Unauthorized access or modification of information

Unauthorized access and modification of information

What is unauthorized access?
unauthorized access refers to someone gaining access to information that they are not allowed to see, these can be documents that contain personal information e.g. medical documents, address. This is also covered under the computer misuse act, there are for main illegal activities that link to unauthorized access and modification of information, these are unauthorized access to computer material with the intent to commit further crimes, entering a computer system without permission and modifying or deleting data and also implanting viruses within a computer.

What happens if your are caught committing one of these offences?

Unauthorized access to computer material - six months in prison/£5,000 fine or both.

unauthorized access to computer materials with the intent to commit further crimes - five year prison sentence/unlimited fine or both.

unauthorized modification of data - five year prison sentence/unlimited fine or both.

Why is there a need to protect intellectual property from theft, malicious content and damage? 
There is a need to protect intellectual property because it can protect your business and help it grow but it allows you to keep your own ideas. It is also important to protect your intellectual property like your bank account details as it stops anyone from stealing money and other information about you that you don't want people to know.







Integrity: This is means that your                    hashing method provides a way to check
information is impossible to be altered by a  --    check the integrity of the digital files
 non-authorised user.


Availability: This is means that your               System managers take precautions so that     
 data is can be easily accessed             --           the users get the right level of access to the
by authorised personnel.                                   information


These principles are important in IS (information security) because they are central to all studies in IS, the three main principles are refereed to as CIA and they are the ones that are studied the most.

Comments