Basic Computing Terms - SEE-ICT

The wild wild net
of Cybercrime
Xenion High School
The wild wild net
 The
internet has created a whole new
way for people to meet, work and shop
 This
way of life has also allowed
criminals to enter the internet to steal
and cheat
Control of the internet
 The
internet is not controlled by anyone
 This
makes it difficult to find hackers, people
who break in to other peoples computers
 The
internet is often compared to the old
American wild west.
The Trojan Horse
 In
Greek Mythology, the Trojan horse attack
was used by Greek soldiers to get into the city
of Troy.
A
computer Trojan does the same thing, it
looks like helpful software, but once installed ,
it allows hackers to break into the computer.
Hacking
 Modern
hackers try to crack passwords to get
into computer systems.
 They
use programs like spyware and malware
to trick users in giving out passwords.
Watchmen of the Net
 Some
hackers are hired by organisations to
help test their computer security
 Anonymous
organise attacks against
organisations that they feel are being unjust
 They
like themselves to the fictional character
“V”, who used hacking for good causes.
Malware
 Malware
are computer viruses that cause
problems on the internet.
 They
swarm the internet, copying themselves
onto many computers
 Viruses
can damage computers by deleting
data and computer files, even code that
allows the computer to not switch on.
SPAM Emails
 Email
accounts can be filled with unwanted
“junk mail”
 This
 This
SPAM mail can contain harmful viruses
SPAM can send users to fake bank
websites to steal their passwords, this is
called “phishing”
Botnets - Robot Networks
 This
is a network of hundreds or thousands of
computers, that have been hijacked by
hackers, without the owners knowing
 Hackers
can use these computers to flood a
website thus making it unworkable, causing a
denial of service attack (DOS)
CYBER WARFARE
 Sometimes

wars are waged on the internet
The US Cyber Command (CYBERCOM) is in
charge of defending American military computers
What can we do?
 IT
IS VERY SIMPLE
 INSTALL
INTERNET SECURITY SOFTWARE
Research
1)Create a 1 page Word Document
2)Create a 2 column table
3)In the first column add the words – Hacker,
Trojan Horse, Spyware, Malware, SPAM,
Botnets, and CYBERCOM
4)In the second column, research the internet,
and write 1 sentence for each
5)Add your name in the footer page border,
fonts & pictures
SAVE AS YOUR NAME IN YOUR STUDENT FOLDER