Cybersecurity and Computer Misuse
Cybersecurity and Computer Misuse
Cybersecurity and Computer Misuse
5ARB
COMPUTER MISUSE
Computers make it so easy for you to collect, store and share information; likewise, they also
make it easy for the misuse of information or the committing of computer crimes. For
example, information is collected on people who use the Internet, whether they know it or
not.
Information may be misused in the following ways:
■ by collecting information about people without their permission.
■ by vengeful employees or employers who want to spread propaganda on suspecting
persons.
■ by (wilfully or unwittingly) storing incorrect information on an innocent person that may
be made available to the public
■ when unauthorised persons are able to view and/or change information.
■ by using information for purposes other than those for which it was intended.
2. COPYRIGHT INFRINGEMENT
A copyright infringement is a violation of an individual or organisation’s copyright. It
describes the unauthorised use of copyrighted material, such as text, photos, videos, music,
software and other original content. In the computer industry, copyright often refers to
software programs and websites.
3. DATA THEFT
This is the act of stealing computer-based information from an unknowing target with the
intention of compromising privacy or obtaining confidential information. This misuse act is
increasingly a problem for individual computer users, as well as large corporations.
4. DENIAL-OF-SERVICE ATTACK
A denial-of-service attack is a security event that occurs when an attacker prevents legitimate
users from accessing specific computer systems, devices, services or other IT resources.
12. PROPAGANDA
The use of computer systems to distribute information has inevitably resulted in their use for
spreading both beneficial and harmful material. The widespread use of the Internet by
computer users has created a readily accessible means of transmitting such material. In some
countries, such propaganda may be used to sway public support in favour of one party group
or another in an attempt to discredit the opposing groups.
KEY WORDS/VOCABULARY:
■ Computer/cyber or IT security
■ Cyberbullying
■ Copyright infringement
■ Data theft
■ Denial-of-service attacks
■ Viruses and malware
■ Phishing attacks
■ Software and music piracy
■ Financial abuses
■ Violation of privacy
■ Propaganda
■ Electronic eavesdropping
■ Industrial espionage