Professional Documents
Culture Documents
I.T CSEC Computer Security and Cybersecurity
I.T CSEC Computer Security and Cybersecurity
Cybersecurity
Cyberspace
Attack Actual action that The resentful ex-employee may encrypt company files
causes harm or and demand a ransom for the recovery files
damage
Counter An action to Set the firewall to allow access from current
measure counteract a threat employees’ devices only
Computer Misuse
Computer misuse is any activity during
which a computer system or computer
network is accessed, or its data is
accessed, modified or deleted without
proper authorisation.
Computer Misuse
Computer misuse is considered to include:-
– Acts which are likely to cause unauthorised modification,
removal or copying of the contents of any computer system.
– Directly or indirectly obtaining computer service without
proper authorisation (e.g. music download from an illegal site).
– Accessing programs or data on a computer with the intent to
commit a crime.
• Transmission of malware
Computer Misuse that Impacts
Individuals
We will now outline five (5) acts of computer
misuse that primarily impact Individuals:-
Cyberbullying
Identity theft
Online publication of obscene materials
Phishing attacks
Violation of privacy
Cyberbullying
Cyberbullying is a form of bullying or
harassment using computer-based
communications.
For example:-
False applications for loans and credit
cards
Fraudulent withdrawal’s from bank
accounts
Identity Theft
For example:-
Fraudulent use of online accounts
Fraudulently obtaining other goods or
services
Online Publication of
Obscene Materials
Obscene material is material of a sexual
nature or material that offends against
society’s morality.
FOR WATCHING