IT Notes
IT Notes
1. Computer Vulnerability
A vulnerability is a weakness in a computer
system (hardware, software, data, or users)
that can be exploited.
Makes systems susceptible to damage, data
theft, or unauthorised access.
Vulnerabilities can be external or internal.
External Vulnerabilities:
No protection from natural disasters (floods,
hurricanes, earthquakes).
Lack of safeguards against power
surges/spikes.
Terrorist attacks targeting infrastructure.
Internal Vulnerabilities:
Human error (accidental deletion or
overwriting).
No backup systems in place.
Absence of anti-virus protection.
Former employees still having access.
2. Threats and Security
A threat is any action that takes advantage of
a vulnerability.
Computer security protects hardware/software
from damage, theft, and corruption.
3. Types of Damage
Deliberate Damage:
Hacking – breaking into a computer without
permission.
Changing data- Editing files to create false
information.
Accidental Damage:
Mistakes like wrong commands.
Human error.
4. Data Communications
Data shared via electronic methods can be
intercepted.
Sensitive information can be accessed by third
parties.
Security involves encryption, secure channels,
and access controls.
6. Misuse of Information
Organisations collect data from users (e.g.
hospitals, banks).
Misuse includes selling info (e.g. for
advertising) without consent.
Individuals should have a choice regarding use
of their data.
9. Propaganda
Computers and the internet can spread both
positive and harmful messages.
Can be used to sway public opinion or discredit
opponents.
Cybersecurity Threats
1. Phishing
Fake websites/emails mimic trusted sources
(banks, schools) to steal info.
Common tactics: forms requesting personal
info, attachments with malware, fake requests
for money.
2. Denial-of-Service (DoS)
Floods a system/network with traffic until it
crashes.
Symptoms: Slow network, can't access sites,
junk email overload.
3. Industrial Espionage
Gaining competitive info through hacking.
Stealing data like marketing plans, R&D,
business strategies.
4. Electronic Eavesdropping
Monitoring digital communications without
permission.
Uses: capturing data via radio waves,
keyloggers, intercepted emails.
Protection: Encryption makes data unreadable
without a key.
Misuse of Information
1. Hacking
Unauthorised access to systems, often for
sabotage or "fun".
2. Piracy
Illegal copying/distribution of software or
music.
Breaks copyright law; companies lose income.
2. Work Patterns
Remote work (telecommuting) more common.
Pros: Flexibility, no commute.
Cons: Isolation, distractions.
3. Employment
Some jobs lost, others created (IT support,
programming).
Need for retraining.
4. Health & Safety
Risks: Eye strain, posture issues, RSI.
Prevention: ergonomic equipment, regular
breaks.