100% found this document useful (1 vote)
182 views23 pages

Social and Economic Impact of ICT

Uploaded by

nisean19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
182 views23 pages

Social and Economic Impact of ICT

Uploaded by

nisean19
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

SOCIAL AND ECONOMIC IMPACT

OF INFORMATION AND
COMMUNICATIONS TECHNOLOGY
(ICT)
OBJECTIVE 1: Students should be able to develop an understanding of the
various elements of computer security, and data misuse and the impact on
individuals and organisations;
COMPUTER SECURITY vs CYBERSECURITY

This is the protection of computer systems from


theft or damage to their hardware, software or
electronic data, as well as from disruption or
misdirection of the services they provide.
• Asset: A useful or valuable thing. May include hardware,
software, documentation, data, communications, environment
and people.
• Risk: Is a potential problem that a system or its user may
experience. An asset is usually at risk when a threat exploits its
vulnerabilities.
• Threat: A set of circumstances that could cause harm. May
include users, terrorist, hackers, criminals, motivated groups,
acts of God
• Vulnerability: Is a weakness that might be exploited to cause
loss or harm. May include the ability to be exposed, stolen, lost,
deleted, contain software bugs
• Attack (or exploit) – An action taken that uses one or more
vulnerabilities to realize a threat. This could be someone
following through on a threat or exploiting a vulnerability.

• Countermeasure: Procedures / Processes put in place to reduce


or mitigate or control a risk. Countermeasures seek to do the
following:
• Reduce the threat
• Reduce the vulnerability
• Reduce the impact
• Detect a hostile event
• Recover from an event
COMPUTER MISUSE
• Computer systems are vulnerable to individuals from inside
an organization using a system without permission.

• Their motivation may range from being inquisitive about


the software and data that is being used through to
attempting to steal data or damage the system.

• When a computer system is connected to the Internet, there


is an additional risk that someone from outside an
organization may attempt to gain access to the computer.
Computers may be misused by:
• Collecting information about people without their
permission.
• Vengeful employees or employers who want to spread
propaganda on unsuspecting persons
• (Willfully or unwittingly) storing incorrect information on
an innocent person that may be available to the public.
• Unauthorized persons being able to view and/or change
information.
• Using information for purposes other than those for
which it was intended
CYBERBULLYING

This is the use of electronic


communication (cell phones,
instant messaging, email,
chat rooms, or social
networking sites such as
Facebook and Twitter) to
harass, threaten or
intimidate someone by
sending messages.
COPYRIGHT INFRINGEMENT

This is the use of work


protected by copyright law
without permission infringing
certain exclusive rights
granted to the copyright holder
such as the right to reproduce,
distribute, display or perform
the protected work or to make
derivative works.
DATA THEFT

The act of stealing computer-


based information (information
stored on computers, servers or
other devices) from an unknowing
victim with the intent of
compromising privacy or
obtaining confidential
information.
DENIAL OF SERVICE ATTACKS

This is a security event that


occurs when an attacker prevents
legitimate users (interrupts) from
accessing specific computer
systems, devices, network or other
IT resource, usually with
malicious intent.
TRANSMISSION OF VIRUSES AND MALWARE
• Malware is any software intentionally
designed to cause damage to a computer,
server or computer network. Malware
includes computer viruses, worms, Trojan
horses and spyware.

• A computer virus is a malicious program


that self-replicates by copying itself to
another program.
IDENTITY THEFT

The fraudulent
practice of using
another person’s name
and personal
information in order
to obtain credit, loans,
etc
ONLINE PUBLICATION OF OBSCENE MATERIALS

This is the selling,


distributing, and
publishing of material
which is of a nature
destructive to society
online.
PHISHING ATTACKS

This is the fraudulent attempt to obtain


sensitive information such as usernames,
passwords and credit card details, often for
malicious reasons, by disguising as a
trustworthy entity in an electronic
communication.
SOFTWARE AND MUSIC PIRACY

The illegal copying, distributing or use of


software and music where the rights owner
(composer, recording artist or copyright
holder) did not give consent
FINANCIAL ABUSES

This is the illegal or


unauthorized use of
computers to gain a
financial advantage.
VIOLATION OF PRIVACY

Privacy refers to the right of


the individual to determine
what information is stored
about them and how the
information will be used.
Violation of privacy is the
intrusion into an individual’s
rights.
PROPAGANDA

This is the spreading of information in


support of a cause. It is used to manipulate
or influence the opinion of individuals to
support a particular cause or belief. It is
often used in a negative sense.
ELECTRONIC EAVESDROPPING
This is the act of
electronically
intercepting
conversations (“listening
in”) without the
knowledge or consent of
at least one of the
participants.
INDUSTRIAL ESPIONAGE

This is the spying of


competitors on their
competition to obtain
secret information about
that company in an effort
to gain a business
advantage.
Misuse Entity impacted
Cyberbullying Individual
Copyright infringement Individual, organization
Data theft Individual, organization, government
Denial of service attack Individual, organization, government
Transmission of viruses and malware Individual, organization, government
Identity theft Individual, organization, government
Online publication of obscene materials Individual
Phishing attacks Individual, organization, government
Software and music piracy Individual, organization
Financial abuses Individual, organization, government
Violation of privacy Individual
Propaganda Individual, organization, government
Electronic eavesdropping Individual, organization, government
Industrial espionage Organization

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy