0% found this document useful (0 votes)
41 views7 pages

Computer Security and Misuse

The document provides an overview of computer security, data misuse, and cybercrime, defining key terms and differentiating between computer security and cyber security. It outlines various forms of computer misuse by individuals, organizations, and governments, along with examples of malware and countermeasures to mitigate threats. Additionally, it discusses the impact of information technology on various sectors, including education, medicine, business, law enforcement, and recreation.

Uploaded by

benetoisabella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views7 pages

Computer Security and Misuse

The document provides an overview of computer security, data misuse, and cybercrime, defining key terms and differentiating between computer security and cyber security. It outlines various forms of computer misuse by individuals, organizations, and governments, along with examples of malware and countermeasures to mitigate threats. Additionally, it discusses the impact of information technology on various sectors, including education, medicine, business, law enforcement, and recreation.

Uploaded by

benetoisabella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

INFORMATION TECHNOLOGY

GRADE 10
COMPUTER SECURITY AND DATA MISUSE

Computer security refers to the protection of hardware and software resources against their
accidental or deliberate damage, theft or corruption ( in case of software). It can also be defined
as all the activities related to identifying, assessing and managing vulnerabilities, threats and
attacks on a computer system.

Computer misuse relates to a range of illegal activities during which a computer system or
computer network is accessed, or its data is accessed, modified or deleted without proper
authorization, its services obtained and used to commit a criminal act.

Cyberspace-generally refers to any data or resources that can be accesses via a network or the
space where the internet operates.

Cybercrime-any crime perpetrated using computers and networks.

Cyber security- all the activities related to identifying, assessing and managing the
vulnerabilities, threats and attacks originating from cyberspace. Eg. Of cyber security is a spam
filter in an email application program. Spam filters identify emails that are trying to scam
legitimate users and automatically delete them. It is the body of technologies, processes and
practices designed to protect networks, computers, programs and data from attack, damage or
unauthorized access.

Cyber security and computer security are closely related. Computer security is inward looking
with the focus on safeguarding local computer installations under our control while cyber
security looks outward to focus on providing safe guards when our computers systems connect to
external network such as the internet.

Data security is the protection of data against intentional or accidental damage.

Deliberate damage (HACKING)- This is the unauthorized access and use of networked or
stand alone computer system to steal or damage data and programs.

Accidental damage- this occurs through genuine errors by computer users, such as overwriting
the most recent data or entering incorrect commands. Damage can also occur as a result of
viruses transferred from secondary storage devices or via the internet.

Misuse of data
 Acts which are likely to cause unauthorized modification, removal or copying of the
contents of any computer system
 Directly or indirectly obtaining computer service without proper authorization e.g. Music
download from an illegal site
 Accessing programs or data on a computer with the intent to commit a crime
 Unauthorized access to a computer system

Computer misuse by individuals would include:


 Sending a personal email from a work computer during periods of work
 Gaining unauthorized access to the company’s online banking service
 Moving funds from a company account into a personal account

Computer misuse by an organization would include:


 Software piracy (where software is used without paying the appropriate fees)
 Industrial espionage (unauthorized access of a competitor’s computer system to copy
confidential data)

Computer misuse by a government would include:


 Intercepting private emails
 Altering election results
 Spreading “fake news”

Common ways in which computer systems and data may be misused are:

Individual Organization Government


 Cyberbullying  Copyright  Electronic
infringement eavesdropping
 Financial Abuse  Data Theft  espionage
(credit card fraud and  Denial of service
identity theft attacks
 Financial abuse

 Online publication of  Industrial espionage  Manipulation of data


obscene materials

 Phishing attacks  Software and music  Propaganda


piracy
 Violation of privacy  Transmission of
malware

Computer Misuse (Individual)

 Cyber bullying-a form of bullying or harassment using computer based communication.

 Identity theft-deliberate use of someone else’s identity, usually to gain a financial


advantage eg. False application for loans and credit cards, fraudulent withdrawals from
bank accounts, fraudulent use of online accounts, fraudulently obtaining other goods and
services

 Online Publication of obscene materials- obscene material is material of sexual nature


or material that offends against society’s morality. Obscene material is offensive to look
at and someone who accidentally views this material may feel invasion of privacy
because this is on their computer in their home. This can lead to emotional distress.

 Phishing attacks-the attempt to obtain sensitive information such as usernames and


passwords and credit card details by sending emails pretending to be from a legitimate
organization.

 Violation of privacy-privacy is the right of persons to choose freely under what


circumstances and to what extent they will reveal information about themselves. Privacy
relates to an individuals ability to control their personal information.

Computer Misuse (Organization)

 Copyright infringement-copyright is a legal right that gives the creator of an original


work exclusive rights over its use and distribution. Copyright is a form of intellectual
property applicable to certain forms of creative work such as books, maps, poetry and
plays. These rights includes reproduction, control over original works, distribution and
public performance.

Copyright infringement occurs when an entity that is not a rights holder reproduces,
creates an original work, distributes, performs or otherwise benefits from the copyrighted
work without obtaining the requisite permission and pay any associated fees. Copyright
can be infringed by individuals and companies alike.

 Software and music piracy-the unauthorized reproduction, distribution or use of


software products. Software or music piracy occurs when someone does not abide by the
rules to obtain permission from an owner. This type of piracy results from illegal use,
sharing, selling or distribution of copies of software or music and prevents the rightful
owner from getting money due to them for their creative efforts.

 Data Theft-the unauthorized copying or removal of data from the legitimate owner’s
computer system. Data theft may be instigated internally by an employee or externally by
hackers exploiting poor security or lost/stolen storage devices or media. The effects on an
organization of data theft include reputational loss and loss of customers, possibly
leading to reduction in profits and in extreme cases the organization maybe forced to
cease operating.

 Denial of service attack (DOS) -a cyber attack where the intent is to prevent a service
from being delivered by a target system. A denial of service attack occurs when computer
systems or networks are overwhelmed with so much data and processing that it makes it
difficult or impossible for legitimate users to access their computer systems, devices or
other network services. For eg. Students trying to access their CXC results at the same
time.

 Financial Abuse-computer based fraud where individuals gain unauthorized access to


financial accounts and change the details of those accounts to their advantage.

 Industrial Espionage -Spying to gain information that can be used to further a purpose
or that can be used against the party being spied on.

Malware

This is software designed to disrupt, damage or gain unauthorized access to a computer system.
Viruses, worms, trojans, ransomware and spyware are all types of malware. The writers of
malware use a variety of means to spread malware and infect networks and devices. Malicious
programs can be delivered physically to a system via USB drive or other external storage device,
via the internet(when a user downloads a legitimate program), phishing attacks.

Name of malware Description


Ransomware A type of malware designed to infect a user’s system and encrypt
data: cyber criminals then demand a ransom payment from the
victim in exchange for promising to decrypt the systems data.
Spyware A type of malware designed to collect information and data on users
and observe their activities without their knowledge
Trojans A type of malware included with a legitimate program and activated
following installation, trojans execute (run) malicious functions
such as stealing usernames and passwords
Viruses A type of malware that resides in a host program and executes itself
when the program runs. It spreads by replicating itself and infecting
other programs or files; it can corrupt or delete data on a computer
system
Worms A type of malware that can self replicate without a host program;
worms typically spread without any human interaction or directives
from the malware authors.

Computer Misuse (Government)

 Propaganda-communication of information that is of a biased or misleading nature and


that is aimed at influencing the recipient. Propaganda can be used by various groups such
as activists groups, companies, the media and government bodies for various purposes.

 Electronic eavesdropping-the use of electronic devices to monitor electronic


communications between two or more groups without the permission of any of the
communicating parties.
Counter measures to mitigate effects of identified threats
Whether a threat is deliberate or accidental, all methods should be taken to prevent it from
occurring or to minimize its effects. A counter measure is a procedure, either physical or logical
that recognises, reduces, or eliminate a threat.
Data protection

Refers to computer users who can protect their data against loss or damage. It also refers to data
protection laws, which set down rules about what information can be kept by others about you.

Areas of counter measures


 Physical measures
 Software measures
 Personal security practices

Physical security measure- any mechanism that reduces the risk of unauthorized access to a
computer system’s hardware. These can be:

 Controlling access to location containing computer hardware


 Security personnel (well trained security guards) operating at access points to process
visitors and grant access to authorized persons only
 Include biometric systems, key cards, magnetic swipe cards, numeric keypads and
proximity cards at key access points which automatically record details of authorized
access or unauthorized attempts
 Secure locking mechanism fitted on computer system cases, peripheral devices and
storage cabinets
 Purchase purpose built cabinets or safe boxes that can withstand fire and flood events are
used to store removable storage media (flash drives, memory cards, cds and dvds) when
not in use.

Software measure- these are a combination of specialized system software and application
software used to protect computer systems. These include:

 Backup and recovery procedures- make a safety copy of important files regularly to a
removable storage device and keep at a remote location in a secure waterproof/fireproof
cabinet. Recover data from the copy in case of an event that causes data damage or loss

 Effective identity checking systems including biometrics-grant access to restricted areas


based on the presentation of a password or access code, fingerprint, retina or voice

 Encryption-this involves using a code so that the data cannot be understood. It involves
encrypting sensitive data before transmitting it over public networks or storing on
removable media. Also use higher levels of encryption for more sensitive data such as
access codes and credit card

 Firewall-this blocks dangerous content on a network. Restrict network traffic entering or


leaving a system usually blocking all traffic except email and access to the world wide
web. Use firewall as a barrier between a public network and the organization’s private
network.

 Malware detection and removal-set anti-virus tools to automatically scan for malware
all removable devices attached to a computer system and all network traffic including
incoming email and file transfer protocol (FTP) downloaded files. Keep up to date and
regularly run an anti-virus program to perform an in depth scan of all files on the
computer system. Immediately quarantine and/or remove identified threats.

 Operating systems updates- set the operating system to automatically download and
install updates.

Personal security practices-these are counter measures used by individuals to implement


computer security and cyber security. These include:
 Limit use of open wi-fi networks by exercising extreme caution when using open wifi
connection. Never use an open wifi connection for confidential work such as online
banking

 Follow password best practices-create secure but memorable passwords, never share
passwords, access codes, credentials or username with anyone

 Defend against identity theft-reduce the sharing of personal identifying information


including dates, places and names.

 Always be aware of phishing emails-remain alert whenever you receive an unsolicited


email, check URLs and hyperlinks before clicking; ensure that each is from a trusted
source and is legitimate

 Keep track of your mobile devices and removable storage devices

 Access sensitive files only on a secure network- don’t access sensitive files or carry out
banking transactions on free public wifi in the shopping mall or parks because they are
not secure

 Make regular backups of your own files. Work files should only be backed up by the
company and so should be copied by employees as this presents a security risk.

The effects of automation on job security

The introduction of computers has led to a change in the way persons work. Being able to use a
computer system has become an indispensable skill. Unskilled and low-skilled workers are
retraining and becoming more productive by using IT systems.

 In offices, typists have had to retrain to become skilled work processing clerks

 In education, teachers and lecturers need skills similar to those of modern office
personnel to access student records, produce test papers and maintain electronic mark
books

 Medical personnel need to access patient records, produce documents, plot charts and
graphs of patients progress and operate computerized life support systems

 Musicians now use computers as a creative tool to create, mix and distribute their music

 Mass media personnel also use computers in a creative way. Newspaper publishers must
be skilled in desktop publishing to layout their magazines and papers. Photo editing skills
are needed to enhance pictures ready for publication. In the visual mass media such as
television, the skills to create animations, charts and graphs must be mastered.

 Law enforcement officers require computer literacy skills including word processing to
fill in crime reports, database skills to access criminal records and specialist skills to
operate a variety of software such as fingerprint matching.

 In the movie industry staff must be able to exploit the power of computers, particularly
when editing the movie and in the production of special effects animation and computer
modelling.


Roles of various personnel in computer-related professions

Computer systems require a large number of skilled professionals to:


Develop software, maintain websites, manage databases, run social media, and keep computers
and network running smoothly. Some organizations base their business on their computer
systems for eg banks.
 Network engineer-responsible for the design and implementation of computer network
LANS, MANS AND WANS

 Computer programmer- writes programs based on specifications, prepares


documentation and maintains existing software.

 Computer support specialist-assists users who are having problems with their computer
systems

 Systems analysts- oversees activities relating to the design and development of new
information systems

 Database administrator-responsible for designing and maintaining the organization’s


database system

 Network administrator- responsible for day-to-day smooth running of the


organization’s network

 Software developer-works with the system analyst and develops the program
specifications that the programmers will work from

 Web developer-takes a web design from client and turns it into an operational website

 Social media specialist-responsible for planning and implementing a company’s social


media strategy and output which may include facebook, twitter, instagram etc

 System administrator-responsible for the day-to-day running and management of the


computer systems. Installs and updates software and ensures the system is secure.

Impact of Information and Communications Technology (ICT) on Education, Medicine,


Business, Law Enforcement and Recreation.

 Computers and their impact on education- access to information, computer aided


instruction, remote/distance learning , interactive computer based training allow student
to work at their own pace and at a time that is convenient to them, collaborative teaching
and learning, plagiarism; online tutoring.

 Computers and their impact on medicine- access to information (for both medical
personnel and patients), telemedicine, eHealth (online access to health services),
implications for the quality of healthcare, increase in self-diagnosis, easy access to
medical expertise in distant location (for example, teleradiology).

 Computers and their impact on business- E-commerce, Electronic Point of


Sale(EPOS), telecommuting Email.

 Computers and their impact on law enforcement-E-surveillance, finger printing,


Biometrics.

 Computers and their impact on Recreation-music and gaming

You might also like