290 likes | 478 Views
Hacking. Learning Objectives:. At the end of this lesson you should be able to:. Learning Objectives:. At the end of this lesson you should be able to: describe what is meant by hacking ; . Learning Objectives:. At the end of this lesson you should be able to:
E N D
Learning Objectives: At the end of this lesson you should be able to:
Learning Objectives: At the end of this lesson you should be able to: • describe what is meant by hacking;
Learning Objectives: At the end of this lesson you should be able to: • describe what is meant by hacking; • explain the measures which must be taken in order to protect against hacking;
Hacking is ….? • the illegal access to computers • “breaking into” a computer
Hacking is ….? • the illegal access to computers • “breaking into” a computer • the unauthorised access to data that belongs to someone else
Hacking facts: • once into a computer system a hacker can do an enormous amount of damage.
Hacking facts: • once into a computer system a hacker can do an enormous amount of damage. • computers on a network or connected to the Internet, are at most risk
Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data
Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you.
Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you. • Introducing a virus • causing damage to the data on your computer.
Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you. • Introducing a virus • causing damage to the data on your computer. • Fraudulent use of cash machines • stealing money.
Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses
Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act:
Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material
Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail.
Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail. • Unauthorised changing of computer files, • including planting viruses and deleting files.
Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail. • Unauthorised changing of computer files, • including planting viruses and deleting files. • Conviction for any of the above can lead to an unlimited fine or five years in prison.
How to prevent hacking: • User IDs and passwords • different users are allowed different access rights
How to prevent hacking: • User IDs and passwords • different users are allowed different access rights • Blocking external access • disconnect computer from the Internet when not being used. • systems with permanent Internet connections need software called a 'firewall' to block access from outside
How to prevent hacking: • User IDs and passwords • different users are allowed different access rights • Blocking external access • disconnect computer from the Internet when not being used. • systems with permanent Internet connections need software called a 'firewall' to block access from outside • Data encryption • data is 'scrambled' before being transmitted through a network or via the Internet
Things to do: • Log on • Select Internet Explorer • Select ICT from the Subject Index menu • Click on this link: ICT Short course GCSE Revision Notes • Add this page to your Favourites • Scroll to the bottom of the page and click on this link: 2. describe what is meant by hacking • Copy & Paste the questions into a new Word document • Type your Answers to the questions • Save your answers in your home area