2.6 Cyber security and the law
Check what you’ve learned about cyber security and the law by completing this activity.
Activity 1 The law
Q1. Consider a scenario:
A hacker steals the customer database of an organisation by exploiting a well-known vulnerability in their computer systems. This vulnerability hadn’t been fixed by the organisation despite the IT department being aware that there was a patch to fix the problem.
In the UK, under which of the following laws would the organisation have committed an offence?
Q2. Thinking about the same scenario:
A hacker steals the customer database of an organisation by exploiting a well-known vulnerability in their computer systems. This vulnerability hadn’t been fixed by the organisation despite the IT department being aware that there was a patch to fix the problem.
In the UK, under which of the following laws would the hacker have committed an offence?
Next, you’ll think about European laws and consider laws that apply in other countries.
OpenLearn - Introduction to cyber security
Except for third party materials and otherwise, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence, full copyright detail can be found in the acknowledgements section. Please see full copyright statement for details.
