SOCIAL AND ECONOMIC IMPACT
OF INFORMATION AND
COMMUNICATIONS TECHNOLOGY
(ICT)
OBJECTIVE 1: Students should be able to develop an understanding of the
various elements of computer security, and data misuse and the impact on
individuals and organisations;
COMPUTER SECURITY vs CYBERSECURITY
This is the protection of computer systems from
theft or damage to their hardware, software or
electronic data, as well as from disruption or
misdirection of the services they provide.
• Asset: A useful or valuable thing. May include hardware,
software, documentation, data, communications, environment
and people.
• Risk: Is a potential problem that a system or its user may
experience. An asset is usually at risk when a threat exploits its
vulnerabilities.
• Threat: A set of circumstances that could cause harm. May
include users, terrorist, hackers, criminals, motivated groups,
acts of God
• Vulnerability: Is a weakness that might be exploited to cause
loss or harm. May include the ability to be exposed, stolen, lost,
deleted, contain software bugs
• Attack (or exploit) – An action taken that uses one or more
vulnerabilities to realize a threat. This could be someone
following through on a threat or exploiting a vulnerability.
• Countermeasure: Procedures / Processes put in place to reduce
or mitigate or control a risk. Countermeasures seek to do the
following:
• Reduce the threat
• Reduce the vulnerability
• Reduce the impact
• Detect a hostile event
• Recover from an event
COMPUTER MISUSE
• Computer systems are vulnerable to individuals from inside
an organization using a system without permission.
• Their motivation may range from being inquisitive about
the software and data that is being used through to
attempting to steal data or damage the system.
• When a computer system is connected to the Internet, there
is an additional risk that someone from outside an
organization may attempt to gain access to the computer.
Computers may be misused by:
• Collecting information about people without their
permission.
• Vengeful employees or employers who want to spread
propaganda on unsuspecting persons
• (Willfully or unwittingly) storing incorrect information on
an innocent person that may be available to the public.
• Unauthorized persons being able to view and/or change
information.
• Using information for purposes other than those for
which it was intended
CYBERBULLYING
This is the use of electronic
communication (cell phones,
instant messaging, email,
chat rooms, or social
networking sites such as
Facebook and Twitter) to
harass, threaten or
intimidate someone by
sending messages.
COPYRIGHT INFRINGEMENT
This is the use of work
protected by copyright law
without permission infringing
certain exclusive rights
granted to the copyright holder
such as the right to reproduce,
distribute, display or perform
the protected work or to make
derivative works.
DATA THEFT
The act of stealing computer-
based information (information
stored on computers, servers or
other devices) from an unknowing
victim with the intent of
compromising privacy or
obtaining confidential
information.
DENIAL OF SERVICE ATTACKS
This is a security event that
occurs when an attacker prevents
legitimate users (interrupts) from
accessing specific computer
systems, devices, network or other
IT resource, usually with
malicious intent.
TRANSMISSION OF VIRUSES AND MALWARE
• Malware is any software intentionally
designed to cause damage to a computer,
server or computer network. Malware
includes computer viruses, worms, Trojan
horses and spyware.
• A computer virus is a malicious program
that self-replicates by copying itself to
another program.
IDENTITY THEFT
The fraudulent
practice of using
another person’s name
and personal
information in order
to obtain credit, loans,
etc
ONLINE PUBLICATION OF OBSCENE MATERIALS
This is the selling,
distributing, and
publishing of material
which is of a nature
destructive to society
online.
PHISHING ATTACKS
This is the fraudulent attempt to obtain
sensitive information such as usernames,
passwords and credit card details, often for
malicious reasons, by disguising as a
trustworthy entity in an electronic
communication.
SOFTWARE AND MUSIC PIRACY
The illegal copying, distributing or use of
software and music where the rights owner
(composer, recording artist or copyright
holder) did not give consent
FINANCIAL ABUSES
This is the illegal or
unauthorized use of
computers to gain a
financial advantage.
VIOLATION OF PRIVACY
Privacy refers to the right of
the individual to determine
what information is stored
about them and how the
information will be used.
Violation of privacy is the
intrusion into an individual’s
rights.
PROPAGANDA
This is the spreading of information in
support of a cause. It is used to manipulate
or influence the opinion of individuals to
support a particular cause or belief. It is
often used in a negative sense.
ELECTRONIC EAVESDROPPING
This is the act of
electronically
intercepting
conversations (“listening
in”) without the
knowledge or consent of
at least one of the
participants.
INDUSTRIAL ESPIONAGE
This is the spying of
competitors on their
competition to obtain
secret information about
that company in an effort
to gain a business
advantage.
Misuse Entity impacted
Cyberbullying Individual
Copyright infringement Individual, organization
Data theft Individual, organization, government
Denial of service attack Individual, organization, government
Transmission of viruses and malware Individual, organization, government
Identity theft Individual, organization, government
Online publication of obscene materials Individual
Phishing attacks Individual, organization, government
Software and music piracy Individual, organization
Financial abuses Individual, organization, government
Violation of privacy Individual
Propaganda Individual, organization, government
Electronic eavesdropping Individual, organization, government
Industrial espionage Organization