Social Implications of Network
Social Implications of Network
The internet has made it easier than ever to obtain, share and store information on a
platform that you can access from around the world.
SOFTWARE THEFT
Software theft refers to the use and distribution of software obtained by illegal
methods. This includes stealing a CD or DVD that contains software, as well as
downloading illegal software from the internet (piracy).
BANDWIDTH THEFT
Bandwith theft refers to the use of bandwidth without paying for it. People steal
bandwith in many ways, which includes stealing usernames and passwords and
connections that are not owned by them. Bandwith theft can also occur when one is
connected to an unprotected network.
Precautions include:
• Having good password policies.
• Being careful when installing free software from the internet, as it might be malware.
Hotlinking is when someone takes a file or video from his or her website and links it
to your website.
IDENTITY THEFT
Identity theft refers to stealing data that can be used to pretend that a person is
someone else. Identity theft can range from stealing any personal information such
as your name, your address, your favourite food or more official information such as
your ID number, telephone number, etc. The stolen information can be used to take
over your accounts on websites like, Twitter, instagram, etc, so as to post messages
or use these services whilst pretending to be you.
To avoid these problems, do not share your sensitive information unnecessarily and
protect your information using a secure password.
INTERNET-RELATED FRAUD
A scam is a fraudulent scheme used by a malicious person to obtain money or
something of value from someone else.
CROWD FUNDING
Crowd funding is a way for individuals and organisations to raise money from a large
number of people. It can be an alternative to using a bank or investment firm. Below
are some examples of crowd funding:
Donation crowd funding is used to raise money for a cause. It’s not just charities
who can do this – groups and individuals can also start crowd funding projects, for
example to pay for a community centre or a child’s surgery.
This involves funding a project for a set reward. For example, you might give money
to help a band record its music and get their album in return. The reward may vary
depending on how much money you give. For example, if you gave R20 you might
get the album, but if you gave R50 you might get the album and a t-shirt.
Investment crowd funding (also called “equity crowd funding”) typically involves
buying part of a company. The part you own is called a “share”. You’ll usually be one
of many shareholders, along with other crowd funders, investment firms and people
working at the company.
INTERNET ATTACKS
Internet attacks or cyber attacks refers to an attack on the infrustracture of the web
itself. Examples include the following:
MALWARE
In our modern society, computers and smartphones are used to do everything; from
transferring money with online banking, to storing personal information on the cloud.
BOTS
A bot (short for robot) is a software application that allows the user to automate
tasks and actions. On the internet, they are normally used to analyse and gather file
information.
ZOMBIES
Malware bots also have the capability to completely take over the user’s computer,
allowing the hacker to take control. When this happens it is known as a zombie.
Hackers can use zombie computers for a wide variety of applications; including
launching DoS attacks and sending spam emails in order to spread the malware.
RIGHT TO ACCESS VS RIGHT TO PRIVACY
We know by now that computer crimes depends on access to data. For one to
prevent fraud and identity theft one needs to keep their data private and one needs
to protect it.
FIREWALLS
The firewall is responsible for monitoring all incoming and outgoing traffic on a
network. If the firewall detects any traffic that is not within the defined set of security
rules, it is blocked. Through this action, the firewall prevents malware from
spreading over a computer network.
ANTIVIRUS PROGRAMS
An antivirus or anti-malware is a computer program designed to detect, identify,
prevent and remove malware from your computer. The program achieves this by
running on your computer as a background process. This allows the program to
scan the computer, as well as any external storage devices that are connected to the
computer, for malicious software.
ANTI-SPYWARE
Anti-spyware is a type of computer program designed to prevent, detect and remove
spyware programs from your computer.
CONDUCTING BUSINESS
The internet has created a whole new platform that we can use to conduct business
and to reach new customers. This includes the following:
One of most important ways in which technology has impacted our daily lives, is
through the invention of distributed computing power. Distributed computing power
technologies, such as cloud and grid computing, allow users to store information on
the internet, as well as increase their computing power, by using a network where
one computer can use the computing power and resources of other computers.