The document outlines various forms of computer misuse, including cyberbullying, copyright infringement, and phishing attacks, while also discussing the importance of safeguarding against cyber threats. It details measures for computer and cyber security, such as using firewalls, encryption, and antivirus software, as well as personal security practices to protect oneself online. By the end of the lesson, students should be able to explain these concepts and identify steps to enhance their virtual safety.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
0 views
Computer Misuse
The document outlines various forms of computer misuse, including cyberbullying, copyright infringement, and phishing attacks, while also discussing the importance of safeguarding against cyber threats. It details measures for computer and cyber security, such as using firewalls, encryption, and antivirus software, as well as personal security practices to protect oneself online. By the end of the lesson, students should be able to explain these concepts and identify steps to enhance their virtual safety.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36
COMPUTER MISUSE, B.B.
Coke High COMPUTER SECURITY School: Miss Sanjay Foster AND CYBER SECURITY OBJECTIVES
By the end of the lesson students should be able to:
✔ Explain the many ways in which computers are misused ✔ Describe measures used to safeguard against Cyber attacks ✔ State some steps that can be taken to safeguard oneself in a virtual environment. COMPUTER MISUSE
Computers may be ◼Identity theft
misused in the ◼Online publication of following ways: obscene materials ◼Cyberbullying ◼Copyright infringement ◼Phishing attacks ◼Piracy (Software & ◼financial abuses Music) ◼Violation of privacy, ◼Data theft, ◼Propaganda ◼Denial of service ◼ Industrial espionage attacks, ◼Electronic ◼Transmission of viruses and malware, eavesdropping CYBERBULLYING
Cyberbullying is the use of technology to harass, threaten,
embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else. COPYRIGHT INFRINGEMENT
Copyright infringement occurs when a copyrighted work is
reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner. Piracy is a form of Copyright Infringement. PIRACY
Piracy is the illegal copying/downloading of copyrighted
software and media files. It (Software Piracy) has become a huge problem for software manufacturers because it causes loss of revenue and jobs. Downloading a copyrighted song off the Internet is also an example of piracy (Music Piracy).
Some measures to reduce software piracy are:
◼ Use of registration keys that are only available with purchase of the software ◼ Severe penalties such as heavy fines and/or imprisonment for anyone found selling or knowingly using pirated software. PROPAGANDA
Propaganda is information that is used primarily to influence an
audience and further an agenda, which may not be objective and may be presenting facts selectively to encourage a particular synthesis or perception.
or using loaded language to produce an emotional rather than
a rational response to the information that is presented. Propaganda is often associated with material prepared by governments, but activist groups, companies, religious organizations, the media, and individuals can also produce propaganda. EXAMPLE OF PROPAGANDA UNAUTHORIZED COLLECTION OF INFORMATION A lot of information that is collected is done without the permission of the people involved.
Some organizations take on this practice to ascertain pertinent
information about their competitors such as their marketing strategies, research and future plans to gain a profit or marketing edge. Industrial Espionage is when secret information is obtained by spying on competitors or opponents. ELECTRONIC EAVESDROPPING
Electronic eavesdropping is the tapping into a communication
channel to retrieve information. Data may be encrypted before it is transmitted to prevent eavesdropping on that data. Hackers commonly use electronic eavesdropping. For example, good hackers can collect information that you type at websites, such as your credit card number, password or personal data. ELECTRONIC SURVEILLANCE
The computer – related activities of many people are often kept
under surveillance. The information gathered through this surveillance may be used to develop profiles of several people. Surveillance is not only done by law enforcement personnel. Many websites keep you under surveillance. Computer surveillance thus involves the use of technology to ascertain information from the user and from the computer, often without the user’s knowledge. PHISHING ATTACKS
Phishing is the fraudulent attempt to obtain sensitive
information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. DENIAL OF SERVICE ATTACK
In computing, a denial-of-service attack (DoS attack) is a cyber-
attack in which the perpetrator seeks to make a machine or network resource unavailable to its users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with excessive requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. VIRUSES & MALWARE
Malware is an umbrella term for any malicious software written
specifically to infect and harm the host system or its user. A computer virus is just one type of malware. Malware includes viruses, spyware, adware, ransomware, and other types of harmful software. VIRUS
A Virus is designed to copy itself and spread to other devices
as widely as possible. Computer viruses proliferate by infecting applications, email, removable storage and websites, email attachments etc. Simple malicious code damages your hard disk or deletes files. A more complex virus might hide on your computer and engage in unwanted activity such as spewing out spam. YOUR RESEARCH
The following are other ways that computers are
misused: ◼ Identity Theft ◼ Data Theft ◼ Violation of Privacy ◼ Financial Abuse ◼ Online Publication of obscene material MEASURES TO REDUCE COMPUTER MISUSE There are several ways to reduce the misuse of Computers. Some of these are: ◼ Enforcing data protection laws ◼ Utilizing security systems ◼ Having severe penalties for when employees and employers divulge private information Physical COMPUTER & CYBER Measures and SECURITY Software Measures COMPUTER SECURITY VS. CYBER SECURITY Computer security means dealing with the security of a standalone computer’s software and hardware.
Cyber security, on the other hand, involves the security of
individual computers plus the network they belong to and the intercommunication between all the computers in your organization, mobile devices, printers and more. CYBER SECURITY MEASURES
There are many options to choose from in mitigating Cyber
threats; these measures can be physical (hardware) or software based.
◼ Hardware: backup and recovery procedures, hardware
firewall, intrusion detection systems and biometrics.
◼ Software: effective passwords and authentication systems,
encryption of data, firewall, biometrics, antivirus and malware detection. BACKUP AND RECOVERY
Backup and recovery refers to the process of backing up data in
case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data, so that it is accessible in case of data deletion or corruption. Data from an earlier time may only be recovered if it has been backed up. FIREWALL
A firewall is a network security system that monitors and
controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Hardware firewalls are systems that are independent of the computers they protect that filter the Internet as information passes into a computer. Most broadband Internet routers have their own firewall built in. INTRUSION DETECTION SYSTEM (IDS) An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or host (HIDS) to detect and report intrusion attempts to the network. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. We can think of a firewall as security personnel at the gate and an IDS device as a security camera after the gate. While an Intrusion Detection System (IDS) cannot block connections. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator. However an Intrusion Detection and Prevention System (IDPS) can block connections if it finds the connections is an intrusion attempt. BIOMETRICS
Biometrics are a way to measure a person’s physical
characteristics to verify their identity. These can include physiological traits, such as Fingerprints, Iris, voice, face, hand etc.
Biometric devices can be used to restrict physical access to
rooms or buildings as well as it can be used to restrict virtual access to files, folders devices etc. PASSWORDS
A password, sometimes called a passcode, is a memorized
secret, typically a string of characters, used to confirm the identity of a user. DATA ENCRYPTION
Data encryption translates data into another form, or code, so
that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as cipher text, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. ANTI-VIRUS AND MALWARE DETECTION Antimalware is a type of software program designed to prevent, detect and remove malicious software ( viruses, rootkits, ransomware and spyware etc) on IT systems, as well as individual computing devices. Antivirus typically dealt with older, more well-known threats, such as Trojan horses, viruses, key loggers and worms. Today, however, antivirus and antimalware products are generally the same. Some security vendors still brand their products as antivirus software even though it is more similar to antimalware. PERSONAL SECURITY MEASURES
These are some measures that can be taken on a
personal level to safeguard against Computer Misuse: ◼ Verifying authenticity of email from companies or individuals ◼ Assessing website URLs for authenticity ◼ Limiting access to open Wi-Fi networks ◼ Securing mobile devices (Strong Passwords, biometircs, Antivirus, Update OS etc.) ◼ Protection in an online environment SOME STEPS TO SECURING YOUR ONLINE ENVIRONMENT ◼ Always change your default passwords, create strong, unique passwords; ◼ Use a firewall to block unauthorized access to computers and devices; ◼ update your operating system, browser, and other software with security patches to minimize threats from viruses and malware; ◼ Practice safe surfing and shopping, checking that the site’s address starts with “https”, instead of just “http”; ◼ Be selective when sharing personal information as this could be used by hackers to guess passwords and logins. ◼ Do not download pirated software as it is not only illegal, but it often includes some type of malware.