You are on page 1of 6

Unauthorized access to

Others computer systems advocacy

Addison Madalang

Melglen Lonogan

Billy Nalundasan

Marion Marcelino

1st/SY 2019-2020

November 14, 2019

Shirley Baterina Landingin


A. Identified Problem

 First problem that is identified in our advocacy is loss of information where user’s data can be

deleted or changed and it can also be stolen. Second is Damaged Reputation where some big

company’s reputation can be damaged due to hackers. Third is Decreased Privacy where these

hackers gain access to your computer and they can see everything that you are doing and attack

you if they want. And the last problem is financial losses where, every year, report of hacked

businesses reveal staggering financial losses as a result. (Sarah Morse 2019)

How to Solve:

 To avoid being hacked you need to update our OS (Operating Systems) frequently to keep hackers

from accessing your computers through vulnerabilities in outdated programs. Also you should

download up-to-date security programs to secure your computers. You should destroy all traces of

your personal info on hardware you plan on selling. Do not use open Wi-Fi on your router; it makes

it too easy for threat actors to steal your connections and download illegal files. Input hard

passwords so that they can’t easily access your account. And the last is keep sensitive data off the

cloud so that you will be always safe. (Wendy Zamora 2015)


B. Known facts

 According to The Computer Fraud and Abuse Act (CFAA) the leading federal anti-hacking

legislation that prohibits unauthorized access to another's computer system. Although the law was

originally meant to protect the computer systems of U.S. government entities and financial

institutions, the scope of the Act expanded with amendments to include practically any computer

in the country (including devices such as servers, desktops, laptops, cellphones, and tablets).

(FindLaw’s Team 2019)

 The internet has birthed an exponential increase in communication, transaction processing, service

accessibility and, unfortunately, cybercrime. With computer systems and the internet being used

by billions worldwide, there is an abundant pool of victims to be exploited. Statistics over the years

have shown that the impact of cybercrime has been astounding, with financial losses worldwide

recorded at $158 billion in 2016, according to Forbes.com. The quantum of loss to data and

information can only be imagined. Computer systems and the internet are characterized by

anonymity. This haven of anonymity permits cybercrimes of various types and degrees to transcend

all physical borders. Computer hacking is defined as the deliberate access or infiltration of a

computer system or program without authorization. It is also the intentional access to a computer

system or program exceeding authorized access. According to Symantec's Information Security

Threat Report, computer hacking affects all arms of information and communication technology.

There are web threats, social media scams, communications and email threats, data breaches, cloud

and data storage compromises, law enforcement and critical data breaches. Nothing and no one is

exempted. (Lyna Griffin 2019)


 A key component of the Computer Fraud and Abuse Act is intentionally accessing a protected

computer without authorization. However, the law fails to explain exactly what a lack of

authorization means. In addition, the law refers to exceeding authorized access to a computer, but

a lack of definition of the term has caused extensive legal debate. Extremely harsh penalties can be

assessed against first-time offenders who access computers without authorization.

(Gabriel Grasso 2018)


C. Description of advocacy

1. Definition of advocacy
 An action that will give computer users an idea about hacking and what can they do to

avoid it.

2. Objectives
 To help any computer user to avoid getting hacked.

 Give idea to any user of computer about hacking and what can and the consequence if

they will be hacked.

 To give tips on any computer user so that they can avoid getting hacked.

3. Materials
D. references:

Morse, S. (2019, NA). The Negative Effects of Hackers.

Retrieved from

https://itstillworks.com/negative-effects-hackers-2867.html

Zamora, W. (2015, NA). 10 ways to protect against hackers.

Retrieved from

https://www.google.com/amp/s/blog.malwarebytes.com/101/2015/10/10-ways-to-protect-against-
hackers/amp/

FindLaw’s, NA. (2019, NA). Hacking laws and Punishments.

Retrieved from

https://criminal.findlaw.com/criminal-charges/hacking-laws-and-punishments.html

Griffin, L. (Computer Hacking: Laws & Consequences.

Retrieved from

https://study.com/academy/lesson/computer-hacking-laws-consequences.html

Grasso, G. (2018, NA). Federal-hacking-laws.

Retrieved from

https://grassodefense.com/federal-hacking-laws/

You might also like