Software Theft and Vandalism

Embed Size (px)

DESCRIPTION

software theft and vendalism

Text of Software Theft and Vandalism

Professional practice

Professional practiceSoftware and hardware theft and vandalismThis presentation have been made for professional practice only BJP1Group membersBurhan Javaid (BCS01113220)Rashid Ali (BCS01113114)Shahbaz Ahmed (BCS01113125)Majid HussainZeeshan ChaudhryThis presentation have been made for professional practice only BJPTo learn about our topic there are some things that need to be understood first .SoftwareHardwareTheftVandalism This presentation have been made for professional practice only BJPSoftwareSoftware means computer instructions or data. Anything that can be stored electronically is called software.Software is very vital for the performance of the computer. Software controls the working of the hardware devices .Some famous softwares are office , spotflux etc .

This presentation have been made for professional practice only BJP4HardwareComputer hardware refers to the physical parts or components of a computer such as monitor, keyboard, Computer data storage, hard drive disk, mouse, system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that you can actually touch.

This presentation have been made for professional practice only BJPTheftTheft is acquiring something for urself that does not belong to you . It is either taken by force or by taking it without the permission.IN computer science theft can be about two thingsSoftware theftHardware theft

This presentation have been made for professional practice only BJP6VandalismThe process of destroying something is called vandalism . Destroying doesnt necessarily means like burning it or breaking it physically but it also means to corrupt something or delete something and doing these things without any authorization .

This presentation have been made for professional practice only BJPSoftware theftSoftware theft is the unauthorized copying or distribution of copyright protected software.This usually means unauthorized copying, either by individuals for use by themselves or their friends or by companies who then sell the illegal copies to users. Many kinds of software protectionhave been invented to try to reduce software theft but, with sufficient effort, it is always possible to bypass or "crack" the protection, and software protectionis often annoying for legitimate users. This presentation have been made for professional practice only BJPSoftware theftSoftware theft in 1994 was estimated to have cost $15 billion in worldwide lost revenues to software publishers. It is an offence in the UK under the Copyright, Designs and Patents Act 1988, which states that "The owner of the copyright has the exclusive right to copy the work."

It is illegal to: 1. Copy or distribute software or its documentation without the permission or licence of the copyright owner. This presentation have been made for professional practice only BJPSoftware theft2. Run purchased software on two or more computers simultaneously unless the license specifically allows it. 3. Knowingly or unknowingly allow, encourage or pressure employees to make or use illegal copies sources within the organization. 4. Loan software in order that a copy be made of it.

This presentation have been made for professional practice only BJPsOftware theftSome ways to prevent software theftKeep original software boxes and media in a secure location.Back up your files and disks regularly.Always keep license agreements seriously and make sure to use them properly.Don't go on sites that could be potentially sketchy, because most cases the site could be used to hack into your information.

This presentation have been made for professional practice only BJPInformation Theft

The picture below shows information theft. Software theft can sometimes lead to information theft.This presentation have been made for professional practice only BJPSoftware vandalismTo corrupt or destroy the software is known as software vandalism.This is usually done by a hacker or some one that needs to access a computer to destroy or corrupt any file . This is usually done in movies that they access the computers without authorization and delete or corrupt files that they want to have removed.This presentation have been made for professional practice only BJPSoftware vandalismOne of the common examples of software vandalism is when a employee leaves a company due to some conflict . He tries to delete or corrupt the important or necessary files or databases of the organization. This way the company has to face some kind of loss .Software hacking is another type of software vandalism.This presentation have been made for professional practice only BJPHardware TheftHardware piracy does not exist. As one piece of hardware cannot be used at more then one place at a time . The buyer is usually the one to use the hardware for his/her own use . But this does not mean that the hardware is safe . Hardware can be stolen . The taking of hardware without the permission or authorization is called the hardware theft.This presentation have been made for professional practice only BJPHardware Theftthe picture in the background shows someone stealing the cable.This presentation have been made for professional practice only BJPHardware TheftSome ways to prevent hardware theft:Lock doors/windows that your computer is located in.Cables that lock your equipment toa desk or table that a key is needed to move.You could use a RTLS (real time location system) to track and indentify the location of your computer or any high-risk items.In case the item is stolen, make sure to use plenty of long-charactered passwords so that they can't get into your information.

This presentation have been made for professional practice only BJPHardware vandalismIt is the act of defacing or destroying computer equipment .The deletion of a software without the permission of the original owner can be called vandalism.Viruses are very common in computers . Some of the viruses corrupt the data of the user which is also a case of vandalism .

This presentation have been made for professional practice only BJPHardware vandalismThe ways to prevent hardware vandalism are the same as hardware theft .Put in locks on the computer body , or put the computer in a safe place. The best example can be found in offices , universities and other organizations etc. Be honest with yourself : dont steal or vandalize hardware .This presentation have been made for professional practice only BJPHardware vandalism

This presentation have been made for professional practice only BJPThank youThis presentation have been made for professional practice only BJPQuestions??Questions would be answered but easy questions or no questions would be highly appreciated !! This presentation have been made for professional practice only BJP