- Deliberately planting or transferring viruses to other computers which causes damage to the computer system and its data
- Using somebody else's or an organisations' computer to carry out work
- Hacking into another users' computer system intending to view information or alter it
- Using a computer to commit fraud in any way
As hackers became more common, computer users had to find a way to stop these people invading their computer systems. Firewalls are software and hardware which filter out unauthorized requests from people outside the network. They are also designed so that only certain data can be in the network, i.e false data cannot be inputted by a hacker if they get into the system and want to change it. It is now recommended that networks that use the Internet invest in a firewall.
Computer viruses cause a major threat to ICT systems. A virus replicates itself and transfers to other computers. This problem won't be too bad if you have a stand alone computer, but if you have several computers connected in one large network then this will be a massive problem. Viruses can display unnecessary messages on the computer screen, delete programmes, use up storage (making programmes run slowly) and spy your access to the internet. Spying on the internet is a massive problem because hackers can then obtain your personal information and use your credit card details to do things such as order expensive goods online that you don't want or know about.
All computers should be fitted with a virus checker or scanner which detects and deletes viruses before they effect your computer. However, it is important to update your viruse scanner or checker on a regular basis so that you will be protected against the latest viruses.
To help your computer into not catching a virus, here are some tips that you should follow when using your computer:
- Ignore emails with file attachments or hyperlinks from people you don'y know or trust
- Do not download information or access strange websites which are likely to have viruses that will damage your computer
- Do not allow other people to use memory sticks in your computer until they have been scanned first
- Install a virus checker/scanner
There are many physical methods that a person with valuable data can do to prevent unauthorized people from gaining access to their work. Here are some examples:
- A computer user could clamp their computer to their desk, meaning that it can only be moved by the person with the key (who is the owner of the computer and the information inside) this may make it impossible for the computer to be moved without being damaged, which will mean that the information inside may also be damaged which defeats the idea of trying to steal the machine.
- CCTV cameras can be positioned around the building so that intruders will be caught. They could also be positioned in the same room as the computer so that it can be protected against other staff members who may have access to the building, but not the computer.
- Locks can be attached to doors so that the only people who have access are those with keys. However, these locks may be broken by some people who are desperate to steal information/misuse the computer. Though this will make it obvious to the owner that their computer is lost or damaged when they return to their property.
- The location of the computer is important. For an example, you may want to locate your computer in a high building so that people walking past cannot see. You may also want to disguise the building as much as possible so that it doesn't look like a target.
- Copying or downloading software illegally
- Copying images or text without permission or claiming it as your own
- Using peer to peer file sharing software i.e Limewire which got closed down
- Running more copies of software than is allowed by the site licence
Below is a link to a powerpoint about the Copyright Law: http://www.teach-ict.com/gcse/theory/dpa/theory/ict_legislation/legislation.html
No comments:
Post a Comment