Areas Of Misuse Of Computers And The Internet – Computer Misuse Act

Posted on September 22, 2017 By

You should already be familiar with data [data: information without context, for example, a list of students with serial numbers, is data. When these figures represent the placement in a 100 meter race, the data becomes an information] plus computer misuse [the data stored electronically is easier to access]; with software program [software: a general term used to describe an application or program], which may not be reproduced with out permission. The consequences leads to Software piracy [piracy: the acquisition, benefit from the use or making changes to copyright material without prior permission]; and hacking, and may lead to data corruption; accidental or even deliberate.

Types of Computer Misuses

Misuse of computers and communication could be in different forms:


Hacking is for the unauthorized person uses a network [Network: A group of interconnected computers]and an Internet modem [modem: a piece of hardware that connects the computer to the Internet] to get into security passwords or other security associated with data stored on another pc. Hackers sometimes use software hacking tools and often target some websites on the Internet. Their exploitation is not just limited to private networks but also in order to government and corporate computer systems.

Misuse of data and illegal transfer or copy

Copying and unlawfully transferring data quickly and easily online making use of computers and large storage gadgets such as hard disk drives [HDD: a device used to store large volumes of data, on a hard disk], memory stays [memory stick: a thumb-sized portable storage device mainly used for transferring files between computers] and DVDs [Digital Versatile Disc- used to store data, for example, a film]. Personal data, company research and created work, such as novels and books cannot be reproduced without permission from the copyright holder.

Copying and submission of copyright software, music plus film

This also applies to the duplicating of music and movies in order to circulate on the Internet without the copyrights [copyright: Indicates the creator of an original piece of work and controller of the publication, distribution, and adaptation] authorization holder. This is really a widespread misuse of both computer systems and the Internet that overlooks the particular copyrights rules and regulations.


A large a part of indecent material and pornography can be obtained via the Internet and can be kept in electronic form. There have been many cases of materials that are categorized as illegal, or that display illegal acts, found stored upon computers, liable to prosecution for ownership of these materials.

Identity and economic misuses

This topic covers misuse associated with stolen credit card numbers to obtain items or services on the Internet, as well as the use of computers in financial frauds. These can range from complex well believed deceptions to simple applications, like printing of counterfeit currency making use of color printers.


Viruses: ultra tiny non-cellular organism that self-replicates alone in the host files and applications, are relatively simple programs [program: a list of instructions written in sequence] authored by men and designed to cause nuisance or even harm to computer system or their data files.

Cyber Security     , , , , ,