What it covers - 3 offences:
1. Unauthorised access
This is accessing a computer without explicit permisioon to do so.
2. Unauthorised access with intent to commit another crime
This means you access a computer you have not been explicitly allowed to and have done it in order to cause other damage to the computer or its files.
3. Unauthorised modification of data
This is accessing a computer and changing the data on it without the permission of the owner, this is what people are normally charged with as anything that you do on a computer changes a file, even logging on to your computer changes a log file on the computer and so most p[people can be charged with it.
1. Viruses
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
2. Malware
a. Adware
Adware is to describe a form of spyware that collects information about the user in order to display advertisements in the Web browser. Unfortunately, some applications that contain adware track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like this, then we move it into the spyware category and it then becomes something you should avoid for privacy and security reasons.
b. Spyware
Spyware is any technology that aids in gathering information about a person or organization without their knowledge.
Spyware is often installed without the user's consent, as a drive-by download, or as the result of clicking some option in a deceptive pop-up window. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information.
3. Spam
Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading malware, etc.

4. Hacking
This is where a person gains unauthorised access to a person or organisations computer system such as a website.
5. Botnets
6. A Botnet is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based.
Examples of Hacking
1. Wargames – 1981/83
This was a film based in a real story where a boy hacked into the US Nuclear Missile system and attempted to launch a missile. The boy came within two digits of a launch sequence before he was stopped.
2. Gary McKinnon 2002
He was a computer systems administrator who hacked into the NASA database in order to find out whether there was any information about UFOS. The US Government tried to get him extradited but in 2012 the home secretary said that they couldn’t do it.
3. Lauri Love
He was a British man who was charged with hacking into various agencies, including the US army, Nasa, the Federal Reserve and the Environmental Protection Agency.

1. Worms, Trojans, Hoaxes
2. Protecting Your Computer
3. Hacking & Cracking