0% found this document useful (0 votes)
0 views

computer and cyber security

The document discusses computer security and cybersecurity, emphasizing the importance of protecting systems from unauthorized access, theft, and misuse. It outlines various forms of computer misuse, including cyberbullying, data theft, and identity theft, as well as countermeasures such as effective passwords, encryption, and physical security measures. Additionally, it highlights personal security practices to mitigate risks associated with digital threats.

Uploaded by

Oumotia
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

computer and cyber security

The document discusses computer security and cybersecurity, emphasizing the importance of protecting systems from unauthorized access, theft, and misuse. It outlines various forms of computer misuse, including cyberbullying, data theft, and identity theft, as well as countermeasures such as effective passwords, encryption, and physical security measures. Additionally, it highlights personal security practices to mitigate risks associated with digital threats.

Uploaded by

Oumotia
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

IMPLICATIONS OF MISUSE AND CYBER SECURITY

COMPUTER AND CYBERSECURITY

Computer security - is the protection of computer systems and information from harm (both
natural and man-made), theft, and unauthorized use. It is the process of preventing and
detecting unauthorized use of your computer system. So, Computer security can be defined
as controls that are put in place to provide confidentiality, integrity, and availability for all
components of computer systems.

 Confidentiality is ensuring that


information is available only to the
intended audience
 Integrity is protecting information
from being modified by unauthorized
parties
 Availability is protecting information
from being modified by unauthorized
parties

Cybersecurity is defined as protecting computer systems, which communicate over the


computer networks. In the present age, cyber threats are constantly increasing as the world is
going digital.
Computer Misuse - Unauthorised access to computer materials with intent to commit a
further crime. This refers to entering a computer system to steal data or destroy a device or
network (such as planting a virus). Unauthorised modification of data.

Computer Vulnerability is a weakness or flaw in one or more computer systems, or connectivity


to computer systems. This weakness can be used to gain access and even damage the system
or its data.

Threats – a security threat attempts to take advantage of a vulnerability or


weakness in a system or its data. The origin of threat may be accidental,
environmental (natural disaster), human negligence or human failure.

Attack is an deliberate unauthorized action on a system or asset. Attack can be


classified as active and passive attack. An attack will have a motive and will follow
a method when opportunity arise.
The difference between threat and attack are:

S.NO THREAT ATTACK

1 Can be intentional or unintentional Is intentional

Is malicious
2 May or may not be malicious

Circumstance that has ability to


3 cause damage Objective is to cause damage

4 Information may or may not be Chance for information alteration and


S.NO THREAT ATTACK

altered or damaged damage is very high

5 Comparatively hard to detect Comparatively easy to detect

Can be blocked by control of Cannot be blocked by just controlling


6 vulnerabilities the vulnerabilities

Can be initiated by system itself Is always initiated by outsider (system


7 as well as outsider or user)

COMPUTER MISUSE

1. Cyberbullying –This is bullying with the use of digital technologies. It can


take place on social media, messaging platforms, gaming platforms and
mobile phones. Cyberbullying includes sending, posting, or sharing negative,
harmful, false, or mean content about someone else.

Copyright infringement – Copyright infringement typically involves someone using


another person's original creative work, or a copyrighted work, without permission.

There are many types and forms of copyright infringement. These are some
examples of activities that would constitute copyright infringement if you carry them
out without first obtaining permission from the owner, creator, or holder of the
copyrighted material:

 Recording a film in a movie theater


 Posting a video on your company's website which features copyrighted
words or songs
 Using copyrighted images on your company's website
 Using a musical group's copyrighted songs on your company's website
 Modifying an image and then displaying it on your company's website
 Creating merchandise for sale which features copyrighted words or images
 Downloading music or films without paying for their use
 Copying any literary or artistic work without a license or written agreement

2. Data theft – Data theft is the act of stealing digital information stored on
computers, servers, or electronic devices of an unknown victim with the
intent to compromise privacy or obtain confidential information.

3. Denial of Service attack – This occurs when computer


systems or networks are overwhelmed with so much data
and processing that its difficult or imposible for legitimate
users to access their computer systems, devices or other
network resources. This results in an inconvenience to a
majority of users on the network.
4. Transmission of viruses and malware – A computer virus
is a malicious program which is loaded into the user’s
computer without user’s knowledge. It replicates itself and
infects the files and programs on the user’s PC. The ultimate
goal of a virus is to ensure that the victim’s computer will
never be able to operate properly or even at all.

A computer worm is a software program that can copy itself


from one computer to another, without human interaction.
The potential risk here is that it will use up your computer
hard disk space because a worm can replicate in great
volume and with great speed.

5. Identity theft – the form of a fraud in which the criminal


pretends to be someone else. Criminals use computerised
systems to steal people’s credit card information, date of
birth and other personal details that are typically used by
banks to prove who you are online or by telephone. Identity
theft is used to obtain money from an account, buy goods
and services, get benefits of medical and other insurance, or
to avoid being arrested for a crime or to obtain travel visas.

6. Online publication of Obscene materials – the form of a

7. Phishing attacks – Disguising as a trustworthy person or


business, phishers attempt to steal sensitive financial or
personal information through fraudulent email or instant
messages. Phishing in unfortunately very easy to
execute. You are deluded into thinking it’s the legitimate
mail and you may enter your personal information.

8. Software and music piracy – software programs and


music files accessible online are owned by individuals and
organisations. There are rules or licences for all programs
and music specifying the permissions and limitations on how
they should be used. Software and music piracy occurs
when someone disobey the rules and may results from
illegal use, sharing, selling or distribution of copies of
software or music. Software and music piracy prevents the
rightful owners from getting money due to them for their
creative efforts.

9. Propaganda – The use of computer system to distribute


information to spread harmful or false material or to give an
unbalanced version of events. For example, propaganda
may be used to sway public support in favour of one party
group or in an attempt to discredit opposing groups.

10. Electronic eavesdropping – The use of electronic


devices to monitor electronic communications between
persons without their permission and knowledge. For
example computer data communication, voice, fax, land and
cellular telephone and e-mail. Some computers can be
modified to intercept information along a communication
channel such as telephone lines and radio waves. In some
countries police and some companies have the right to
monitor or intercept emails, text messages and telephone
calls of others or their employees. When this is done by
unauthorized persons, however, it becomes a crime.
Encryption can be used to reduce electronic eavesdropping.
11. Industrial espionage - Some organizations have gain
advantage over their competitors by illicitly gaining access
to information about their marketing strategy, latest
research, expansion plans by hacking into organizational
databases and viewing the information they contain. This
can be done more easily if the hackers have accomplices
working within the organization.
COUNTER MEASURES

- SOFTWARE MEASURES

1. Effective Passwords – used to restrict access to private networks.


2. Authentication systems

3. Encryption – data is encrypted when it is converted into a secret code and


needs to be decrypted back to ordinary text to be used.
4. Virus Protection – a virus is a program that has been created in order to
cause damage to computer systems. Virus can be transferred to your
computer when you visit websites, open attachments that come with an
email, through CDs, DVDs, and USB drives or across a network system.
Virus protection software is used to protect computers from viruses. It is
important that you keep your software up to date because new viruses are
produced every day.

5. Firewalls – devices controlled by software programs that check all the data
communications that come into and go out or the network. It blocks any
communications that do not match its rules. The rules can be set to give the
level of protection that is need for the network.
PHYSICAL MEASURES
1. Prevent people from getting into buildings – electronic door entry systems
are used to prevent access to buildings, and rooms these include
 Keypad
 ID card – a card swipe read the data held on the magnetic strip give
permission to enter
 Smart card – has a chip embedded in it that carries a lot of information
on the user.
 Biometric systems – reads fingerprint, palm print, and patterns of the
iris or face and match the images against those already stored in the
systems.
Security guards, alarm systems and security cameras are also used for
prevention of access.

2. Keeping important data away from harm – data must be protected from
deliberate and accidental loss or damage. This can be done by storing data
on hard disks, tapes floppy disks and optical media.

3. Recovery when things go wrong – this is done by


 Backups – a copy of a file that is kept in a safe place in case the first
one is damaged. The two main types or backup are
i. Full backup – set up automatically to make a backup of
everything on a regular basis e.g. every night.
ii. Incremental backup – copies only the files that have been
changed since the last backup e.g. during the working day.
 Archives – copying old information to new storage media and stored
safely.

 Proprietary software – software used by a commercial company and


available for anyone to buy and use under license. This type of
software uses additional security e.g. it may use more complicated
methods of encryption than might otherwise be used or it may use
biometric systems whenever the user logs in.

 Hardware firewall:

PERSONAL SECURITY PRACTICES

 secure your computer physically by:


o Installing reliable, reputable security and anti-virus software
o Activating your firewall, because a firewall acts as a security guard
between the internet and your local area network
 Stay up-to-date on the latest software and news surrounding your devices
and perform software updates as soon as they become available
 Avoid clicking on email attachments unless you know the source.
 Verify authenticity of email from companies or individuals
 Assessing websites URLs for authenticity
 Limit access to open WI-FI networks
 Change passwords regularly, using a unique combination of numbers, letters
and case types
 Use the internet with caution and ignore pop-ups, drive-by downloads while
surfing
 Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen to your
computer.

You might also like