... UNIT 12 COMPUTER CRIME, FRAUD AND FINANCIAL CRIME Read the text and decide if you agree or disagree with the statements ... software that protects a computer system from unauthorised intruders Hacking Unauthorised access to computers IP Spoofing A technique used to gain unauthorised access to computers Macro ... the loss of the system while the investigation is carried out. 7. In the UK, unauthorised access to computer systems, programs or data is an offence under the Computer Misuse Act 1990, punishable...