1 / 12

Computer Threats

Computer Threats. I can understand computer threats and how to protect myself from these threats. Copy down these questions. Leave 3-4 spaces between each question to write your answers.

Download Presentation

Computer Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Threats I can understand computer threats and how to protect myself from these threats.

  2. Copy down these questions. Leave 3-4 spaces between each question to write your answers. 1. Define hacker. 2. Are there different kinds of hackers? 3. What about teenage hackers?4. Why would a hacker be interested in my computer?5. Can hackers steal credit cards? 6. What do hackers do with the information they steal?7. Is there anything else hackers can do if they break into a computer?

  3. What is a Hacker? • Although there is a great deal of disagreement as to what a hacker actually is (especially among hackers themselves), a hacker is most commonly defined as anyone who unlawfully breaks into a computer system, whether an individual computer or a network.

  4. Are there different kinds of hackers? • Some hackers are offended by being labeled as criminals and therefore attempt to divide hackers into classes. Many hackers who break into systems just for the challenge of it (and who don't wish to steal or wreak havoc on the systems) refer to themselves as white-hat hackers. They tout themselves as experts who are performing a needed service for society by helping companies uncover the vulnerabilities in their systems.

  5. Are there different kinds of hackers? • These white-hat hackers look down on those hackers who use their knowledge to destroy information or for illegal gain. These hackers are known as black-hat hackers. (The terms white hat and black hat are references to old Western movies in which the heroes wore white hats and the outlaws wore black hats.) Regardless of the hackers' opinions, the laws in the United States and in many other countries consider any unauthorized access to computer systems a crime.

  6. What about the teenage hackers who get caught every so often? • These amateur hackers are often referred to as script kiddies. Script kiddies don't create programs used to hack into computer systems; instead, they use tools created by skilled hackers that enable unskilled novices to wreak the same havoc as professional hackers. Unfortunately, it is easy to find these tools on the Web.

  7. What about the teenage hackers who get caught every so often? • Fortunately, because the users of these programs are amateurs, they're usually not proficient at covering their electronic tracks. Therefore, it's relatively easy for law enforcement officials to track them down and prosecute them. Still, script kiddies can cause a lot of disruption and damage to computers, networks, and Web sites before they're caught.

  8. Why would a hacker be interested in breaking into my home computer? • Some hackers just like to snoop. They enjoy the challenge of breaking into systems and seeing what information they can find. Other hackers are hobbyists seeking information about a particular topic wherever they can find it. • Because many people keep proprietary business information on their home computers, hackers bent on industrial espionage may break into home computers. For other hackers, hacking is a way to pass time.

  9. Could a hacker steal my credit card number? • If you perform financial transactions online such as banking or buying goods and services, then you probably do so using a credit card. Credit card and bank account information can thus reside on your hard drive and may be detectable by a hacker. Also, many sites that you access require you to provide a logon ID and password to gain access. Even if this data is not stored on your computer, a hacker may be able to capture it when you're online by using a packet sniffer .

  10. Could a hacker steal my credit card number? • If you perform financial transactions online such as banking or buying goods and services, then you probably do so using a credit card. Credit card and bank account information can thus reside on your hard drive and may be detectable by a hacker. Also, many sites that you access require you to provide a logon ID and password to gain access. Even if this data is not stored on your computer, a hacker may be able to capture it when you're online by using a packet sniffer .

  11. Is there anything else hackers can do if they break into my computer? • Hackers often use individuals' computers as a staging area for mischief. To perpetrate widespread computer attacks, for example, • hackers need to control many computers at the same time. To this end, hackers often use Trojan horses to install other programs on computers. A Trojan horse is a program that appears to be something useful or desirable (like a game or a screen saver), but at the same time does something malicious in the background without your knowledge. The term Trojan horse derives from Greek mythology and refers to the wooden horse that the Greeks used to sneak into the city of Troy and conquer it. Therefore, computer programs that contain a hidden (and usually dreadful) "surprise" are referred to as Trojan horses.

  12. What damage can Trojan horses do? • Often, the malicious activity perpetrated by a Trojan horse program is the installation of backdoor programs that allow hackers to take almost complete control of your computer without your knowledge. Using a backdoor program, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer. Computers that hackers control in this manner are referred to as zombies.

More Related