GOOD AFTERNOONTITLE: HARWARE THEFT AND VANDALISMGROUP MEMBERS: G.SHALINI                REEVENIA                ANJANAH
What is hardware theft and vandalism?-are other types of computer security risksHARDWARE THEFT-is the act of stealing comp...
HARDWARE THEFT-Hardware theft consist of people opening upcomputers and taking parts out of them .Hardwaretheft also happe...
IS THEFT PART OF VANDALISM?It depends on the crime and the victim’spoint of view. It can be called theft if youstealing sp...
Hardware theft and vandalism do not really pose athreat to the home desktop computeruser but it threat for those have a sm...
Hardware theft
Hardware theft
Upcoming SlideShare
Loading in...5
×

Hardware theft

3,622

Published on

IT IS A SLIDE ON COMPUTER HARDWARE THEFT

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
3,622
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
48
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hardware theft

  1. 1. GOOD AFTERNOONTITLE: HARWARE THEFT AND VANDALISMGROUP MEMBERS: G.SHALINI REEVENIA ANJANAH
  2. 2. What is hardware theft and vandalism?-are other types of computer security risksHARDWARE THEFT-is the act of stealing computer equipmentHARDWARE VANDALISM-is the act of defacing or destroying computersequipment
  3. 3. HARDWARE THEFT-Hardware theft consist of people opening upcomputers and taking parts out of them .Hardwaretheft also happens in retail stores ,when people breakopen the package and shoplift the item.HARDWARE VANDALISM-Hardware vandalism takes may forms ,from someonecutting a computer cable to individuals breaking intobusiness or school computers lab and aimlesslysmashing computer.
  4. 4. IS THEFT PART OF VANDALISM?It depends on the crime and the victim’spoint of view. It can be called theft if youstealing space on a person’s possession orbuilding .In the sphere of auto vandalismthen theft is involved.
  5. 5. Hardware theft and vandalism do not really pose athreat to the home desktop computeruser but it threat for those have a smaller system unitsthat easily can fit in a backpack or briefcase. It is easy tosteal because of its weight and its small size.Mobile users also are susceptible to hardware theft. Morethan 600,000 notebooks is estimated stolen each year. Theftoften target notebook computer of company executives sothat they can access confidential information illegally.In the case ,hardware theft is combined with software theft.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×