Basic Computing Terms - SEE-ICT
Transcription
Basic Computing Terms - SEE-ICT
The wild wild net of Cybercrime Xenion High School The wild wild net The internet has created a whole new way for people to meet, work and shop This way of life has also allowed criminals to enter the internet to steal and cheat Control of the internet The internet is not controlled by anyone This makes it difficult to find hackers, people who break in to other peoples computers The internet is often compared to the old American wild west. The Trojan Horse In Greek Mythology, the Trojan horse attack was used by Greek soldiers to get into the city of Troy. A computer Trojan does the same thing, it looks like helpful software, but once installed , it allows hackers to break into the computer. Hacking Modern hackers try to crack passwords to get into computer systems. They use programs like spyware and malware to trick users in giving out passwords. Watchmen of the Net Some hackers are hired by organisations to help test their computer security Anonymous organise attacks against organisations that they feel are being unjust They like themselves to the fictional character “V”, who used hacking for good causes. Malware Malware are computer viruses that cause problems on the internet. They swarm the internet, copying themselves onto many computers Viruses can damage computers by deleting data and computer files, even code that allows the computer to not switch on. SPAM Emails Email accounts can be filled with unwanted “junk mail” This This SPAM mail can contain harmful viruses SPAM can send users to fake bank websites to steal their passwords, this is called “phishing” Botnets - Robot Networks This is a network of hundreds or thousands of computers, that have been hijacked by hackers, without the owners knowing Hackers can use these computers to flood a website thus making it unworkable, causing a denial of service attack (DOS) CYBER WARFARE Sometimes wars are waged on the internet The US Cyber Command (CYBERCOM) is in charge of defending American military computers What can we do? IT IS VERY SIMPLE INSTALL INTERNET SECURITY SOFTWARE Research 1)Create a 1 page Word Document 2)Create a 2 column table 3)In the first column add the words – Hacker, Trojan Horse, Spyware, Malware, SPAM, Botnets, and CYBERCOM 4)In the second column, research the internet, and write 1 sentence for each 5)Add your name in the footer page border, fonts & pictures SAVE AS YOUR NAME IN YOUR STUDENT FOLDER