Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Cyber

Security
and
Information
misuse
Objectives
At the end of this lesson, students should
be able to:
1. Outline the concepts of cyber security
and computer misuse.
What is cyber security?

► Cybersecurity refers to a set of


techniques used to protect the integrity
of networks, programs and data from
attack, damage or unauthorized access.
Elements of cybersecurity

► These are other concepts that come up whenever cyber security is


mentioned. Elements include:
► Vulnerability
► Threat
► Attack
► Countermeasure
vulnerability

► This a cyber-security term


that refers to a flaw in a
system that can leave it
open to attack.
► This may also refer to any
type of weakness in a
computer system, or in
anything that leaves
information security open to
threat.
► In computer security, a threat is a possible danger
Threat that might exploit a vulnerability to breach security
and therefore cause harm.
► In computer security, an attack is any attempt to
expose, alter, disable, destroy, steal or gain
unauthorized access to or make unauthorized use
of an asset.
► Some examples of common cyber security attacks
Attack include:
► Phishing attacks
► SQL injection
► Denial of Service
► Malware
► A cyber countermeasure is defined as
an action, process, technology, device,
or system that serves to prevent or
Countermeasures mitigate the effects of a cyber attack
against a victim, computer, server,
network or associated device.
Computer and information misuse

► Computer misuse is the


unauthorized act with intent to
impair operations of the
computer.
► Information misuse refers to the
use of information for any other
purpose than was initially
intended.
Ways in which information can be misused

► Information may be misused in the following ways:


► By collecting information about people without their permission.
► By vengeful employees or employers who want to spread propaganda on
unsuspecting persons
► By willfully storing incorrect information on an innocent person that may be
available to the public
► When unauthorized persons are able to view and/or change information
► By using information for purposes other than those for which it was intended
Ways to reduce
information misuse

Ways to reduce information misuses:


► Enforcing Data protection laws
► Utilizing Security Systems
► Keeping information accurate and up to
date
► Having severe penalties for when
employers and employees distribute
private information.
Data Protection laws

Data protection laws generally state that


personal data must:
► Be obtained & processed fully and
lawfully.
► Be held for specified purposes.
► Not be used for any reason besides its
original purpose.
► Be relevant and adequate.
► Be accurate and up to date.

You might also like