Download
hacking n.
Skip this Video
Loading SlideShow in 5 Seconds..
Hacking PowerPoint Presentation

Hacking

123 Views Download Presentation
Download Presentation

Hacking

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Hacking

  2. Learning Objectives: At the end of this lesson you should be able to:

  3. Learning Objectives: At the end of this lesson you should be able to: • describe what is meant by hacking;

  4. Learning Objectives: At the end of this lesson you should be able to: • describe what is meant by hacking; • explain the measures which must be taken in order to protect against hacking;

  5. Hacking is ….?

  6. Hacking is ….? • the illegal access to computers • “breaking into” a computer

  7. Hacking is ….? • the illegal access to computers • “breaking into” a computer • the unauthorised access to data that belongs to someone else

  8. Hacking facts: • once into a computer system a hacker can do an enormous amount of damage.

  9. Hacking facts: • once into a computer system a hacker can do an enormous amount of damage. • computers on a network or connected to the Internet, are at most risk

  10. Problems caused by hacking:

  11. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data

  12. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you.

  13. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you. • Introducing a virus • causing damage to the data on your computer.

  14. Problems caused by hacking: • Copying data • illegal access to personal records - personal privacy. • junk mail, other people knowing things about you. • stealing business competitors data • Changing data • incorrect details about you. • Introducing a virus • causing damage to the data on your computer. • Fraudulent use of cash machines • stealing money.

  15. Hacking and the Law

  16. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses

  17. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act:

  18. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material

  19. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail.

  20. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail. • Unauthorised changing of computer files, • including planting viruses and deleting files.

  21. Hacking and the Law • The Computer Misuse Act is aimed at reducing hacking and the threat from viruses • There are 3 main offences covered by the Act: • Unauthorised access to computer material • Unauthorised access to a computer tocarry out serious crimes • like fraud or blackmail. • Unauthorised changing of computer files, • including planting viruses and deleting files. • Conviction for any of the above can lead to an unlimited fine or five years in prison.

  22. How to prevent hacking:

  23. How to prevent hacking: • User IDs and passwords • different users are allowed different access rights

  24. How to prevent hacking: • User IDs and passwords • different users are allowed different access rights • Blocking external access • disconnect computer from the Internet when not being used. • systems with permanent Internet connections need software called a 'firewall' to block access from outside

  25. How to prevent hacking: • User IDs and passwords • different users are allowed different access rights • Blocking external access • disconnect computer from the Internet when not being used. • systems with permanent Internet connections need software called a 'firewall' to block access from outside • Data encryption • data is 'scrambled' before being transmitted through a network or via the Internet

  26. Things to do: • Log on • Select Internet Explorer • Select ICT from the Subject Index menu • Click on this link: ICT Short course GCSE Revision Notes • Add this page to your Favourites • Scroll to the bottom of the page and click on this link: 2. describe what is meant by hacking • Copy & Paste the questions into a new Word document • Type your Answers to the questions • Save your answers in your home area