You have to be familiar with data [data: information without context, for example, a list of students with serial numbers, is data. When these figures represent the placement in a 100 meter race, the data becomes an information] and computer abuse [the data stored electronically is easier to access] are; Software [software: a general term used to describe an application or program] which may not be reproduced without permission. The consequences lead to software piracy [piracy: the acquisition, benefit from the use or making changes to copyright material without prior permission]; and hacking, and can cause data corruption; accidentally or intentionally
Types of Computer Abuses
Abuse of computers and communications can be in various forms :.
Hacking is when an unauthorized person uses a network [Network: A group of interconnected computers] and an Internet modem [modem: a piece of hardware that connects the computer to the Internet] to access passwords to the safety or security of the data stored on another computer. Hackers sometimes use software hacking tools and often focus on a number of sites on the Internet. The exploitation is not just limited to private networks, as well as to government and corporate computer networks.
abuse of data and unauthorized transfer or copying
copying and illegally fast transfer of data and easily online using computers and large storage devices such as hard disk drives [HDD: a device used to store large volumes of data, on a hard disk] memory sticks [memory stick: a thumb-sized portable storage device mainly used for transferring files between computers] and DVDs [Digital Versatile Disc- used to store data, for example, a film]. Personal data, research and written work, such as novels and textbooks may not be reproduced without permission of the copyright holder.
auteursrechtelijk copying and distribution of software, music and film
This includes copying of music and movies circulating on the Internet without the copyright [copyright: Indicates the creator of an original piece of work and controller of the publication, distribution, and adaptation] authorization holder. This is a widespread abuse of both computers and the Internet, which overlooks the copyright rules and regulations.
Much of indecent material and pornography is available via the Internet and can be stored in electronic form. There are several cases of materials that have been classified as illegal, or that show illegal acts found stored on computers, may be prosecuted for possession of these materials.
Identity and financial abuse
This topic covers abuse of stolen credit card numbers to obtain goods or services on the Internet, and the use of computers in financial fraud. These can range from complex thought deceptions for simple applications, such as printing of counterfeit money using color printers
Viruses :. Ultra microscopic non-cellular organism that replicates itself in the host files and programs are relatively simple programs [program: a list of instructions written in sequence] written by men and designed to cause nuisance or damage to their computer system or files.