Skip to main content

Computers

Volume 345: debated on Wednesday 1 March 2000

The text on this page has been created from Hansard archive content, it may contain typographical errors.

To ask the Secretary of State for Defence,pursuant to his answer of 14 February 2000, Official Report, column 372W, on computers (1) if he will list the eight different categories of misuse by which internal hacking incidents are categorised; and the number of hacking incidents by category for each of the last five years; [111112](2) what information is held on his Department's incident recording system about each internal hacking incident over the last five years. [111110]

[holding answer 22 February 2000]: My Department is a contributing Department to the Government wide Unified Incident Reporting and Alert Scheme (UNIRAS). Internal hacking incidents are categorised into the following eight types of misuse: access denied; browsing; password abuse; privilege abuse; data stolen/disclosed; files deleted/damaged; fraud; other.The number of internal hacking incidents, by category, for each of the last five years is: