7
GOOD AFTERNOON TITLE: HARWARE THEFT AND VANDALISM GROUP MEMBERS: G.SHALINI REEVENIA ANJANAH

Hardware theft

Embed Size (px)

DESCRIPTION

IT IS A SLIDE ON COMPUTER HARDWARE THEFT

Citation preview

Page 1: Hardware theft

GOOD AFTERNOON

TITLE: HARWARE THEFT AND VANDALISM

GROUP MEMBERS: G.SHALINI REEVENIA ANJANAH

Page 2: Hardware theft

What is hardware theft and vandalism?

-are other types of computer security risks

HARDWARE THEFT

-is the act of stealing computer equipment

HARDWARE VANDALISM

-is the act of defacing or destroying computers equipment

Page 3: Hardware theft

HARDWARE THEFT-Hardware theft consist of people opening up computers and taking parts out of them .Hardware theft also happens in retail stores ,when people break open the package and shoplift the item.

HARDWARE VANDALISM-Hardware vandalism takes may forms ,from someone cutting a computer cable to individuals breaking into business or school computers lab and aimlessly smashing computer.

Page 4: Hardware theft

IS THEFT PART OF VANDALISM?

It depends on the crime and the victim’s point of view. It can be called theft if you stealing space on a person’s possession or building .In the sphere of auto vandalism then theft is involved.

Page 5: Hardware theft

Hardware theft and vandalism do not really pose a threat to the home desktop computer

user but it threat for those have a smaller system units that easily can fit in a backpack or briefcase. It is easy to steal because of its weight and its small size.

Mobile users also are susceptible to hardware theft. More than 600,000 notebooks is estimated stolen each year. Theft often target notebook computer of company executives so that they can access confidential information illegally.

In the case ,hardware theft is combined with software theft.

Page 6: Hardware theft

Safeguards againts hardware theft

To protect hardware media from being stolen:

Physical access control such as lock door and windows, usually are to protect the

equipment.-out of sight of prying eyes.-all computer users should

back up their files and disks regularly, in the event of

theft. l

Page 7: Hardware theft

The end