Implications of Misuse & Cybersecurity
Implications of Misuse & Cybersecurity
Implications of Misuse & Cybersecurity
CYBERSECURITY
ASSISTANT ADVISOR: C.NORRIS
MISUSE OF DATA Data misuse is the use of
information in ways it
wasn't intended for. User
agreements, corporate
policies, data privacy laws,
and industry regulations all
set conditions for how data
can be collected and used.
Propaganda- Computer technology can be used
TYPES OF MISUSE to spread forms of propaganda, which are
OF DATA political ideals and beliefs that are publicly
announced or advertised. Propaganda may also
be used to attack opposing political parties’
beliefs and causes. Although the sharing of
ideals is not harmful in itself, the internet and
networks can be used to spread messages that
are offensive and may even be regarded as hate
speech.
For example, an employee at a company thinks
that a current company manager is not doing
his job properly, so she sends e-mails to all the
employees at the company asking that they join
her in an action to have him removed as
manager. The e-mails become vicious, and
personal and private details of the manager are
used as evidence of his incompetence. This is
an example of misusing data for political gain.
Piracy- This is any act of taking or using
TYPES OF MISUSE someone else’s work without their
OF DATA knowledge and permission. Piracy is
illegal.
EXAMPLES:
>Burning a copy of a music CD or DVD
and giving or selling it to someone else.
>Recording a movie or television program
then distributing it over the internet for
free or for money.
>Copying and downloading photos from
the internet without the photographer’s
permission and using them for your own
website or for commercial gain.
TYPES OF MISUSE Electronic Eavesdropping-
OF DATA This is eavesdropping on
data using electronic
devices. Hackers track and
use the data people type
into websites, data such as
login details or bank
account information.
TYPES OF MISUSE Industrial Espionage-This is
OF DATA when businesses spy on
competitors to learn business
secrets. One way to infiltrate a
computer network to view
confidential information, an
employee may gather
confidential information, such as
marketing strategies or product
pricing information, and sell it to
a rival company. This is illegal.
Surveillance and Invasion- Many businesses
TYPES OF MISUSE install monitoring software that keeps tracks of
OF DATA their employees’ computer use, such as their
internet use. A lot of websites use surveillance
to gather information about the people who
visit the cites. Software can track where you
click on a website, so website owners can
gather information about most popular or most
visited section of a site.
>Damage software
>Corrupt Data
RESTRICTIONS Worms and Trojan horses are not viruses but they
are malicious software:
A worm is a piece of software that attaches to a
computer memory, whereas a virus attaches to a
program. Worms are usually spread by e--mails.