Cards (188)

  • How can graphics be stored?
    As bitmaps or vector instructions
  • What is a bitmap in graphics storage?
    A 2D array of pixels represented by a number of bits for each pixel
  • What are the advantages of bitmap images?
    They produce photo-realistic images and allow pixel-level editing
  • What are the disadvantages of bitmap images?
    They can produce large files
  • What are vector images in graphics storage?
    They store objects and their attributes to make up the image
  • What are the advantages of vector images?
    They produce small files and individual objects can be easily edited
  • What are the disadvantages of vector images?
    They cannot represent photo-realistic images
  • If a firewall is configured to allow data only on specific ports, what is its primary function?
    To control and filter incoming and outgoing network traffic.
  • What is meant by encryption?
    The scrambling of data using a complex process involving a 'key' value.
  • Why is it unfeasible to reverse the encryption process without knowing the key value?
    Because the data is scrambled in a way that requires the key to decode it.
  • What are the key steps companies must take after experiencing a data breach?
    • Inform the UK Information Commissioner within 72 hours
    • Assess the extent of the breach
    • Notify affected customers if necessary
    • Implement measures to prevent future breaches
  • What are the functions of a firewall in network security?
    • Controls incoming and outgoing network traffic
    • Allows data through specific ports
    • Blocks unauthorized access
    • Can log and monitor traffic for suspicious activity
  • What is the significance of encryption in data security?
    • Protects sensitive information from unauthorized access
    • Scrambles data to make it unreadable without a key
    • Ensures data integrity during transmission
    • Essential for secure communications
  •  Gaining access to a computer system without permission, as well as altering or removing information without permission of the owner is illegal under the Computer Misuse Act. The Act refers to these acts as "unauthorised access" and "unauthorised modification". It also defines a more serious crime if you intend to commit further criminal offences through your access or modification.
  • The act created three specific offences:
    • Unauthorised access to computer material.
    • Unauthorised access with intent to commit or facilitate commission of further offences.
    • Unauthorised acts with intent to impair operation of a computer.
  • What is the name of the UK law which makes hacking illegal?
    Display answer
    Answer
    Expected Answer: The Computer Misuse Act (1990)
  • What is the first offence related to unauthorized access to computer material?

    Any steps taken to gain access to a computer system.
  • Why is guessing someone's password to access a computer system considered an offence?

    Because it involves accessing materials without authorization, which is illegal.
  • If someone copies a file from another person's computer without permission, what is the legal implication?
    It is illegal, even if no damage is done to the file.
  • What are some examples of unauthorized access to computer material?
    • Using a Trojan Horse for remote access to search a hard drive.
    • Using a keylogger to steal a password.
    • Logging on with someone else's password.
  • What is a Trojan Horse in the context of unauthorized access?
    A malicious software that allows remote access to a computer system.
  • How does a keylogger facilitate unauthorized access?
    It records keystrokes to steal passwords.
  • What is the penalty for unauthorized access to computer material?
    Imprisonment up to six months and/or a fine.
  • Why is logging on with someone else's password considered an offence?

    Because it involves accessing a computer system without authorization.
  • What is the definition of unauthorized access with intent to commit or facilitate the commission of further offences?
    It involves accessing a system with the intent to commit further crimes.
  • Why is 'intent to commit' significant in the definition of unauthorized access?
    It indicates that the access is not just unauthorized but also aimed at committing further offences.
  • If someone guesses a password to access another person's online bank account, what crime are they committing?
    Unauthorized access with intent to commit further offences.
  • How does unauthorized access with intent differ from unauthorized access without intent?
    Unauthorized access with intent involves a plan to commit further crimes, while without intent does not.
  • What are some examples of unauthorized access with intent to commit further offences?
    • Gaining access to a computer system to change records for personal benefit.
    • Logging into someone else's online banking to transfer money to oneself.
    • Accessing personal data or images to blackmail the owner.
  • What is the maximum penalty for unauthorized access with intent to commit further offences?
    Up to five years' imprisonment and/or a fine.
  • What does the last main part of the Computer Misuse Act deal with?
    Actions that can cause changes or damage to a computer's programs and data
  • What was the original intent of the Computer Misuse Act regarding computer data?
    To deal with offences where people deliberately destroyed data or spread a computer virus
  • Why was the idea of 'impairing' the operation of a computer added to the Computer Misuse Act?
    To address more complex types of attacks such as ransomware and Denial of Service Attacks
  • What are some examples of offences under the Computer Misuse Act?
    • Deliberately spreading a computer virus
    • Gaining access to a computer system and deleting contents
    • Deploying ransomware software
  • What is the penalty for offences under the Computer Misuse Act related to unauthorized acts with intent to impair operation of a computer?
    Up to five years and/or a fine
  • In the scenario where Mary deletes the customer contact database after resigning, which part of the Computer Misuse Act does this fall under?
    Unauthorised Access with intent to commit or facilitate commission of further offences
  • What part of the Computer Misuse Act does Singh's action of entering a 'pass' into the result entry fall under?
    Unauthorised Access with intent to commit or facilitate commission of further offences
  • Lucy's action of reading out the test scores from the teacher's documents falls under which part of the Computer Misuse Act?
    Unauthorised Access to Computer Material
  • What part of the Computer Misuse Act does Daniel's installation of a 'keylogger' device fall under?
    Unauthorised Access with intent to commit or facilitate commission of further offences
  • In Rebecca's case, what part of the Computer Misuse Act is violated when Robert sends her a virus?
    Unauthorised acts with intent to impair operation of a computer