You are on page 1of 22

PROFESSIONAL PRACTICE

SOFTWARE AND HARDWARE THEFT AND VANDALISM

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

GROUP MEMBERS
Burhan Javaid (BCS01113220) Rashid Ali (BCS01113114) Shahbaz Ahmed (BCS01113125) Majid Hussain Zeeshan Chaudhry
THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

To learn about our topic there are some things that need to be understood first .

Software Hardware Theft Vandalism


THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE
Software means computer instructions or data. Anything that can be
stored electronically is called software.

Software is very vital for the performance of the computer. Software


controls the working of the hardware devices .

Some famous softwares are office , spotflux etc .

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE
Computer hardware refers to the physical parts or components of a
computer such as monitor, keyboard, Computer data storage, hard drive disk, mouse, system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that you can actually touch.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

THEFT
Theft is acquiring something for urself that does not belong to you . It
is either taken by force or by taking it without the permission.

IN computer science theft can be about two things Software theft Hardware theft

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

VANDALISM

The process of destroying something


is called vandalism . Destroying doesnt necessarily means like burning it or breaking it physically but it also means to corrupt something or delete something and doing these things without any authorization .
THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE THEFT
Software theft is the unauthorized copying or distribution of copyright
protected software.

This usually means unauthorized copying, either by individuals for use


by themselves or their friends or by companies who then sell the illegal copies to users. Many kinds of software protection have been invented to try to reduce software theft but, with sufficient effort, it is always possible to bypass or "crack" the protection, and software protection is often annoying for legitimate users.
THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE THEFT
Software theft in 1994 was estimated to have cost $15 billion in worldwide lost
revenues to software publishers. It is an offence in the UK under the Copyright, Designs and Patents Act 1988, which states that "The owner of the copyright has the exclusive right to copy the work."

It is illegal to: 1. Copy or distribute software or its documentation without the permission or licence
of the copyright owner.
THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE THEFT
2. Run purchased software on two or more computers simultaneously
unless the license specifically allows it.

3. Knowingly or unknowingly allow, encourage or pressure employees


to make or use illegal copies sources within the organization.

4. Loan software in order that a copy be made of it.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE THEFT
Some ways to prevent software theft Keep original software boxes and media in a secure location. Back up your files and disks regularly. Always keep license agreements seriously and make sure to use
them properly.

Don't go on sites that could be potentially sketchy, because most


cases the site could be used to hack into your information.
THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

INFORMATION THEFT
The picture below shows information theft. Software theft can sometimes lead to information theft.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE VANDALISM
To corrupt or destroy the software is known as software vandalism. This is usually done by a hacker or some one that needs to access a
computer to destroy or corrupt any file .

This is usually done in movies that they access the computers without
authorization and delete or corrupt files that they want to have removed.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

SOFTWARE VANDALISM
One of the common examples of software vandalism is when a
employee leaves a company due to some conflict . He tries to delete or corrupt the important or necessary files or databases of the organization. This way the company has to face some kind of loss .

Software hacking is another type of software vandalism.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE THEFT
Hardware piracy does not exist. As one piece of hardware cannot be
used at more then one place at a time . The buyer is usually the one to use the hardware for his/her own use .

But this does not mean that the hardware is safe . Hardware can be
stolen . The taking of hardware without the permission or authorization is called the hardware theft.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE THEFT
the picture in the background shows someone stealing the cable.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE THEFT

Some ways to prevent hardware theft:

Lock doors/windows that your computer is located in.

Cables that lock your equipment to a desk or table that a key is needed to move.
You could use a RTLS (real time location system) to track and indentify the location of your computer or any high-risk items. In case the item is stolen, make sure to use plenty of long-charactered passwords so that they can't get into your information.

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE VANDALISM
It is the act of defacing or destroying computer equipment . The deletion of a software without the permission of the original owner
can be called vandalism.

Viruses are very common in computers . Some of the viruses corrupt


the data of the user which is also a case of vandalism .

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE VANDALISM
The ways to prevent hardware vandalism are the same as hardware
theft .

Put in locks on the computer body , or put the computer in a safe


place. The best example can be found in offices , universities and other organizations etc.

Be honest with yourself : dont steal or vandalize hardware .


THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

HARDWARE VANDALISM

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

Thank you
THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

QUESTIONS??
Questions would be answered but easy
questions or no questions would be highly appreciated !!

THIS PRESENTATION HAVE BEEN MADE FOR PROFESSIONAL PRACTICE ONLY BJP

You might also like