Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Viruses.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Section 6 Theory Software Copyright, Viruses and Hacking.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computer security By Shreya Houji. VirusesViruses.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
ICT Homework- ICT Security Consultant PowerPoint.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
W elcome to our Presentation. Presentation Topic Virus.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Ethics, Viruses, and Copyrights
Legislation in ICT.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
G061 - Network Security.
Presentation transcript:

Hacking, Viruses and the Copyright Law

Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how viruses work.  List the measures that must be taken in order to protect against hacking (physical and software) and viruses.  Explain what is meant by software copyright.

Computer Misuse Act 1990  This law was devised to reduce the activity of hackers, with these 3 main points: –It is illegal to access unauthorised data. –It is illegal to access unauthorised data and intend to do it again. –It is illegal to access unauthorised data and amend it.

Computer Misuse Act 1990  Unlimited fines.  Up to 5 years in prison. –Even though the jail terms seem pretty strong for just hacking, very few people have ever been charged with breaking them for a couple of reasons: It's very difficult to prove when you have been hacked or who has actually hacked you. Very few companies wish to admit that they have been hacked, so do not actually go ahead with prosecuting people who have hacked them. Legal penalties for breaking this law include:

Hacking  Is not as easy as television programmes/movies make it out to be.  It includes: –Accessing computer systems illegally –Detecting passwords using software remotely/locally –Looking at other peoples data/passing on data –Changing other peoples data –Deleting other peoples data –Inserting viruses

Viruses  A virus is a program designed to cause harm to someone else's computer.  A virus spreads by duplicating and attaching itself to other files.  Some virus damage is insignificant but inconvenient.  Some virus damage is disastrous, putting the computer system out of action by crashing memory, erasing files or corrupting data.  There are tens of thousands of viruses.

How can you catch viruses?  The primary source of infection these days are attachments.  Illegal software and infected files from the Internet.  Putting infected floppy disks into your computer - the virus can automatically copy itself from the infected disk into your computer

How to protect against Hacking  Physical methods: –Keeping important computers in locked rooms. –Posting security guards. –Security locks, smart cards. –Keeping sensitive data on stand-alone machines instead of networks. –Using alarm systems and video cameras  Software methods: –Data encryption data is 'scrambled' before being transmitted through a network. Only the authorised recipient has the 'key'. –Firewalls - software to block access from outside. –Activity logs, passwords and levels of security.

How to protect against Viruses  Using anti-virus software to scan your system daily or weekly  Update the scanning software regularly  Not allowing people to load applications \ executable files on your system  Using special filtering software to prevent downloads of computer programs  Scanning all incoming s  Not opening suspicious s or attachments.  Avoiding software from unreliable sources  Backing up data regularly so you can recover your data with clean copies.

Copyright Law  Copyright, Designs and Patents Act 1988 has two main purposes: 1.To ensure people are rewarded for their endeavours. 2.To give protection to the copyright holder if someone tries to copy or steal their work.

Copyright Law  Copyright, Designs and Patents Act 1988 makes it illegal to: –Copying and/or giving and/or selling software without the owner’s permission. –Using the copyright name on other software. –Amending software/using parts of code in own programs without permission. –Buying pirated software. Note: The key words without permission as with permission it would not be illegal.

Plenary  What is Hacking? –Accessing computer systems illegally –Detecting passwords using software remotely/locally –Looking at other peoples data/passing on data –Changing other peoples data –Deleting other peoples data –Inserting viruses

Plenary  What are viruses? –A virus is a program designed to cause harm to someone else's computer.  How do viruses work? –A virus spreads by duplicating and attaching itself to other files.

Plenary  What can viruses do? –Putting the computer system out of action by: Crashing memory Erasing files Corrupting data.  What measures must be taken in order to protect against hacking and viruses (physical and software)?

How to protect against Hacking  Physical methods: –Keeping important computers in locked rooms. –Posting security guards. –Security locks, smart cards. –Keeping sensitive data on stand-alone machines instead of networks. –Using alarm systems and video cameras  Software methods: –Data encryption data is 'scrambled' before being transmitted through a network. Only the authorised recipient has the 'key'. –Firewalls - software to block access from outside. –Activity logs, passwords and levels of security.

How to protect against Viruses  Use anti-virus software to scan your system daily or weekly  Update the scanning software regularly  Do not allow people to load applications \ executable files on your system  Use special filtering software to prevent downloads of computer programs  Scan all incoming s  Do not open suspicious s or attachments.  Avoid software from unreliable sources  Back up data regularly so you can recover your data with clean copies.