1 - Summary - Social Implications
1 - Summary - Social Implications
Computer-related crimes
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate
crimes). Cybercriminals may use computer technology to access personal information,
business trade secrets or use the internet for exploitative or malicious purposes.
Cybercrime encompasses a wide range of activities, but these can
generally be broken into two categories:
SOFTWARE THEFT
Software theft is the unauthorized copying of software. Most retail
programs are licensed for use at just one computer site or for use by
only one user at any time. By buying the software, you become a
licensed user rather than an owner (see EULA). You are allowed to
make copies of the program for backup purposes, but it is against the
law to give copies to friends and colleagues.
Source: https://www.webopedia.com/TERM/S/software_piracy.html
For additional
information
To avoid software theft, do the following:
BANDWIDTH THEFT
Bandwidth theft refers to the use of bandwidth without paying for it.
Bandwidth theft can also occur when one is connected to an unprotected
network.
Precautions include:
IDENTITY THEFT
Identity theft occurs when someone uses your personal information to pretend to be you to
commit fraud or to gain financial benefits.
Your personal information could be your full name, email address, online login and
passwords, driver's license number, passport number or bank account number. Criminals
can gain access to these types of information and sell it on the dark web to commit identity
theft.
CROWDFUNDING
Crowdfunding is a method of raising capital through the collective effort of
friends, family, customers, and individual investors. This approach taps into the
collective efforts of a large pool of individuals-primarily online via social media
and crowdfunding platforms-and leverages their networks for greater reach and
exposure.
Source: https://www.cisco.com/c/en/us/products/security/common-
Scan for more cyberattacks.html
MALWARE
Malware is a term used to describe malicious software, including spyware, ransomware,
viruses, and worms. Malware breaches a network through a vulnerability, typically when a
user clicks a dangerous link or email attachment that then installs risky software. Once
inside the system, malware can do the following:
Scan to watch clip Bots can be used for productive tasks, but they are also frequently
used for malicious purposes.
Source: https://www.techopedia.com/definition/24063/internet-bot
ZOMBIES
In computing, a zombie is a computer connected to a network that has been compromised
and taken over by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks.
Source: https://www.pandasecurity.com/en/security-info/zombie/
If you do your work on a computer owned by someone else, they may have the right to claim
access to your data files.
If you use online services such as Facebook you should be aware that their End User
License Agreement states that whatever you post belongs to them.
If your school has an AUP for the computer lab that you have accepted, you may have
allowed people other than yourself to access your data files.
FIREWALLS
A firewall is a system
Scan for more
designed to prevent
unauthorised access
to or from a private
network. You can
implement a firewall in
either hardware or
software form, or a
combination of both. Firewalls prevent unauthorised internet users
from accessing private networks connected to the internet, especially Scan for more
intranets. All messages entering or leaving the intranet (the local
network to which you are connected) must pass through the firewall,
which examines each message and blocks those that do not meet the
specified security criteria.
Source: https://kb.iu.edu/d/aoru
https://www.researchgate.net/publication/323903323_A_Study_on_Positive_and_Negative_Effects
_of_Social_Media_on_Society,
https://socialnetworking.lovetoknow.com/Negative_Impact_of_Social_Networking_Sites