Cyber Crime Flashcards

1
Q

Malicious Communications 1988

A

A message which is indecent or grossly offensive
A threat
Information which is false and known / believed by the sender to be false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

S1 (2) – Defence to making a threat

A

(a)that the threat was used to reinforce a demandmade by him on reasonable grounds; and
(b)that he believed, and had reasonable grounds for believing,that the use of the threat was a proper means of reinforcing the demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

S1 -Unauthorised Access to Computer Material (Hacking)

A

Causing a computer to proform a function.
With intent to secure access to any program / data any computer
access is unauthorised
they know it is unauthorised.

An offence under section 1 can be committed by an employee who has authorised access to a computer but exceeds the authority or terms of access given by their employer. At this point the access becomes unauthorised. Regina v. Bow Street Magistrates Court and Allison (A.P.) Ex Parte Government of the United States of America [2002]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of secure access

A

Under section 17 securing access includes
Altering or erasing a program or data;
Copying or moving a program or data to a new storage medium;
Using data or having it displayed or ‘output’ in any form from the computer in which it is held.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unauthorised Access to Computer Materials with intent to commit an offence

A

commits an offence under section 1 above (“the unauthorised access offence”)
with intent
(a)to commit an offence to which this section applies; or
(b)to facilitate the commission of such an offence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorised Acts with intent to impair operation of a computer

A

A person is guilty of an offence if—
(a) he does any unauthorised act in relation to a computer;
(b) at the time when he does the act he knows that it is unauthorised;
And he intends
To impair the operation of any computer
to prevent or hinder access to any program or data held in any computer
To impair the operation of any such program or the reliability of any such data
To enable any of the things above to be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unauthorised Acts causing or creating serious risk of serious damage

A

A person is guilty of an offence if—
(a)the person does any unauthorised act in relation to a computer;
(b)at the time of doing the act the person knows that it is unauthorised;
(c)the act causes, or creates a significant risk of, serious damage of a material kind; and
(d)the person intends by doing the act to cause serious damage of a material kind or is reckless as to whether such damage is caused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Damage is of a “material kind” for the purposes of this section if it is—

A

damage to human welfare in any place;
damage to the environment of any place;
damage to the economy of any country; or
damage to the national security of any country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An act that causes damage to human welfare is only if it causes—

A

loss to human life;
human illness or injury;
disruption of a supply of money, food, water, energy or fuel;
disruption of a system of communication;
disruption of facilities for transport; or
disruption of services relating to health.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Making, supplying or Obtaining Articles

A

Make, Adapt, Supply or Offer to supply
Any article
Intending it to be used to commit or assist in the commission of an offence
Or
Supplies or offers to supply any article believing that it is likely to be used to commit or assist in the commission of an offence
Or
Obtains an article intending to use it to commit or assist in the commission of an offence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Seizing Digital Devices – ACPO Good Practice Guide for Digital Evidence (Principles)

A

Principle 1 – No action taken by law enforcement agencies, persons employed within those agencies or their agents should change data which may subsequently be relied upon in court

Principle 2 - In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

Principle 3 - An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Principle 4 – The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly