Download presentation
Presentation is loading. Please wait.
1
GCSE ICT SECURITY THREATS
2
So what is a Hacker? Computer Hacking involves a person known as a Computer Hacker. This person will access a computer system without the permission of the owner. Their aim from this action is to break security systems of a computer with the intention to obtain confidential documents or most commonly credit card numbers.
3
Why do they do it? More serious types of hacking could involve the computer systems within the defence centres or even police departments to delete or modify criminal records. Many hackers are motivated by a sense of achievement; the act of breaking into a computer system using their own mental effort is reward enough for them.
4
For Example…. The lives of space shuttle astronauts were put at risk by a computer hacker who overloaded Nasa's communication system in As the Nasa shuttle orbiting the Earth docked with the Russian Mir space station, a hacker interfered with the computer systems that monitor the heartbeat, pulse and medical conditions of the crew.
5
The Computer Misuse Act (1990)
This was passed by Parliament and made three new offences: 1. Accessing computer material without permission e.g. looking at someone else's files. 2. Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3. Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account.
6
As reported by the Anti-Phishing Working Group
176 unique new phishing attacks—spam attempts to fool users into divulging financial information on phoney websites—were reported in January 2004. By June 2004, that number skyrocketed to a 1,422.
7
So what is it? Phishing attacks use 'spoofed‘
s and fraudulent websites designed to fool recipients into divulging personal financial data such as: Credit card numbers Account usernames and passwords Social security numbers, etc.
8
Police warn of tsunami online scams
The scams include the sending of unsolicited s asking for money to be deposited in overseas bank accounts to support relief efforts as well as false Web sites using the disaster to spread computer viruses.
9
To "troll" means to allure, to fish, to entice or to bait.
Beware the Troll To "troll" means to allure, to fish, to entice or to bait. An internet troll is someone who fishes for people's confidence and, once found, exploits it.
10
Cyber-Stalking One of every ten people on the Internet today will become the victim of a cyber stalker. Cyberstalking is where the electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion
11
Spyware When a PC is infected with spyware that every keystroke, every website and every conversation could be recorded or monitored by the people or companies that may have secretly installed software on your PC.
12
The Consequences….. Banking and identity theft
Unusual computer problems Slow Internet access Changed browser homepage, search pages or favourites Excessive numbers of adware generated adverts such as pop-ups.
13
So, what can we do?....
14
Regular backups and security.
Just making something illegal or setting up regulations does not stop it happening. So responsible computer users need to take reasonable steps to keep their data safe. This includes regular backup and sufficient security with passwords.
15
Copyright law This covers the copying of written, musical, or film works using computers and provides the legal protection needed. There have been cases where laws such as Copyright have been used to crack down on files sharing Internet sites or individuals who store and distribute music illegally. There is a massive problem with many people around the world obtaining copyrighted material illegally.
16
Close down chat rooms Some chatrooms have been closed down due to abuses, especially where children are vulnerable. Some have "moderators" who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arranges meetings without extreme caution.
17
Reduce email spamming This may be reduced by:
never replying to anonymous s setting filters on accounts reporting spammers to ISPs, who are beginning to get together to blacklist abusers governments passing laws to punish persistent spammers with heavy fines
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.