0% found this document useful (0 votes)
71 views4 pages

18 Hacking

Hacking is the most common form of computer hacking. What are the two main ways that data can be stolen? what are the three main ways that businesses can protect data can be protected against hacking? what penalties can you face if you are caught breaking the copyright laws? write your opinion in the box below - is it right or wrong, what might happen next?

Uploaded by

appletonbanks
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views4 pages

18 Hacking

Hacking is the most common form of computer hacking. What are the two main ways that data can be stolen? what are the three main ways that businesses can protect data can be protected against hacking? what penalties can you face if you are caught breaking the copyright laws? write your opinion in the box below - is it right or wrong, what might happen next?

Uploaded by

appletonbanks
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Name.. Hacking 1. What is a hacker?

2. What sort of computers are in the most danger of being hacked?:

3. What are the two ways that data can be stolen? 1 2 4. Label the possible effects of the theft of data shown below

5. What are the three main ways that businesses can protect data can be protected against hacking? 1 2 3 6. Fill in the blanks below 1 Keeping important __________________________ such as servers or mainframes in _______________ rooms 2 3 4 ________________ security guards Security _____________ ,_________________cards Keeping _________________data on ______________________ machines instead of ______________________ 7 8 5 Using _________________systems and _____________________ What are the sentences above describing? Explain each of the words below 1 2 3 Data encryption Firewall Levels of security

Fill in the columns for Penalties Illegal Act Unauthorised access to any program or data on a computer Unauthorised modification of data on a computer Computer fraud and blackmail Fine Imprisonment

10

What law makes the above acts illegal?

__________________________________________________________

Write the type of license above the description

Who might have this sort of license?

Allows everyone to use the software. It can be loaded onto every machine and people can use it whenever they want.

Software can be used on one PC for as long as you like. But it is only allowed to be used on one PC at a time

allows a certain number of users e.g. 15 to use the software at any one time. When they log off the machine, another 15 can use it. However, if they allow the software to be used by 16 people at the same time then they are breaking the terms of the licence.

6. What penalties can you face if you are caught breaking the copyright laws?

7.

In the box below the scenario, write your opinion about it is it right or wrong, what might happen next? 1 John pays to join a web site where he can get essays and course work. He downloads some course work and passes it off as his own.

2 Jane buys a cheap copy of a DVD at a car boot sale, she invites her friends round to watch it,

8.

Go to the page http://news.bbc.co.uk/1/hi/magazine/3281977.stm

In the box below, write what you think are the three main points that the article is making.

The article is over a year old. Surf the web to see if you can find more recent articles about computer copyright in the UK.

You might also like