0% found this document useful (0 votes)
3 views

IT Notes

The document outlines various aspects of computer vulnerabilities, threats, and security measures, emphasizing the importance of protecting systems from both internal and external risks. It discusses types of damage, data communications, cyber threats, and the misuse of information, along with prevention strategies like encryption and backups. Additionally, it touches on the social impact of IT in the workplace, legal implications, and ethical considerations surrounding data protection.

Uploaded by

bbachertclips
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

IT Notes

The document outlines various aspects of computer vulnerabilities, threats, and security measures, emphasizing the importance of protecting systems from both internal and external risks. It discusses types of damage, data communications, cyber threats, and the misuse of information, along with prevention strategies like encryption and backups. Additionally, it touches on the social impact of IT in the workplace, legal implications, and ethical considerations surrounding data protection.

Uploaded by

bbachertclips
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

IT Notes

1. Computer Vulnerability
 A vulnerability is a weakness in a computer
system (hardware, software, data, or users)
that can be exploited.
 Makes systems susceptible to damage, data
theft, or unauthorised access.
 Vulnerabilities can be external or internal.

External Vulnerabilities:
 No protection from natural disasters (floods,
hurricanes, earthquakes).
 Lack of safeguards against power
surges/spikes.
 Terrorist attacks targeting infrastructure.

Internal Vulnerabilities:
 Human error (accidental deletion or
overwriting).
 No backup systems in place.
 Absence of anti-virus protection.
 Former employees still having access.
2. Threats and Security
 A threat is any action that takes advantage of
a vulnerability.
 Computer security protects hardware/software
from damage, theft, and corruption.

3. Types of Damage
Deliberate Damage:
 Hacking – breaking into a computer without
permission.
 Changing data- Editing files to create false
information.
Accidental Damage:
 Mistakes like wrong commands.
 Human error.

4. Data Communications
 Data shared via electronic methods can be
intercepted.
 Sensitive information can be accessed by third
parties.
 Security involves encryption, secure channels,
and access controls.

5. Cyber Threats & Cyber Security


 A cyber threat is an unauthorised attempt to
access systems/networks via the Internet.
 Cyber security defends systems by:
o Monitoring attacks
o Preventing future attacks

6. Misuse of Information
 Organisations collect data from users (e.g.
hospitals, banks).
 Misuse includes selling info (e.g. for
advertising) without consent.
 Individuals should have a choice regarding use
of their data.

7. Proprietary Data and Software


 Proprietary software/data: Created and used
exclusively by an organisation.
 Must be protected to maintain business
operations and data integrity.
8. Computer Fraud
 Fraud increases with electronic transactions.
 Examples:
o Fake websites to steal payments
o Changing financial account details for
personal gain

9. Propaganda
 Computers and the internet can spread both
positive and harmful messages.
 Can be used to sway public opinion or discredit
opponents.

10. Identity Theft


 Stealing personal info (e.g. credit card
numbers, DOB).
 Used to make purchases or cash transfers
fraudulently.

Preventing Identity Theft:


 Check bank/credit card statements.
 Use secure websites for purchases.
 Don’t input personal info on public computers.

Cybersecurity Threats
1. Phishing
 Fake websites/emails mimic trusted sources
(banks, schools) to steal info.
 Common tactics: forms requesting personal
info, attachments with malware, fake requests
for money.
2. Denial-of-Service (DoS)
 Floods a system/network with traffic until it
crashes.
 Symptoms: Slow network, can't access sites,
junk email overload.
3. Industrial Espionage
 Gaining competitive info through hacking.
 Stealing data like marketing plans, R&D,
business strategies.
4. Electronic Eavesdropping
 Monitoring digital communications without
permission.
 Uses: capturing data via radio waves,
keyloggers, intercepted emails.
 Protection: Encryption makes data unreadable
without a key.

Misuse of Information
1. Hacking
 Unauthorised access to systems, often for
sabotage or "fun".
2. Piracy
 Illegal copying/distribution of software or
music.
 Breaks copyright law; companies lose income.

Data Protection & Prevention


1. Countermeasures
 Actions to reduce/eliminate threats (firewalls,
access control, encryption).
2. Virus Protection
 Viruses: Malicious programs that spread via
files.
 Worms: Self-replicate, don’t need a host file.
 Macro Viruses: Embedded in documents.
 Prevention:
o Use antivirus software (e.g., AVG, Avast,
McAfee).
o Avoid suspicious emails or downloads.
o Enable macro protection in software.

3. Backups & Archives


 Store copies of important files in safe
locations.
 Regular backups = essential.
 Archives store old, rarely used data.
4. Encryption
 Converts data into unreadable format unless
decrypted.
 Used for safe transmission over networks.

Monitoring & Surveillance


1. Software Monitoring
 Packet sniffers track data in/out of networks.
2. Hardware Monitoring
 Devices like keyloggers record every
keystroke.
 Legal issues if used without consent.
3. Physical Security
 Locks, alarms, access cards, biometrics, CCTV
to protect hardware.

Environmental & Natural Threats


1. Natural Disasters
 Use fireproof safes, surge protectors, and UPS
systems to protect data.
2. Theft
 Lock devices, restrict access, track usage.

Copyright & Legal Implications


Copyright Laws
 Software/music creators own rights to their
work.
 Illegal to copy, distribute, or use beyond the
license.
Illegal Acts
 Hacking, virus spreading, identity theft,
unauthorised work = criminal offences.
Impact of IT in the Workplace
1. Social Impact
 Less face-to-face interaction.
 Easier digital communication (emails, social
media).
 Privacy issues.

2. Work Patterns
 Remote work (telecommuting) more common.
 Pros: Flexibility, no commute.
 Cons: Isolation, distractions.
3. Employment
 Some jobs lost, others created (IT support,
programming).
 Need for retraining.
4. Health & Safety
 Risks: Eye strain, posture issues, RSI.
 Prevention: ergonomic equipment, regular
breaks.

Telecommuting & Society


 Reduces office costs and pollution from
commuting.
 Increases utility costs for employees.
 Can be isolating.

Legal, Ethical & Moral Issues


 Data Protection Acts: regulate how personal
info is stored/used.
 Ethical questions:
o How much access should governments
have to private info?
o Should surveillance be allowed
everywhere?
o What about people without access to tech?

Quick Revision Summary: Must-Know Terms


Term Definition
Fake emails/websites to steal personal
Phishing
info
DoS Attack Floods a system to make it unusable
Scrambles data so only authorized
Encryption
users can read it
Virus Malware that spreads through files
Worm Malware that spreads without a file
Term Definition

Backup Copy of data stored safely


Hacking Unauthorized access to systems
Illegal copying/distribution of
Piracy
software/music
Telecommuti
Working from home using tech
ng

You might also like