Download presentation
Presentation is loading. Please wait.
Published byGertrude Townsend Modified over 9 years ago
2
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for personal business.
3
Not conforming to approved standards of social or professional behavior Launching DOS attacks on commercial websites. Making malicious computer software.
4
Is when you hack you way into someone else’s information and interrupt their data. Computer Viruses Worms Trojan Horses Spyware
5
Is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment Placing files on a person’s computer to see what there doing. Trojans Spyware
6
When email warns about a fictitious computer virus.
7
The 2 hacker’s were a Junior and a Senior currently enrolled at Birdville Highschool.
8
The hacker’s recovered over 14,500 grads and current student’s information. Including Social Security Numbers, Addresses, and Phone Numbers.
9
“The file as been removed and the server is no longer operational”
10
http://www.enough.utoronto.ca/onlinesmarts/data/va ndalism.htm http://www.enough.utoronto.ca/onlinesmarts/data/va ndalism.htm http://www.star-telegram.com/2011/09/01/3329502/2- birdville-students-hack-into.html http://www.star-telegram.com/2011/09/01/3329502/2- birdville-students-hack-into.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.