IMPLICATIONS OF MISUSE AND CYBER SECURITY
COMPUTER AND CYBERSECURITY
Computer security - is the protection of computer systems and information from harm (both
natural and man-made), theft, and unauthorized use. It is the process of preventing and
detecting unauthorized use of your computer system. So, Computer security can be defined
as controls that are put in place to provide confidentiality, integrity, and availability for all
components of computer systems.
Confidentiality is ensuring that
information is available only to the
intended audience
Integrity is protecting information
from being modified by unauthorized
parties
Availability is protecting information
from being modified by unauthorized
parties
Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks. In the present age, cyber threats are constantly increasing as the world is
going digital.
Computer Misuse - Unauthorised access to computer materials with intent to commit a
further crime. This refers to entering a computer system to steal data or destroy a device or
network (such as planting a virus). Unauthorised modification of data.
Computer Vulnerability is a weakness or flaw in one or more computer systems, or connectivity
to computer systems. This weakness can be used to gain access and even damage the system
or its data.
Threats – a security threat attempts to take advantage of a vulnerability or
weakness in a system or its data. The origin of threat may be accidental,
environmental (natural disaster), human negligence or human failure.
Attack is an deliberate unauthorized action on a system or asset. Attack can be
classified as active and passive attack. An attack will have a motive and will follow
a method when opportunity arise.
The difference between threat and attack are:
S.NO THREAT ATTACK
1 Can be intentional or unintentional Is intentional
Is malicious
2 May or may not be malicious
Circumstance that has ability to
3 cause damage Objective is to cause damage
4 Information may or may not be Chance for information alteration and
S.NO THREAT ATTACK
altered or damaged damage is very high
5 Comparatively hard to detect Comparatively easy to detect
Can be blocked by control of Cannot be blocked by just controlling
6 vulnerabilities the vulnerabilities
Can be initiated by system itself Is always initiated by outsider (system
7 as well as outsider or user)
COMPUTER MISUSE
1. Cyberbullying –This is bullying with the use of digital technologies. It can
take place on social media, messaging platforms, gaming platforms and
mobile phones. Cyberbullying includes sending, posting, or sharing negative,
harmful, false, or mean content about someone else.
Copyright infringement – Copyright infringement typically involves someone using
another person's original creative work, or a copyrighted work, without permission.
There are many types and forms of copyright infringement. These are some
examples of activities that would constitute copyright infringement if you carry them
out without first obtaining permission from the owner, creator, or holder of the
copyrighted material:
Recording a film in a movie theater
Posting a video on your company's website which features copyrighted
words or songs
Using copyrighted images on your company's website
Using a musical group's copyrighted songs on your company's website
Modifying an image and then displaying it on your company's website
Creating merchandise for sale which features copyrighted words or images
Downloading music or films without paying for their use
Copying any literary or artistic work without a license or written agreement
2. Data theft – Data theft is the act of stealing digital information stored on
computers, servers, or electronic devices of an unknown victim with the
intent to compromise privacy or obtain confidential information.
3. Denial of Service attack – This occurs when computer
systems or networks are overwhelmed with so much data
and processing that its difficult or imposible for legitimate
users to access their computer systems, devices or other
network resources. This results in an inconvenience to a
majority of users on the network.
4. Transmission of viruses and malware – A computer virus
is a malicious program which is loaded into the user’s
computer without user’s knowledge. It replicates itself and
infects the files and programs on the user’s PC. The ultimate
goal of a virus is to ensure that the victim’s computer will
never be able to operate properly or even at all.
A computer worm is a software program that can copy itself
from one computer to another, without human interaction.
The potential risk here is that it will use up your computer
hard disk space because a worm can replicate in great
volume and with great speed.
5. Identity theft – the form of a fraud in which the criminal
pretends to be someone else. Criminals use computerised
systems to steal people’s credit card information, date of
birth and other personal details that are typically used by
banks to prove who you are online or by telephone. Identity
theft is used to obtain money from an account, buy goods
and services, get benefits of medical and other insurance, or
to avoid being arrested for a crime or to obtain travel visas.
6. Online publication of Obscene materials – the form of a
7. Phishing attacks – Disguising as a trustworthy person or
business, phishers attempt to steal sensitive financial or
personal information through fraudulent email or instant
messages. Phishing in unfortunately very easy to
execute. You are deluded into thinking it’s the legitimate
mail and you may enter your personal information.
8. Software and music piracy – software programs and
music files accessible online are owned by individuals and
organisations. There are rules or licences for all programs
and music specifying the permissions and limitations on how
they should be used. Software and music piracy occurs
when someone disobey the rules and may results from
illegal use, sharing, selling or distribution of copies of
software or music. Software and music piracy prevents the
rightful owners from getting money due to them for their
creative efforts.
9. Propaganda – The use of computer system to distribute
information to spread harmful or false material or to give an
unbalanced version of events. For example, propaganda
may be used to sway public support in favour of one party
group or in an attempt to discredit opposing groups.
10. Electronic eavesdropping – The use of electronic
devices to monitor electronic communications between
persons without their permission and knowledge. For
example computer data communication, voice, fax, land and
cellular telephone and e-mail. Some computers can be
modified to intercept information along a communication
channel such as telephone lines and radio waves. In some
countries police and some companies have the right to
monitor or intercept emails, text messages and telephone
calls of others or their employees. When this is done by
unauthorized persons, however, it becomes a crime.
Encryption can be used to reduce electronic eavesdropping.
11. Industrial espionage - Some organizations have gain
advantage over their competitors by illicitly gaining access
to information about their marketing strategy, latest
research, expansion plans by hacking into organizational
databases and viewing the information they contain. This
can be done more easily if the hackers have accomplices
working within the organization.
COUNTER MEASURES
- SOFTWARE MEASURES
1. Effective Passwords – used to restrict access to private networks.
2. Authentication systems
3. Encryption – data is encrypted when it is converted into a secret code and
needs to be decrypted back to ordinary text to be used.
4. Virus Protection – a virus is a program that has been created in order to
cause damage to computer systems. Virus can be transferred to your
computer when you visit websites, open attachments that come with an
email, through CDs, DVDs, and USB drives or across a network system.
Virus protection software is used to protect computers from viruses. It is
important that you keep your software up to date because new viruses are
produced every day.
5. Firewalls – devices controlled by software programs that check all the data
communications that come into and go out or the network. It blocks any
communications that do not match its rules. The rules can be set to give the
level of protection that is need for the network.
PHYSICAL MEASURES
1. Prevent people from getting into buildings – electronic door entry systems
are used to prevent access to buildings, and rooms these include
Keypad
ID card – a card swipe read the data held on the magnetic strip give
permission to enter
Smart card – has a chip embedded in it that carries a lot of information
on the user.
Biometric systems – reads fingerprint, palm print, and patterns of the
iris or face and match the images against those already stored in the
systems.
Security guards, alarm systems and security cameras are also used for
prevention of access.
2. Keeping important data away from harm – data must be protected from
deliberate and accidental loss or damage. This can be done by storing data
on hard disks, tapes floppy disks and optical media.
3. Recovery when things go wrong – this is done by
Backups – a copy of a file that is kept in a safe place in case the first
one is damaged. The two main types or backup are
i. Full backup – set up automatically to make a backup of
everything on a regular basis e.g. every night.
ii. Incremental backup – copies only the files that have been
changed since the last backup e.g. during the working day.
Archives – copying old information to new storage media and stored
safely.
Proprietary software – software used by a commercial company and
available for anyone to buy and use under license. This type of
software uses additional security e.g. it may use more complicated
methods of encryption than might otherwise be used or it may use
biometric systems whenever the user logs in.
Hardware firewall:
PERSONAL SECURITY PRACTICES
secure your computer physically by:
o Installing reliable, reputable security and anti-virus software
o Activating your firewall, because a firewall acts as a security guard
between the internet and your local area network
Stay up-to-date on the latest software and news surrounding your devices
and perform software updates as soon as they become available
Avoid clicking on email attachments unless you know the source.
Verify authenticity of email from companies or individuals
Assessing websites URLs for authenticity
Limit access to open WI-FI networks
Change passwords regularly, using a unique combination of numbers, letters
and case types
Use the internet with caution and ignore pop-ups, drive-by downloads while
surfing
Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen to your
computer.