18 Hacking
18 Hacking
18 Hacking
3. What are the two ways that data can be stolen? 1 2 4. Label the possible effects of the theft of data shown below
5. What are the three main ways that businesses can protect data can be protected against hacking? 1 2 3 6. Fill in the blanks below 1 Keeping important __________________________ such as servers or mainframes in _______________ rooms 2 3 4 ________________ security guards Security _____________ ,_________________cards Keeping _________________data on ______________________ machines instead of ______________________ 7 8 5 Using _________________systems and _____________________ What are the sentences above describing? Explain each of the words below 1 2 3 Data encryption Firewall Levels of security
Fill in the columns for Penalties Illegal Act Unauthorised access to any program or data on a computer Unauthorised modification of data on a computer Computer fraud and blackmail Fine Imprisonment
10
__________________________________________________________
Allows everyone to use the software. It can be loaded onto every machine and people can use it whenever they want.
Software can be used on one PC for as long as you like. But it is only allowed to be used on one PC at a time
allows a certain number of users e.g. 15 to use the software at any one time. When they log off the machine, another 15 can use it. However, if they allow the software to be used by 16 people at the same time then they are breaking the terms of the licence.
6. What penalties can you face if you are caught breaking the copyright laws?
7.
In the box below the scenario, write your opinion about it is it right or wrong, what might happen next? 1 John pays to join a web site where he can get essays and course work. He downloads some course work and passes it off as his own.
2 Jane buys a cheap copy of a DVD at a car boot sale, she invites her friends round to watch it,
8.
In the box below, write what you think are the three main points that the article is making.
The article is over a year old. Surf the web to see if you can find more recent articles about computer copyright in the UK.