Sunteți pe pagina 1din 3

Teacher: Mrs.

Valli Class/Set: 10 Number of pupils: 25 Subject: GCSE Learning Objectives (WALT):

Date: 24/04/12

Time/Period: 1 Scheme of Work: Computer Misuse Act

Room: CC Level:5/6

Understand the 4 offences recognised by The Computer Misuse Act (1990) Understand the following concepts: hackers, phishing, virus, spyware, key-logging. Stay alert in recognising and taking precautions when you come across any Computer Misuse issues.

Intended Learning Outcomes (WILF): All must be able to: Name the 4 offences recognised by The Computer Misuse Act (1990) and its penalty Most should be able to: Explain what is phishing, virus, spyware, key-logging Some could: relate todays learning with data protection act Keywords: Computer Misuse Act, 1990, hackers, phishing, virus, spyware, key-logging, hacking. Reference to cross-curriculum issues (Literacy, Numeracy, Citizenship, PSHE, ECM..): Entry ( 2.5 mins) Starter (5 mins): Introduction - Hacking Some people just love to try and break into a computer system. Prior to 1990, there was no legislation in place to tackle the problems caused by hacking. As the problem grew, it became apparent that specific legislation was needed to enable hackers to be prosecuted under the law. Resources Computer Misuse Act.pptx

Main ( 20 mins): Explain WILF Computer Misuse Act: The Computer Misuse Act (1990) recognised four new offences: Unauthorised access to computer material Unauthorised access with intent to commit or facilitate a crime Unauthorised modification of computer material. Making, supplying or obtaining anything which can be used in computer misuse offences.

Offence 1:Unauthorised access to computer material Example: Found, guessed or used your password to log onto your user area? If people do this and then look at your files, even if they don't change, delete or damage anything, they are still guilty of accessing materials without authorisation - and this is illegal. Penalty: Up to six months in prison and /or a hefty fine

Offence 2: Unauthorised access with intent to commit or facilitate a crime

Difference between this and the first offence?


The person gaining access to someone elses system is doing so with the sole purpose of doing something illegal. Examples where people commit crime by unauthorised access? Guess or steal the password in order to get into someone's user area or their bank account. Penalty: Up to a five year prison sentence and /or a hefty fine

How?

Spyware:

KEYLOGGING Software: Keystroke logging (often called keylogging) Is the action of tracking (or logging) the keys struck on a keyboard. The person using the keyboard is unaware that their actions are being monitored.

Phishing:

Offence 3: Unauthorised modification of computer material Deletion or changes made to files with the intent to cause damage to an individual or company. Penalty: Up to a five year prison sentence and /or a hefty fine

Offence 4: Making, supplying or obtaining anything which can be used in computer misuse offences Making writing or creation of computer viruses, worms, Trojan, malware, malicious scripts. Supplying Distribution of any above material whether you have created it yourself or obtained it from elsewhere. Obtaining Purposely obtain malicious files such as computer viruses or scripts that you know could be used to damage computer systems. This part of the Act is known as 3A

Plenary ( 5 mins): AfL Exit ( 2.5 mins) Differentiation (related to Learning Outcomes) - G & T: Homework : No homework given due to time constraint (pupils need to complete their coursework within this week). Assessment including WILF: what_am_I_compmisuse_act.pdf Questions:

Answers: 1) Computer Usage Policy 2) Hacker 3) Firewall 4) Audit Log 5) Virus 6) 1990 Evaluation of the lesson:

Informal observations made by curriculum mentor [x]:

S-ar putea să vă placă și