Presentation is loading. Please wait.

Presentation is loading. Please wait.

Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.

Similar presentations


Presentation on theme: "Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for."— Presentation transcript:

1

2 Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for personal business.

3 Not conforming to approved standards of social or professional behavior Launching DOS attacks on commercial websites. Making malicious computer software.

4 Is when you hack you way into someone else’s information and interrupt their data. Computer Viruses Worms Trojan Horses Spyware

5 Is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment Placing files on a person’s computer to see what there doing. Trojans Spyware

6 When email warns about a fictitious computer virus.

7 The 2 hacker’s were a Junior and a Senior currently enrolled at Birdville Highschool.

8 The hacker’s recovered over 14,500 grads and current student’s information. Including Social Security Numbers, Addresses, and Phone Numbers.

9 “The file as been removed and the server is no longer operational”

10 http://www.enough.utoronto.ca/onlinesmarts/data/va ndalism.htm http://www.enough.utoronto.ca/onlinesmarts/data/va ndalism.htm http://www.star-telegram.com/2011/09/01/3329502/2- birdville-students-hack-into.html http://www.star-telegram.com/2011/09/01/3329502/2- birdville-students-hack-into.html


Download ppt "Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for."

Similar presentations


Ads by Google