SlideShare a Scribd company logo
1 of 7
GOOD AFTERNOON



TITLE: HARWARE THEFT AND VANDALISM

GROUP MEMBERS: G.SHALINI
                REEVENIA
                ANJANAH
What is hardware theft and vandalism?
-are other types of computer security risks



HARDWARE THEFT
-is the act of stealing computer equipment

HARDWARE VANDALISM
-is the act of defacing or destroying computers
equipment
HARDWARE THEFT
-Hardware theft consist of people opening up
computers and taking parts out of them .Hardware
theft also happens in retail stores ,when people break
open the package and shoplift the item.




HARDWARE VANDALISM
-Hardware vandalism takes may forms ,from someone
cutting a computer cable to individuals breaking into
business or school computers lab and aimlessly
smashing computer.
IS THEFT PART OF VANDALISM?

It depends on the crime and the victim’s
point of view. It can be called theft if you
stealing space on a person’s possession or
building .In the sphere of auto vandalism
then theft is involved.
Hardware theft and vandalism do not really pose a
threat to the home desktop computer
user but it threat for those have a smaller system units
that easily can fit in a backpack or briefcase. It is easy to
steal because of its weight and its small size.

Mobile users also are susceptible to hardware theft. More
than 600,000 notebooks is estimated stolen each year. Theft
often target notebook computer of company executives so
that they can access confidential information illegally.

In the case ,hardware theft is combined with software theft.
Hardware theft
Hardware theft

More Related Content

What's hot

Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Script forum bi
Script forum biScript forum bi
Script forum biirna zuzy
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)Nawanan Theera-Ampornpunt
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configurationAlberto Rivai
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

What's hot (20)

cyber security
cyber securitycyber security
cyber security
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Script forum bi
Script forum biScript forum bi
Script forum bi
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Viewers also liked

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Data theft
Data theftData theft
Data theftLaura
 
Strategies for reading comprehension
Strategies for reading comprehensionStrategies for reading comprehension
Strategies for reading comprehensionsaaaira
 
Scsi(small computer system interface)nik
Scsi(small computer system interface)nikScsi(small computer system interface)nik
Scsi(small computer system interface)nikNikhil Joshi
 
Understanding the difference between Data, information and knowledge
Understanding the difference between Data, information and knowledgeUnderstanding the difference between Data, information and knowledge
Understanding the difference between Data, information and knowledgeNeeti Naag
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI ProtocolRakesh T
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy PowerpointMbradber
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Types of elasticity of demand
Types of elasticity of demandTypes of elasticity of demand
Types of elasticity of demandNikhil Soares
 
Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)Student
 

Viewers also liked (20)

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Data theft
Data theftData theft
Data theft
 
Strategies for reading comprehension
Strategies for reading comprehensionStrategies for reading comprehension
Strategies for reading comprehension
 
Memory unit
Memory unitMemory unit
Memory unit
 
Scsi(small computer system interface)nik
Scsi(small computer system interface)nikScsi(small computer system interface)nik
Scsi(small computer system interface)nik
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
 
Understanding the difference between Data, information and knowledge
Understanding the difference between Data, information and knowledgeUnderstanding the difference between Data, information and knowledge
Understanding the difference between Data, information and knowledge
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI Protocol
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Data vs. information
Data vs. informationData vs. information
Data vs. information
 
Control unit
Control unitControl unit
Control unit
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Types of elasticity of demand
Types of elasticity of demandTypes of elasticity of demand
Types of elasticity of demand
 
Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)
 
Security threats
Security threatsSecurity threats
Security threats
 

Similar to Hardware theft

Similar to Hardware theft (20)

Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Hackers
HackersHackers
Hackers
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hackers final
Hackers finalHackers final
Hackers final
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from chrispaul8676 (13)

Buses in a computer
Buses in a computerBuses in a computer
Buses in a computer
 
Expansion Slot
Expansion SlotExpansion Slot
Expansion Slot
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
data representation
data representationdata representation
data representation
 
Dhacaini
DhacainiDhacaini
Dhacaini
 
Chong ren jye
Chong ren jyeChong ren jye
Chong ren jye
 
System Unit
System UnitSystem Unit
System Unit
 
It presentation
It presentationIt presentation
It presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
It ppt new
It ppt newIt ppt new
It ppt new
 
System failure
System  failureSystem  failure
System failure
 
Hackers
HackersHackers
Hackers
 

Recently uploaded

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Hardware theft

  • 1. GOOD AFTERNOON TITLE: HARWARE THEFT AND VANDALISM GROUP MEMBERS: G.SHALINI REEVENIA ANJANAH
  • 2. What is hardware theft and vandalism? -are other types of computer security risks HARDWARE THEFT -is the act of stealing computer equipment HARDWARE VANDALISM -is the act of defacing or destroying computers equipment
  • 3. HARDWARE THEFT -Hardware theft consist of people opening up computers and taking parts out of them .Hardware theft also happens in retail stores ,when people break open the package and shoplift the item. HARDWARE VANDALISM -Hardware vandalism takes may forms ,from someone cutting a computer cable to individuals breaking into business or school computers lab and aimlessly smashing computer.
  • 4. IS THEFT PART OF VANDALISM? It depends on the crime and the victim’s point of view. It can be called theft if you stealing space on a person’s possession or building .In the sphere of auto vandalism then theft is involved.
  • 5. Hardware theft and vandalism do not really pose a threat to the home desktop computer user but it threat for those have a smaller system units that easily can fit in a backpack or briefcase. It is easy to steal because of its weight and its small size. Mobile users also are susceptible to hardware theft. More than 600,000 notebooks is estimated stolen each year. Theft often target notebook computer of company executives so that they can access confidential information illegally. In the case ,hardware theft is combined with software theft.