Hacking Hacking Learning Objectives by nyut545e2

VIEWS: 80 PAGES: 26

									Hacking
Learning Objectives:
At the end of this lesson you should be able to:
Learning Objectives:
At the end of this lesson you should be able to:
describe what is meant by hacking;
Learning Objectives:
At the end of this lesson you should be able to:
describe what is meant by hacking;

explain the measures which must be taken in
 order to protect against hacking;
Hacking is ….?
            Hacking is ….?
• the illegal access to computers
  – “breaking into” a computer
            Hacking is ….?
• the illegal access to computers
  – “breaking into” a computer
• the unauthorised access to data that
  belongs to someone else
             Hacking facts:
• once into a computer system a hacker can do an
  enormous amount of damage.
             Hacking facts:
• once into a computer system a hacker can do an
  enormous amount of damage.
• computers on a network or connected to the
  Internet, are at most risk
Problems caused by hacking:
 Problems caused by hacking:
• Copying data
  – illegal access to personal records - personal privacy.
  – junk mail, other people knowing things about you.
  – stealing business competitors data
 Problems caused by hacking:
• Copying data
  – illegal access to personal records - personal privacy.
  – junk mail, other people knowing things about you.
  – stealing business competitors data
• Changing data
  – incorrect details about you.
 Problems caused by hacking:
• Copying data
  – illegal access to personal records - personal privacy.
  – junk mail, other people knowing things about you.
  – stealing business competitors data
• Changing data
  – incorrect details about you.
• Introducing a virus
  – causing damage to the data on your computer.
 Problems caused by hacking:
• Copying data
  – illegal access to personal records - personal privacy.
  – junk mail, other people knowing things about you.
  – stealing business competitors data
• Changing data
  – incorrect details about you.
• Introducing a virus
  – causing damage to the data on your computer.
• Fraudulent use of cash machines
  – stealing money.
Hacking and the Law
       Hacking and the Law
• The Computer Misuse Act is aimed at reducing
  hacking and the threat from viruses
       Hacking and the Law
• The Computer Misuse Act is aimed at reducing
  hacking and the threat from viruses
• There are 3 main offences covered by the Act:
       Hacking and the Law
• The Computer Misuse Act is aimed at reducing
  hacking and the threat from viruses
• There are 3 main offences covered by the Act:
  1. Unauthorised access to computer material
        Hacking and the Law
• The Computer Misuse Act is aimed at reducing
  hacking and the threat from viruses
• There are 3 main offences covered by the Act:
  1. Unauthorised access to computer material
  2. Unauthorised access to a computer to carry out
     serious crimes
     • like fraud or blackmail.
        Hacking and the Law
• The Computer Misuse Act is aimed at reducing
  hacking and the threat from viruses
• There are 3 main offences covered by the Act:
  1. Unauthorised access to computer material
  2. Unauthorised access to a computer to carry out
     serious crimes
     • like fraud or blackmail.
  3. Unauthorised changing of computer files,
     • including planting viruses and deleting files.
         Hacking and the Law
• The Computer Misuse Act is aimed at reducing
  hacking and the threat from viruses
• There are 3 main offences covered by the Act:
   1. Unauthorised access to computer material
   2. Unauthorised access to a computer to carry out
      serious crimes
      • like fraud or blackmail.
   3. Unauthorised changing of computer files,
      • including planting viruses and deleting files.
• Conviction for any of the above can lead to an
  unlimited fine or five years in prison.
How to prevent hacking:
     How to prevent hacking:
• User IDs and passwords
  – different users are allowed different access rights
     How to prevent hacking:
• User IDs and passwords
  – different users are allowed different access rights
• Blocking external access
  – disconnect computer from the Internet when not being used.
  – systems with permanent Internet connections need software
    called a 'firewall' to block access from outside
     How to prevent hacking:
• User IDs and passwords
  – different users are allowed different access rights
• Blocking external access
  – disconnect computer from the Internet when not being used.
  – systems with permanent Internet connections need software
    called a 'firewall' to block access from outside
• Data encryption
  – data is 'scrambled' before being transmitted through a
    network or via the Internet
                  Things to do:
•   Log on
•   Select Internet Explorer
•   Select ICT from the Subject Index menu
•   Click on this link:
    ICT Short course GCSE Revision Notes
•   Add this page to your Favourites
•   Scroll to the bottom of the page and click on this link:
    2. describe what is meant by hacking
•   Copy & Paste the questions into a new Word document
•   Type your Answers to the questions
•   Save your answers in your home area

								
To top