SOCIAL IMPLICATIONS: Computer Crimes, Presentation

mananabetsikhutso 6 views 11 slides Aug 10, 2024
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

Social Implications is a fascinating topic in Computer Applications Technology (CAT), it equips learners with knowledge and skills to play safe in the digital space, these slides can be used to present this topic to learners.


Slide Content

SOCIAL IMPLICATIONS Computer crimes in relation to hardware, software, information, identity, bandwidth theft, theft of time and services Presenter: Mr K Magolego

Lesson objectives, at the end of this lesson, learners will be able to: •Demonstrate their rights to access and their rights to privacy when computing. •Define different internet attacks. •Comprehend different computer crimes.

What is an internet attack? Scan the QR code to enter Slido and answer the question

Group Activity INSTRUCTIONS You will be grouped by the teacher The teacher will give each group a form of internet attack Do research online about a form of internet attack assigned to your group Present your findings to the class, each group will be given a minimum of 3 minutes to share their findings with their peers. Now research the term computer crime and Define it.

•Internet attack is any malicious attempt to exploit computer systems, networks, or devices. •Internet attacks are DoS attacks which means A denial-of-service (DoS) attack, is an attack where a computer is bombarded with huge amounts of data to slow down a computer or network. And sniffer attacks which is a small program that can read packets of data being sent on a computer or a network. Internet attack

Right to access and the right to privacy •Everybody has the right to privacy. •Only you have the right to access your own work and not anyone else. •Access rights help to protect data and information from outsiders.

•Computer crimes include all crimes that are committed by using computers. •Theft of hardware and software •Identity theft •Bandwidth theft •Information and data theft •Theft of time and services Computer crimes

Computer crimes •Theft of hardware and software : Process of stealing the actual physical hardware. Theft of software includes stealing the installation media. • Identity theft : A process where a criminal uses the personal details (identity) of a person to dishonestly apply for bank loans, access bank accounts, and other criminal activities. • Bandwidth theft : A person’s username and password are found out and a criminal will then use these details to access the Internet on the account of the victim. Hotlinking is a process where a link on a website links to a file that is hosted on another website. This limits downloads on the primary website.

Computer crimes • Information and data theft : Information such as personal details is stored in databases. These databases are valuable to advertising businesses to whom criminals then sell them. • Theft of time and services : When employees use a computer to browse social networking sites or conduct their own personal matters they are using resources owned by the company without permission. This use also leads to time being lost that should have been used for company business. • Internet-related fraud scams : A scam is a process in which criminals get people to give them money by tricking them. A hoax e-mail is an e-mail that tries to deceive you by using a story that you cannot check is true

AKS QUESTIONS ON SLIDO

Homework Click here to access the homework
Tags