Section 6 Theory Software Copyright, Viruses and Hacking.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
THIS powerPOINT Is ABOUT virus’s AND OTHER Harmful RISKS.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Computer Security Keeping you and your computer safe in the digital world.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
3.6 Fundamentals of cyber security
3.6 Fundamentals of cyber security
Legislation in ICT.
Computer Security.
Unit 4 IT Security Kerris Davies.
Legislation in ICT.
What is Information Security?
How it affects policies and procedures
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

Section 6 Theory Software Copyright, Viruses and Hacking

Lesson Objectives By the end of this lesson you will be able to: (a)Explain what is meant by Software Copyright. (b) Describe Computer viruses, hacking and how to protect against these items.

What is Software Copyright? People or organisations spent time and money developing new software. “Do they have the right to protect their work from being copied and used by others without their permission?” You have 2 minutes. Discuss! What are your thoughts?

Definition –Software Copyright When companies try to protect their work from being copied and used by other without their permission. This is called Software Copyright. Software Copyright covers: The Lawful protection given to authors and publishers – Relates to the software the author/publisher created/published – Prevents purchaser from making unlimited copies/lend it to others – Change the software/sell it without the company’s permission Software being copied or sold or given to others (without payment) Using Copyrighted names without permission Software being amended and passed of as your own

Viruses are everywhere!! Even Macs have Viruses….

Computer Viruses A Virus is a program that replicates(copies) it self and can cause harm by the following methods: – Copying files – Deleting files – Corrupting files Viruses are designed to: – Spy on your online use – e.g. : Collect username and passwords Collect card numbers used for online purchases – make a computer system unreliable / crash / delete data – copy itself between computers / within one computer

How do we protect against viruses? Preventing a virus attack Install anti-virus software. Must be kept up to date and scan regularly Do not open attachments unless you know the sender Do not attach portable drives or memory sticks unless they have been scanned for viruses Not download games or software from a website unless it is a trusted site

Hacking and hackers Hacking is the process of gaining unauthorised access to a computer system. Hackers often access computer systems using the internet. How? – Guess the users password – Install software on the user’s pc without their permission to log the users key presses(records what you type) The software is called Spyware or key-logging software Why do people hack? – To see if they can access a secure system – To commit fraud by changing data etc. – To access confidential information.

How do we protect against hackers? Purpose of a Firewall To prevent user accessing a computer or network using the internet To prevent undesirable content (e.g. pornography, violent videos etc.) being accessed by users of the internet. Use a firewall – a firewall is hardware, software, or both that checks the data being sent or received by your computer either to let it through or block it.

Task Attempt questions 1 and 2 on page 55. Please use your notes to ensure you have included keywords. You have 10 – 15 minutes and then we will go through the answers.

Answers Q1a two from – program – designed to make a computer system unreliable / crash / delete data – copies itself – between computers / within one computer

Answers Q1b two from – unauthorised – attempting to gain access – to a computer system

Answers Q2a one from Anti-virus software Virus scanner Q2b two from unauthorised attempting to gain access to a computer system

Plenary Questions – Copyright… What does Software Copyright cover? The Lawful protection given to authors and publishers – Relates to the software the author/publisher created/published – Prevents purchaser from making unlimited copies/lend it to others – Change the software/sell it without the company’s permission Software being copied or sold or given to others (without payment) Using Copyrighted names without permission Software being amended and passed of as your own