1 / 26

Hacking

Hacking. Learning Objectives:. At the end of this lesson you should be able to:. Learning Objectives:. At the end of this lesson you should be able to: describe what is meant by hacking ; . Learning Objectives:. At the end of this lesson you should be able to:

nay
Download Presentation

Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacking

  2. Learning Objectives: At the end of this lesson you should be able to:

  3. Learning Objectives: At the end of this lesson you should be able to: • describe what is meant by hacking;

  4. Learning Objectives: At the end of this lesson you should be able to: • describe what is meant by hacking; • explain the measures which must be taken in order to protect against hacking;

  5. Hacking is ….?

  6. Hacking is ….? • the illegal access to computers • “breaking into” a computer

  7. Hacking is ….? • the illegal access to computers • “breaking into” a computer • the unauthorised access to data that belongs to someone else

  8. Hacking facts: • once into a computer system a hacker can do an enormous amount of damage.

  9. Hacking facts: • once into a computer system a hacker can do an enormous amount of damage. • computers on a network or connected to the Internet, are at most risk

  10. Problems caused by hacking:

  11. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data

  12. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you.

  13. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you. • Introducing a virus • causing damage to the data on your computer.

  14. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you. • Introducing a virus • causing damage to the data on your computer. • Fraudulent use of cash machines • stealing money.

  15. Hacking and the Law

  16. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses

  17. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act:

  18. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material

  19. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail.

  20. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail. • Unauthorised changing of computer files, • including planting viruses and deleting files.

  21. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail. • Unauthorised changing of computer files, • including planting viruses and deleting files. • Conviction for any of the above can lead to an unlimited fine or five years in prison.

  22. How to prevent hacking:

  23. How to prevent hacking: • User IDs and passwords • different users are allowed different access rights

  24. How to prevent hacking: • User IDs and passwords • different users are allowed different access rights • Blocking external access • disconnect computer from the Internet when not being used. • systems with permanent Internet connections need software called a 'firewall' to block access from outside

  25. How to prevent hacking: • User IDs and passwords • different users are allowed different access rights • Blocking external access • disconnect computer from the Internet when not being used. • systems with permanent Internet connections need software called a 'firewall' to block access from outside • Data encryption • data is 'scrambled' before being transmitted through a network or via the Internet

  26. Things to do: • Log on • Select Internet Explorer • Select ICT from the Subject Index menu • Click on this link: ICT Short course GCSE Revision Notes • Add this page to your Favourites • Scroll to the bottom of the page and click on this link: 2. describe what is meant by hacking • Copy & Paste the questions into a new Word document • Type your Answers to the questions • Save your answers in your home area

More Related