2. WHAT IS A “HACKER”?
• A hacker is a person who uses computers to
gain unauthorized access to data.
• hacking is any technical effort to manipulate
the normal behavior of network connections
and connected systems.
3. HOW CAN YOU PROTECT YOUR
COMPUTER FROM HACKERS?
• FIREWALLS- a set of related programs, located at a
network gateway server, that protects the resources
of a private network from users from other
networks
• ANTI-VIRUS SOFTWARE- A type of program that
searches your hard drive for any known or potential
viruses, and stops them before they expand
• SECURE PASSWORDS- make sure your password is a
strong and safe password that cannot be easily
guessed
4. WHAT MOTIVATES A HACKER?
SOME HACKERS ARE MOTIVATED FOR ENTERTAINMENT
REASONS, MEANING THEY ENJOY VANDALIZING NETWORK
PROPERTY.
OTHERS ARE MOTIVATED FOR VENGEANCE
PURPOSES,AS IN HACKING SOMEONES FACEBOOK ACCOUNT TO
EMBARRASS THEM.
HOWEVER, MOST HACKERS DO WHAT THEY DO TO GET
SOMETHING OUT OF IT. THEY TRY TO OBTAIN PASSWORDS TO
VARIOUS SITES AND IMPORTANT DATA. ALSO THEY LOOK FOR
YOUR PERSONAL INFORMATION, SOMETIMES BEING CREDIT
CARD INFORMATION,SOCIAL SECURITY,BILLS, AND MORE.
5. POTENTIAL OUTCOMES OF HACKING:
CREDIT CARD THEFT
THERE ARE MANY OUTCOMES THAT MY OCCUR
AFTER BEING HACKED, ONE BEING CREDIT
CARD THEFT. HACKERS MAY GAIN ACCESS INTO
YOUR PERSONAL FILES AND STEAL YOUR
CREDIT CARD INFORMATION, ALLOWING THEM
TO USE YOU YOUR CREDIT CARD, AND ACCESS
INFORMATION SUCH AS PHONE NUMBERS AND
ADDRESSES.
6. POTENTIAL OUTCOMES OF HACKING:
CONTROL OVER YOUR NETWORK
WHEN A HACKER GAINS ACCESS TO YOUR
NETWORK THEY MAY ALSO ACCESS ANYTHING
THAT YOUR NETWORK CONTROLS. FOR
EXAMPLE, IF YOU HAVE CAMERAS SET UP VIA A
NETWORK, ANYONE WHO HACKS YOUR
SYSTEM MAY ACCESS ANY FOOTAGE AND TURN
THEM ON/OFF.