Hacking. Learning Objectives: At the end of this lesson you should be able to:

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Viruses.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Internet Safety Internet Safety LPM
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
 Collect your past paper  Collect a starter sheet – do it as your computer is logging on.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Misuses of ICT Malpractice and crime © Folens 2008.
Legislation in ICT.
Year 10 ICT ECDL/ICDL IT Security.
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
How it affects policies and procedures
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Hacking

Learning Objectives: At the end of this lesson you should be able to:

Learning Objectives: At the end of this lesson you should be able to: describe what is meant by hacking;

Learning Objectives: At the end of this lesson you should be able to: describe what is meant by hacking; explain the measures which must be taken in order to protect against hacking;

Hacking is ….?

the illegal access to computers –“breaking into” a computer

Hacking is ….? the illegal access to computers –“breaking into” a computer the unauthorised access to data that belongs to someone else

Hacking facts: once into a computer system a hacker can do an enormous amount of damage.

Hacking facts: once into a computer system a hacker can do an enormous amount of damage. computers on a network or connected to the Internet, are at most risk

Problems caused by hacking:

Copying data –illegal access to personal records - personal privacy. –junk mail, other people knowing things about you. –stealing business competitors data

Problems caused by hacking: Copying data –illegal access to personal records - personal privacy. –junk mail, other people knowing things about you. –stealing business competitors data Changing data –incorrect details about you.

Problems caused by hacking: Copying data –illegal access to personal records - personal privacy. –junk mail, other people knowing things about you. –stealing business competitors data Changing data –incorrect details about you. Introducing a virus –causing damage to the data on your computer.

Problems caused by hacking: Copying data –illegal access to personal records - personal privacy. –junk mail, other people knowing things about you. –stealing business competitors data Changing data –incorrect details about you. Introducing a virus –causing damage to the data on your computer. Fraudulent use of cash machines –stealing money.

Hacking and the Law

The Computer Misuse Act is aimed at reducing hacking and the threat from viruses

Hacking and the Law The Computer Misuse Act is aimed at reducing hacking and the threat from viruses There are 3 main offences covered by the Act:

Hacking and the Law The Computer Misuse Act is aimed at reducing hacking and the threat from viruses There are 3 main offences covered by the Act: 1.Unauthorised access to computer material

Hacking and the Law The Computer Misuse Act is aimed at reducing hacking and the threat from viruses There are 3 main offences covered by the Act: 1.Unauthorised access to computer material 2.Unauthorised access to a computer to carry out serious crimes like fraud or blackmail.

Hacking and the Law The Computer Misuse Act is aimed at reducing hacking and the threat from viruses There are 3 main offences covered by the Act: 1.Unauthorised access to computer material 2.Unauthorised access to a computer to carry out serious crimes like fraud or blackmail. 3.Unauthorised changing of computer files, including planting viruses and deleting files.

Hacking and the Law The Computer Misuse Act is aimed at reducing hacking and the threat from viruses There are 3 main offences covered by the Act: 1.Unauthorised access to computer material 2.Unauthorised access to a computer to carry out serious crimes like fraud or blackmail. 3.Unauthorised changing of computer files, including planting viruses and deleting files. Conviction for any of the above can lead to an unlimited fine or five years in prison.

How to prevent hacking:

User IDs and passwords –different users are allowed different access rights

How to prevent hacking: User IDs and passwords –different users are allowed different access rights Blocking external access –disconnect computer from the Internet when not being used. –systems with permanent Internet connections need software called a 'firewall' to block access from outside

How to prevent hacking: User IDs and passwords –different users are allowed different access rights Blocking external access –disconnect computer from the Internet when not being used. –systems with permanent Internet connections need software called a 'firewall' to block access from outside Data encryption –data is 'scrambled' before being transmitted through a network or via the Internet

Things to do: Log on Select Internet Explorer Select ICT from the Subject Index menu Click on this link: ICT Short course GCSE Revision Notes Add this page to your Favourites Scroll to the bottom of the page and click on this link: 2. describe what is meant by hacking Copy & Paste the questions into a new Word document Type your Answers to the questions Save your answers in your home area