Implications of Misuse & Cybersecurity

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23
At a glance
Powered by AI
The key takeaways are that data misuse involves using information in ways it wasn't intended for and can include propaganda, piracy, electronic eavesdropping, industrial espionage, and surveillance/invasion. Physical security measures like backups, archiving, biometric systems, locks/guards, and fireproof/waterproof cabinets can also help protect data.

Some examples of data misuse discussed include an employee sending vicious emails about a company manager to get them removed, burning copies of music/movies to distribute illegally, and hackers tracking login/bank details entered on websites.

The different types of data misuse discussed are propaganda, piracy, electronic eavesdropping, and industrial espionage.

IMPLICATIONS OF MISUSE &

CYBERSECURITY
ASSISTANT ADVISOR: C.NORRIS
MISUSE OF DATA Data misuse is the use of
information in ways it
wasn't intended for. User
agreements, corporate
policies, data privacy laws,
and industry regulations all
set conditions for how data
can be collected and used.
Propaganda- Computer technology can be used
TYPES OF MISUSE to spread forms of propaganda, which are
OF DATA political ideals and beliefs that are publicly
announced or advertised. Propaganda may also
be used to attack opposing political parties’
beliefs and causes. Although the sharing of
ideals is not harmful in itself, the internet and
networks can be used to spread messages that
are offensive and may even be regarded as hate
speech.
For example, an employee at a company thinks
that a current company manager is not doing
his job properly, so she sends e-mails to all the
employees at the company asking that they join
her in an action to have him removed as
manager. The e-mails become vicious, and
personal and private details of the manager are
used as evidence of his incompetence. This is
an example of misusing data for political gain.
Piracy- This is any act of taking or using
TYPES OF MISUSE someone else’s work without their
OF DATA knowledge and permission. Piracy is
illegal.
EXAMPLES:
>Burning a copy of a music CD or DVD
and giving or selling it to someone else.
>Recording a movie or television program
then distributing it over the internet for
free or for money.
>Copying and downloading photos from
the internet without the photographer’s
permission and using them for your own
website or for commercial gain.
TYPES OF MISUSE Electronic Eavesdropping-
OF DATA This is eavesdropping on
data using electronic
devices. Hackers track and
use the data people type
into websites, data such as
login details or bank
account information.
TYPES OF MISUSE Industrial Espionage-This is
OF DATA when businesses spy on
competitors to learn business
secrets. One way to infiltrate a
computer network to view
confidential information, an
employee may gather
confidential information, such as
marketing strategies or product
pricing information, and sell it to
a rival company. This is illegal.
Surveillance and Invasion- Many businesses
TYPES OF MISUSE install monitoring software that keeps tracks of
OF DATA their employees’ computer use, such as their
internet use. A lot of websites use surveillance
to gather information about the people who
visit the cites. Software can track where you
click on a website, so website owners can
gather information about most popular or most
visited section of a site.

Cookies- are text files put on your computer by


websites you visit. They are used to store
information about you, such as your location or
your activities on the website.
Fraud and Identity Theft- Computer fraud means using
TYPES OF MISUSE computer systems to carry out fraudulent activities
such as:
OF DATA >Creating fake websites and sending e-mails that
require users to enter their personal information.

Identity Theft- is where someone uses another


person’s personal details to carry out transactions and
other activities in that person’s name. For example, a
hacker may steal your credit card details and use them
to buy things over the internet.

Credit Card Fraud- is a common type of identity theft:

>Credit cards can be used unlawfully without them


being physically stolen.

>Some criminals use hand-held devices and machines


to make copies of credit cards and the details stored in
the magnetic tape.
Cybersecurity- is the
CYBERSECURITY protection of computer
systems and networks from
information disclosure, theft of
or damage to their hardware,
software, or electronic data,
as well as from the disruption
or misdirection of the services
they provide.
Data should be protected by data integrity and
DATA INTEGRITY data security measures.
& Data Integrity- refers to the quality and content of
data and ensures that information is accurate, up
DATA SECURITY to date and legitimate. For Example, it is in the best
interest of a company to make sure that
information about its clients is regularly updated
and cannot be easily accessed and modified.

Data Security- Protects data from prying eyes and


criminals and accidental loss or damage. You do
not want people to be able to access sensitive data
or use it for their own benefits. For example, your
personal banking details should be kept secure.
SOFTWARE Software restrictions
RESTRICTIONS can create barriers to
data corruption, restrict
access to software that
may contain sensitive
data, or to software that
can cause damage.
TYPES OF Passwords- You can use passwords
to control to data. A password is a
SOFTWARE combination of characters that must
RESTRICTIONS be entered before you can access,
view and edit data. Documents and
other kinds of files and media can
also be protected by a password so
they cannot be opened or used until
the password is entered.
TYPES OF Encryption- is the method by which
information is converted into secret code
SOFTWARE that hides the information's true meaning.
RESTRICTIONS Data is written using an encryption code so
it cannot be understood just by reading it.
The data must be decrypted using a key.

The key provides the algorithm that was


used to encrypt the data
TYPES OF Firewall- A firewall is
SOFTWARE
RESTRICTIONS a software that
defends the weak
points in a computer
network to prevent
hackers from gaining
access.
Virus Protection- a virus is a piece of software
TYPES OF intended to cause harm to a computer or gain
SOFTWARE access to confidential data.

RESTRICTIONS Viruses can:

>Damage software

>Slow down a computer

>Corrupt Data

Viruses are designed so they can replicate and


spread easily from computer to computer, much
like a cold spreads from one person to another.
Antivirus Software- protects against viruses.
TYPES OF It locates known viruses on a computer or
SOFTWARE looks for software that acts like a virus.
________________________________

RESTRICTIONS Worms and Trojan horses are not viruses but they
are malicious software:
A worm is a piece of software that attaches to a
computer memory, whereas a virus attaches to a
program. Worms are usually spread by e--mails.

A Trojan Horse does not replicate itself like a virus.


It looks and behave like a genuine program but once
running, it allows hackers to gain access to the
computer system by accessing and saving
passwords.
PHYSICAL
A Computer is a
RESTRICTIONS
physical object that
can create physical
output, there are
physical ways to
protect data.
TYPES OF Backup and Recovery Procedures-
Backup data regularly. Store
PHYSICAL
second copy of the data files and
RESTRICTIONS programs away from the computer.
Example, flash drive.
If your computer gets damaged , if
a virus corrupts your data , or if
you accidentally delete or modify
data that you were not suppose to,
your backup copy will allow you to
restore that data.
TYPES OF PHYSICAL Archiving- is similar to
RESTRICTIONS backup, except it is more
commonly used for old data.
You, want to store(archive)
old data so you can refer
back to it. Businesses are
obligated to keep financial
records for a number of
years.
TYPES OF PHYSICAL Biometric Systems- A biometric
RESTRICTIONS system is a technological system
that uses information about a person
to identify that person. For Example,
a fingerprint scanner reads a
person’s fingerprint.

For security reasons, a computer or


even a building can control access
by storing the fingerprints of
authorised persons on a central
system.
TYPES OF PHYSICAL Locks and Guards- Computers and
peripherals, such as keyboards and
RESTRICTIONS monitors, are easily stolen. Here are
some ways to make them harder to steal:

>In an office or at home, locking windows


and doors and securing the premises
with an alarm system can help prevent
theft of computer equipment

>Physical data such as documents, can


be locked away in a safe or a locked
drawer to prevent them from being stolen
or viewed by unauthorized persons.
Fireproof and Waterproof Cabinets- If a
TYPES OF PHYSICAL building catches fire or is flooded, servers and
data backups can be destroyed.
RESTRICTIONS
A fireproof cabinet is a cupboard or storage
area that does not get burned by fire or
damaged by heat.

A waterproof cabinet protects its content from


being damaged by water.

You might also like