act include hacking, unauthorized access to computer systems and purposefully spreading malicious and damaging software (malware), such as viruses. Unauthorized access to modify computers include altering software and data, changing passwords and settings to prevent others accessing the system, interfering with the normal operation of the system to its detriment. The act makes it an offence to access or even attempt to access a computer system without the appropriate authorization. Therefore, even if a hacker tries to get into a system but is unsuccessful they can be prosecuted using this law. The act also outlaws "hacking" software, such as packet sniffers, that can be used to break into or discover ways to get into systems. Although intention to do willful damage cannot be easily proved, the act makes it an offence for a hacker to access and use a system using another person's user name, including e-mail, chat and other services. The act also covers unauthorized access to different parts of a computer system, therefore, a person may be allowed to access one part of a system but not others, and the accessing of the other parts will be an offence. Note: the downloading or exchange of pirate software is not covered by this act but by other legislation. The penalties of breaking the CMA range from fines to imprisonment.
Computer and internet availability is not a big issue now. Most of the people try to misuse the computer resources. Some willing misuse the computer and some people unknowingly misuse the law. Mentioned below are the categories of computer misuse.

Computer hacking: Computer hacking is a technique of taking access over the unpermitted network or modem or other devices and the internet. The hackers usually try to grant admittance to the passwords and several different security sites in order to view the confidential information. There some tools used for hacking the sites.

Exploitation of the data, unconstitutional relocation of the data or photocopying: The information available in the internet is copied through various sources like hard disks, DVDs and pen drives. These types of informal moving of data are done simply with the use of the internet connections. Without having copy rights to access the personal information, research work of any company and novels, books written by the author's one cannot copy the information, but using some illegal techniques they gain access over this information.

Distribution of the copied software's, movies and music: The software, movies and music is illegally copied without the copy right and they are distributed all over. This can be called as piracy. They do not follow the laws and copy the material without taking permission from the copyright holders.

Abusing people through chat rooms and emails: Emails, chat rooms are used by some people who simply intend to disturb other individuals. The create email ids with improper identifications and spread news and rumors about famous personalities. They abuse people using chat rooms, they send spam mails to millions of people to market the goods and services that can be sometime legal, but many a times those which are illegal.

Pornography: Pornography is an illegal activity, and this type offensive stuff is exists on the internet and people store and keep this stuff in an electronic form. This kind of stuff has been declared illegal as they show all the illegal activities.

Financial abuses and identities In this category, come the misuse of stolen credit cards and the fantastic numbers of the credit cards in order to purchase online products and service. They perform illegal transaction of money from one account to other. A financial abuse also includes printing of unauthorized currencies using color printers.

Virus:

Virus is a software program written for causing damage and nuisance to the computers or files.
Common types of computer misuse

Accessing illegal material. In most cases, illegal material on computers means child pornography. Child pornography is contraband, and should be immediately reported to police. Some organizations worry that, if they report child pornography and the suspect is later cleared, they will be susceptible to being sued to Defamation. In practice, if the report is made in good faith, this never happens. If you find yourself in such Circumstances, Grant Thornton or other reputable IT forensics providers can advise you whether or not the material found is likely to fall under the category of illegal material.

Accessing pornographic material. This kind of behavior appears to have become less common in recent years, but still occurs regularly enough to remain a significant issue for companies. The problem is that while this activity can be interpreted as a form of sexual harassment, and failing to deal with it can place an organization at risk of legal action by its employees, it is not in any way illegal. This means it must be expressly prohibited by the acceptable use policy. In any case, where conventional pornography is tolerated, use can very often escalate into illegal material. Accessing grossly inappropriate material. Pornographic material is not the only kind of graphical material that can cause problems in an organization. In the past we have seen scatological, racist, sexist and discriminatory material, or other material meant deliberately to cause disgust or shock circulated in organizations. Again this material is not likely to be illegal, but might very easily lead to a legal claim it not actively suppressed. Bullying/defamation. Bullying is increasingly carried out over the internet, often using bulletin boards, social networking sites and anonymous e-mail accounts. Defamatory material can be sent in similar ways. This kind of material is traceable using internet computer forensics, but it requires specialist skills which may not be present in most organizations. Copyright theft. Illegal copying of music MP3s and other media is becoming more of a problem, not only because it is becoming more prevalent, but also because media companies and organizations are increasingly likely to take action against organisations, whose networks are used to download, store or distribute such materials. Access to restricted sites. Some organisations prohibit access to web-mail, gambling, sports and other sites, usually for very good reasons. Some users insist on visiting them, by means of visiting proxy sites, bypassing web-filtering programs or using independent internet connections. Action needs to be taken against such users for any acceptable use policy to remain in force. Possession of inappropriate software. It is not unusual for anti-virus software to detect the presence of hacking or network scanning software on user computers. While some of these have legitimate use in network administration, the presence of such software at the very least raises concerns about the possibility that they may be used for hacking. Worse still some of this software is rigged by its writers to load backdoors and other malicious software to the computers it is installed on. Another problem is the presence of media modifying or ripping software. This software is used to remove the copyright protections on media, and its presence can represent a significant legal threat to the organization that permits it. Installation of computer games/media. Obviously, games movies and other time wasting applications stored on computers are a major threat to productivity and need to be acted upon as soon as they are found. More extreme cases may require IT forensic analysis to establish a case for disciplinary action. Other breaches of acceptable use policies. Acceptable use policies need to be enforced for all users or the organization runs the risk of the policy being considered tacitly not in force. In such an event, the policy would be effectively unenforceable. In the past we have investigated

problems such as deliberate sharing of network privileges, culpable mishandling of customer data, theft of company-licensed software and many other serious problems. All can be dealt with quickly and effectively through the use of computer forensics. Excessive use. In our experience it generally takes hours of daily use over an extended period of time. Also, it needs to be demonstrating that the browsing was unrelated to the individuals role and that the individual had other duties that were not performed.

You might also like