22
PROFESSIONAL PRACTICE SOFTWARE AND HARDWARE THEFT AND VANDALISM THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

Software Theft and Vandalism

Embed Size (px)

DESCRIPTION

software theft and vendalism

Citation preview

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

PROFESSIONAL PRACTICESOFTWARE AND HARDWARE THEFT AND VANDALISM

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

GROUP MEMBERS

•Burhan Javaid (BCS01113220)

•Rashid Ali (BCS01113114)

•Shahbaz Ahmed (BCS01113125)

•Majid Hussain

•Zeeshan Chaudhry

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

To learn about our topic there are some things that need to be understood first .

• Software

• Hardware

• Theft

• Vandalism

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE

• Software means computer instructions or data. Anything that can be stored electronically is called software.

• Software is very vital for the performance of the computer. Software controls the working of the hardware devices .

• Some famous softwares are office , spotflux etc .

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE

• Computer hardware refers to the physical parts or components of a computer such as monitor, keyboard, Computer data storage, hard drive disk, mouse, system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that you can actually touch.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

THEFT

• Theft is acquiring something for urself that does not belong to you . It is either taken by force or by taking it without the permission.

• IN computer science theft can be about two things

• Software theft

• Hardware theft

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

VANDALISM

•The process of destroying something is called vandalism . Destroying doesn’t necessarily means like burning it or breaking it physically but it also means to corrupt something or delete something and doing these things without any authorization .

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE THEFT

• Software theft is the unauthorized copying or distribution of copyright protected software.

• This usually means unauthorized copying, either by individuals for use by themselves or their friends or by companies who then sell the illegal copies to users. Many kinds of software protection have been invented to try to reduce software theft but, with sufficient effort, it is always possible to bypass or "crack" the protection, and software protection is often annoying for legitimate users.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE THEFT

• Software theft in 1994 was estimated to have cost $15 billion in worldwide lost revenues to software publishers. It is an offence in the UK under the Copyright, Designs and Patents Act 1988, which states that "The owner of the copyright has the exclusive right to copy the work."

• It is illegal to:

• 1. Copy or distribute software or its documentation without the permission or licence of the copyright owner.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE THEFT

• 2. Run purchased software on two or more computers simultaneously unless the license specifically allows it.

• 3. Knowingly or unknowingly allow, encourage or pressure employees to make or use illegal copies sources within the organization.

• 4. Loan software in order that a copy be made of it.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE THEFT

• Some ways to prevent software theft

• Keep original software boxes and media in a secure location.

• Back up your files and disks regularly.

• Always keep license agreements seriously and make sure to use them properly.

• Don't go on sites that could be potentially sketchy, because most cases the site could be used to hack into your information.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

INFORMATION THEFT

The picture below shows information theft. Software theft can sometimes lead to information theft.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE VANDALISM

• To corrupt or destroy the software is known as software vandalism.

• This is usually done by a hacker or some one that needs to access a computer to destroy or corrupt any file .

• This is usually done in movies that they access the computers without authorization and delete or corrupt files that they want to have removed.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

SOFTWARE VANDALISM

• One of the common examples of software vandalism is when a employee leaves a company due to some conflict . He tries to delete or corrupt the important or necessary files or databases of the organization. This way the company has to face some kind of loss .

• Software hacking is another type of software vandalism.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE THEFT

• Hardware piracy does not exist. As one piece of hardware cannot be used at more then one place at a time . The buyer is usually the one to use the hardware for his/her own use .

• But this does not mean that the hardware is safe . Hardware can be stolen . The taking of hardware without the permission or authorization is called the hardware theft.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE THEFT

the picture in the background shows someone stealing the cable.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE THEFT

• Some ways to prevent hardware theft:

• Lock doors/windows that your computer is located in.

• Cables that lock your equipment to a desk or table that a key is needed to move.

• You could use a RTLS (real time location system) to track and indentify the location of your computer or any high-risk items.

• In case the item is stolen, make sure to use plenty of long-charactered passwords so that they can't get into your information.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE VANDALISM

• It is the act of defacing or destroying computer equipment .

• The deletion of a software without the permission of the original owner can be called vandalism.

• Viruses are very common in computers . Some of the viruses corrupt the data of the user which is also a case of vandalism .

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE VANDALISM

• The ways to prevent hardware vandalism are the same as hardware theft .

• Put in locks on the computer body , or put the computer in a safe place. The best example can be found in offices , universities and other organizations etc.

• Be honest with yourself : don’t steal or vandalize hardware .

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

HARDWARE VANDALISM

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

Thank you

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY ©BJP

QUESTIONS??•Questions would be answered but easy questions or no questions would be highly appreciated !!