Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

These notes belong to Anil Jhilmit, BWSS.

SECTION 3:
SOCIAL AND ECONOMIC IMPACT OF INFORMATION AND COMMUNICATIONS
TECHNOLOGY (ICT)

IMPLICATIONS OF MISUSE AND CYBERSECURITY

1. Outline the concepts of computer security, cybersecurity and computer misuse.

 Computer security – this is all the activities related to identifying, assessing and managing
vulnerabilities, threats and attacks on a computer system or network.

 Computer misuse – this is any activity during which a computer system or computer network is
accessed or its data is accessed, modified or deleted without proper authorisation.

 Cyberspace – generally refers to any data or resources that can be accessed via a network or the
space where the internet operates. The internet gives users access to large parts of cyberspace.

 Cybercrime – is any crime perpetrated using computers and networks. It also includes other
electronic devices such as smartphones, tablets etc.

 Cybersecurity – is all the activities related to identifying, assessing and managing the
vulnerabilities, threats and attacks originating from cyberspace. It is the body of technologies,
processes and practices designed to protect users, networks, computers, programs and data
from attack, damage or unauthorised access.

Elements of computer security.

Firewall – A fire wall monitors a network, blocking dangerous content such as viruses. It can be either a
physical device (hardware) attached to the network or software running on the connected computer or
the server on a network.

1
These notes belong to Anil Jhilmit, BWSS.

2. Assess the potential impact of computer systems misuse based on the main entities impacted;

Cyberbullying
 A form of harassment or bullying using computer based communication.

Copyright infringement
 As a general matter, copyright infringement occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or made into a derivative work without the
permission of the copyright owner.
 Copyright infringement is the use or production of copyright-protected material without the
permission of the copyright holder.

Data theft
 Data theft is the act of stealing information stored on computers, servers, or other devices from
an unknowing victim with the intent to compromise privacy or obtain confidential information.
 The unauthorised copying or removal of data from the legitimate owner’s computer system.

Denial of service attacks


 A denial-of-service (DoS) attack occurs when legitimate users are unable to access information
systems, devices, or other network resources due to the actions of a malicious cyber threat
actor.
 A “denial of service” or DoS attack is used to tie up a website’s resources so that users who need
to access the site cannot do so.
 A cyber-attack where the intent is to prevent a service being delivered by the target system.

Identity theft
 This is the deliberate use of someone else’s identity, usually to gain a financial advantage.
 Identity theft is the crime of obtaining the personal or financial information of another person
for the sole purpose of assuming that person's name or identity to make transactions or
purchases.

2
These notes belong to Anil Jhilmit, BWSS.

Online publication of obscene materials


 Uploading any material that may be considered obscene to another individual or organization
with the intention to cause hurt, embarrassment or traumatize the person or organization.

Software piracy
 Is the unauthorised reproduction, distribution or use of software products.

Financial abuses
 The illegal use of ICT to obtain financial gains.

Phishing attacks
 Is an attempt to obtain sensitive information such as usernames, passwords and credit card
details by sending emails pretending to be from a legitimate organization.
 Phishing emails can be detected because
o They are unsolicited
o They contain spelling or grammar errors
o They urge you to act immediately
o An email program may warn you that the email is potentially a scam or harmful.
Transmission of viruses and malware
 Viruses and malware are programs that can attack computers, tablets, phones and other digital
devices.
 Malware is malicious software designed to disrupt, damage or gain unauthorised access to a
computer system.
 Their transmission constitutes misuse of computers.

3
These notes belong to Anil Jhilmit, BWSS.

Violation of privacy
 Privacy is the right of persons to choose freely under what circumstances and to what extent
they will reveal information of themselves. It related to an individual’s ability to control their
personal information.
 Any ACT that violates the above constitutes a violation of privacy and also includes
o Storage of inaccurate personal data.
o Sharing of data (either for free or for a fee) without the owner’s consent.
o Using data for purposes other than that for which it was collected.

Propaganda
 Is communication of information that is of a biased or misleading nature and that is aimed at
influencing the recipient.
 Can also be defined as information, ideas or rumours that are deliberately and widely spread to
help for harm a person, a group, movement, institution, nation or other entity.

4
These notes belong to Anil Jhilmit, BWSS.

Electronic eavesdropping
 Is the act of electronically intercepting communications without the knowledge or consent of at
least one of the participants.
 The unauthorized real time interception of a private communication such as a phone call,
instant message, video conference or fax transmission.

Industrial espionage
 The illegal act of investigating competitors to gain a business advantage.
 The term industrial espionage refers to the illegal and unethical theft of business trade
secrets for use by a competitor to achieve a competitive advantage. This activity is a covert
practice often done by an insider or an employee who gains employment for the express
purpose of spying and stealing information for a competitor. Industrial espionage is conducted
by companies for commercial purposes rather than by governments for national security
purposes.

3. Describe suitable countermeasures to mitigate effects of identified threats;

5
These notes belong to Anil Jhilmit, BWSS.

Personal Security practices.

6
These notes belong to Anil Jhilmit, BWSS.

4. Assess the effect of automation on job security.

The introduction of computers has led to a change in the way persons work. Being able to use a
computer system has become an indispensable skill. Unskilled and low skilled workers are retraining
and becoming more productive by using IT systems because of the productivity gains of using compuers.
Consider the following;
 In offices, typist had to retrain to become skilled word processing clerks.

 In education, teachers and lecturers need skills similar to those of modern office personnel to
access student’s records, produce test papers and maintain electronic mark book.

 Medical personnel need to access patient records, produce documents, plot charts and graphs
of patient’s progress and operate computerized life support systems.

 Musicians now use computers as a creative tool to create, mix and distribute their music.

 Mass media personnel use computers in a creative way. Newspaper publishers must be skilled in
desktop publishing to lay out their magazine and papers.

 Law enforcement officers require literacy skills including word processing to fill in crime reports,
database skills to access criminal records and specialist skills to operate software such as
fingerprint matching and photo fit picture software.

 In the movie industry, staff must be able to exploit the power of computers particularly when
editing the movie and in the production of special effects, animations and computer modelling.

Automation in the job as seen above has many benefits as well as it has some disadvantages which
include
 Job loss – the use of computers had significantly reduced the amount of personnel needed in
the work place.
 A single employee with a computer can now do the same job of 2 or more employees who are
not using a computer. For example in the field of accounting.
 Many employees now have to be retrained to function in a computerized environment.

7
These notes belong to Anil Jhilmit, BWSS.

5. Describe the roles of various personnel in computer-related professions.

6. Assess the impact of information and communications technology on select fields.


 Refer to textbook/handout pages 120 – 124.

You might also like