 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

UNIT 20 The ex-hacker.
POSSIBLE THREATS TO DATA
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 9: Privacy, Crime, and Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Security, Privacy, and Ethics Online Computer Crimes.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses & Destructive Programs
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Protecting Yourself Online (Information Assurance)
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
IT Security for Users By Matthew Moody.
Cyber crime & Security Prepared by : Rughani Zarana.
The Simple Side of Computer Security for The Brownies That Like To Read!!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is a virus??????? A virus is an of some sort sent to you that will usually shut down or corrupt your computer. It will then send the virus.
Unethical use of Computers and Networks
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Viruses, Hacking and Backups By Katie Louise Bieber!
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Viruses A computer virus is a virus that can copy itself and infect a computer. A Trojan virus called WinFixer coerced users into installing it by telling.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Jamie Salazar.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer and Network Security Brendan Duncombe Bahein Maung.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Fundamentals of Information Systems
Answer the questions to reveal the blocks and guess the picture.
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Faculty of Science IT Department By Raz Dara MA.
Privacy, Security, and Ethics
Presentation transcript:

 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.

 People who are hired by companies to hack into the company’s system

 Specialize in illegal penetration of systems.  Motivated by profit, fun, or political motivation

 Definition: A program that attaches to another program or file on your computer, allowing it to spread and infect other computers

 Viruses range in severity  Some annoy, others damage software and hardware  Spread by sharing files and ing infected files to others. Could happen unknowingly.

Like viruses, but they spread without human action. Replicate themselves It is possible for someone to use a worm to control your computer remotely

 Appears to be useful software, but damages computer once run.  Results vary, but they don’t replicate nor infect other files.

 Worst security risk  Blends effects of viruses, worms, and Trojan Horses  Attack system from multiple points  Don’t have to be opened by user

-Hackers can edit or deface websites -Some are called “Hacktivists” -Targets mostly include Corporate and Govt. Websites

-Some governments allegedly hack other gov’t websites -Reasons include: 1. Espionage 2. Cyber-Warfare 3. Theft of Technology or Information

-Websites may be deleted -Harder now with new security

-Identity Theft -Info obtained from online vendors -Hacker may sell info

-Security contractor RSA was hacked -Employee passwords stolen -Hacker almost gained access to personnel files

-Relevant to YOU -WEP Key= wireless network security -Stolen internet -Negative effect on internet subscriber

-Hacker group -Freedom of Information -Plotting to take Facebook offline -Don’t like Scientology

 “White hat hackers are programmers who break into computer systems for the sake of exposing security flaws, instead of exploiting them for malevolent purposes.”

 They report their discoveries to their employer so that the software can be made more secure  This helps protect our information

 TinKode – discovered security flaws in NASA’s military satellites  Rent-a-Hacker, Inc. – hacking at reasonable rates! ◦ But they’ll only hack your OWN software

 Hacking is used to fight against oppressive governments and give the public a voice ◦ Particularly in authoritarian countries like China and Iran

 During the 2009 presidential elections, Ahmedinejad shut off Internet for people supporting rival candidates  Iran also has a firewall blocking any “Western” media

 Iranians responded with Denial of Service attacks and hacking of government websites to expose their plight  the program Haystack allowed circumvention of the firewall

 As we go through this presentation, keep in mind that the church does not have specific view on hacking.  There is no published statement

 that says how they feel so we will look at what the bible says about things such as stealing and invasion on ones trust

 in order to get a sense of how the church feels about hacking.

 “The seventh commandment forbids unjustly taking or keeping the goods of one's neighbor and wronging him in any way with

 respect to his goods.”

Hackers often steal things that many people have put a lot of work into and thus are violating the 7 th commandment.

 “It commands justice and charity in the care of earthly goods and the fruits of men's labor.”

Hackers violate privacy when they hack into government databases to steal files, which is a crime punishable by strict consequences.

Whether it’s embezzling, stealing ideas, hacking into personal accounts, stealing money, or stealing national documents hackers are thieves.

 In the case of white hat hackers – yes  But white hats wouldn’t be necessary if black hats didn’t exist

 Ultimately, as the Catholic Church says, hacking IS a violation of integrity and can be seen as thievery  It should be condemned

 In its essence, it is thievery of information and privacy, and the Church condemns that.  But it’s ultimately up to you to decide