The Computer Misuse Act: States it is illegal to perform :
Unauthorised access to computer material
Unauthorised access with the intent to modify or impair
Unauthorised access with the intent to commit further crime
Slide 5 - Tekstslide
Types of Malware?
Slide 6 - Woordweb
Malware
Mal = Malicious
ware = software
Software that is specifically made to disrupt, damage or gain unauthorised access to a computer system
Slide 7 - Tekstslide
MALWARE
NOT MALWARE
Firewall
Spyware
Virus
Compression
Trojan
Worm
Encryption
Compiler
Ransomware
Slide 8 - Sleepvraag
Did you know?
39% of UK businesses reported suffering a cyber attack in 2022.
In the year ending March 2022, there were an estimated 1.6 million (1,633,000) incidents of computer misuse experienced by adults aged 18 and over in England and Wales.
Garibaldi was a victim to a cyber attack...
Slide 9 - Tekstslide
Manipulating the person
Not all computer law is around the device and equipment
Many attacks are on the individual
This attack is known as SOCIAL ENGINEERING
Slide 10 - Tekstslide
Phishing - What is it and how to spot it?
Slide 11 - Tekstslide
GDPR (General Data Protection Regulation)
GDPR (General Data Protection Regulation), is a law that protects our data.
Thanks to GDPR, organisations need to get our consent before processing our personal data.
It governs the collection, use, and storage of personal data across the UK and and Europe.
Slide 12 - Tekstslide
What does the acronym GDPR stand for?
A
General Data Protection Regulation
B
Guarded Data Prevention Rules
C
General Data Prevention Rules
D
Generic Device for Protecting Rules
Slide 13 - Quizvraag
Copyright
Think:
What is copyright
How do you follow copyright law
Slide 14 - Tekstslide
Copyright
In pairs discuss:
What is copyright
How do you follow copyright law
Slide 15 - Tekstslide
Copyright Share:
Slide 16 - Open vraag
Copyright, Designs and Patents Act 1988
It provides legal protection on intellectual property :
original creative works,
designs,
and inventions.
It gives creators exclusive rights to control their intellectual property
If you intend to use someone else's intellectual property you should:
Get permission (which could involve a cost)
Slide 17 - Tekstslide
How do you avoid breaking copyright law?
Slide 18 - Tekstslide
Staying the right side of copyright law
Use royalty-free sites, for example:
www.pixabay.com
www.pexels.com
Obtain the rights to use the copyrighted media.
Buy it
Contact the owner and ask for permission
Slide 19 - Tekstslide
Consequences
Think:
What might be the concequences of breaking GDPR, Copyright or the Computer Misuse Act?
Slide 20 - Tekstslide
Concequences
In pairs discuss:
The concequences of breaking
Slide 21 - Tekstslide
Concequences Share:
Slide 22 - Open vraag
What could happen if you don't follow the rules...
Legal Penalties: Fines
Disciplinary/loss of job
Reputational Damage: Your company gets a bad rep so people less likely to use it
Business Restrictions: In extreme cases the company might be restricted from doing certain things.
Prison sentances.
There are many more...
Slide 23 - Tekstslide
What is the purpose of GDPR?
A
To restrict access to personal data by individuals
B
To promote data breaches
C
To allow companies to collect and use personal data freely
D
To protect personal data and privacy of EU citizens
Slide 24 - Quizvraag
What law do you need to follow when collecting assets (e.g. pictures, videos, writing, ect.) to include on a website?
A
Copyright Law
B
Computer Misuse Act
C
Health and Safety at Work Act
D
Criminal Law
Slide 25 - Quizvraag
What is the purpose of the Computer Misuse Act?
A
Stops Hackers and malware
B
Makes it illegal to gain unauthorised access to computer systems
C
Protect all personal data that is stored about someone
D
Makes it illegal to make viruses
Slide 26 - Quizvraag
Extension
Using your research skills look into these three malware threats:
Virus
Worm
Trojan
Create a resource that compares the three. What do they do and how are they different?