Nothing Special   »   [go: up one dir, main page]

Theft of Information

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Topic: INTRODUCTION TO COMPUTING, COMPUTER SAFETY AND SECURITY

Objectives:
▪ Collect information about introduction to computing, computer safety and security
▪ Classify the introduction to computing, computer safety and security

References: https://edu.gcfglobal.org/en/computerbasics/basic-parts-of-a-computer/1/

Activity

Concept Note #2 :
INTRODUCTION TO COMPUTING, COMPUTER SAFETY AND SECURITY

● Computer Frauds and Crimes


Computer fraud, closely linked to internet fraud, is defined as
1) the use of a computer or computer system to help execute a scheme or illegal activity
2) the targeting of a computer with the intent to alter, damage, or disable it.

Computer fraud breaks down roughly into three categories:

THEFT OF INFORMATION
Theft of information refers to the theft of information from a secure or private computer system, as
when a hacker illegally breaks into a government system to obtain top secret information. The theft of
trade secrets and the computer-aided duplication of copyrighted materials—such as video games,
movies, and music—also fall into this category.

THEFT OF SERVICE
Theft of service is when a hacker uses a computer to access web sites or Internet connections for
which he did not pay. It may also include using a computer to break into long distance systems to “steal”
service for free calls. Usually, theft of service is classified as Internet fraud, Often lumped together with
computer fraud, Internet fraud includes any scheme that uses a Web site, chat room, email account, or all
three to defraud a company or individual. Examples of crimes include offering nonexistent goods to a
buyer (such as with an online auction), stealing someone’s funds by hacking into his bank or credit card
account, or illegally using access devices, such as those of a paid news subscription service. Conversely,
denial of service includes “mail bombing", which is when someone purposely attempts to disable an email
account by sending massive amounts of emails to its address.

HACKING
Hacking refers to illegal entry into a computer’s hardware system. Hackers obtain passwords and
delete information, create programs to steal passwords, or even rummage through company garbage to
find secret information. Such criminals might pose as computer repairmen in order to gain easy access to
computer systems, or they might create and send out dangerous computer viruses.

Online sex crimes such as stalking and child pornography are also classified as computer fraud.

● Computer Functions

There are necessary functions of computer that needs to perform by the computer itself for
completing all the task. Not every PC owner knows about the specific functions the corresponding
computing device performs.

Basically, a computer is an electronic machine, used for processing and storing, the data given by
the user. There are different types of computers from micro to supercomputers. Some have many
functions with complexity while the basic computer has only 4 functions.

So, this article explains the basic functionality of the computer system as well as the functions of
each component.

In the most general sense, The Four Basic Functions of Computers are: –
● Input Function
● Processing Data
● Storing Data
● Output Function

● Parts of a computer
The basic parts of a desktop computer are the computer
case, monitor, keyboard, mouse, and power cord. Each part plays an important
role whenever you use a computer.

The computer case is the metal and plastic box that contains the
main components of the computer, including the motherboard, central
processing unit (CPU), and power supply. The front of the case usually has
an On/Off button and one or more optical drives.

The monitor works with a video card, located inside the


computer case, to display images and text on the screen. Most
monitors have control buttons that allow you to change your
monitor's display settings, and some monitors also have built-in
speakers.

The keyboard is one of the main ways to communicate


with a computer. There are many different types of keyboards, but
most are very similar and allow you to accomplish the same
basic tasks.

The mouse is another important tool for


communicating with computers. Commonly known as
a pointing device, it lets you point to objects on the
screen, click on them, and move them.

Mouse alternatives

There are other devices that can do the same thing as a mouse. Many people find them easier
to use, and they also require less desk space than a traditional mouse. The most common
mouse alternatives are below.

⮚ Trackball: A trackball has a ball that can rotate freely. Instead of


moving the device like a mouse, you can roll the ball with your
thumb to move the pointer.

⮚ Touchpad: A touchpad—also called a trackpad—is a touch-


sensitive pad that lets you control the pointer by making a drawing
motion with your finger. Touchpads are common on laptop
computers.

You might also like