Concepts related to identifying, assessing and managing attacks on a computer system
Cybersecurity
Concepts related to identifying, assessing and managing attacks on a computer system
Computer abuse is any activity during which a computer system or its data is accessed, modified or denied without proper authorization
Cyberspace
Any data or resource that can be accessed via a computer or the internet
Cyberspace
Youtube
Tik Tok App
Phone App
Cybercrime is any crime perpetrated using computers and computer systems, e.g. piracy, ransomware
Cybersecurity involves identifying, assessing and managing attacks on computer systems
Chapter 4: Social and Economic impact of information and communication technology
12-04-84
Computer security
All the activities related to identifying, assessing and managing threats to a computer system
Computer misuse
Any activity during which a computer system or computer data is accessed or its data is accessed, modified or deleted without proper authorization
Cyberspace
Any data or resource that can be accessed via a computer network
Examples of cyberspace
Youtube
Tik Tok App
Phone App
Cybercrime
Any crime perpetrated using computers and networks
Examples of cybercrime
Economic espionage
Ransomware
Cybersecurity
All activities related to identifying, assessing and managing the vulnerabilities, threats and attacks from cyberspace
Firewall
Monitors a network, blocking dangerous content
Firewall
Can be a physical device attached to a network or software running on a connected computer
Vulnerability
Exposure to the possibility of being attacked
Threat
A statement of an intention to inflict harm or damage
Countermeasure
An action taken to counteract a threat
Examples of computer misuse by individuals
Using work computers for personal browsing during work hours
Examples of computer misuse by organizations
Industrial espionage
Unauthorized accessing of a competitor's computer systems to obtain confidential data
Examples of computer misuse by governments
Intercepting private emails
Cyberbullying
A form of bullying or harassment using computer-based communications to post, send or share negative, harmful, false or mean content about someone else, causing embarrassment or humiliation
Identity theft
The deliberate use of someone else's personal information, usually to gain a financial advantage
Examples of identity theft
Obtaining loans and credit cards
Fraudulent withdrawals from bank accounts
Fraudulent use of identity documents
Indecent material
Material of a sexual nature or that offends against society's morality, which can lead to emotional distress of the victim and the perpetrator may lose their job and be subject to prosecution
Phishing
The attempt to obtain sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
Privacy
The right of an individual to choose freely under what circumstances and to what extent they will reveal information about themselves
Personal data
Information such as name, address, date of birth
Privacy violation
The act of sharing any of the above personal data without the individual's consent
Cookie
A piece of data set from a website and stored on the user's computer by the user's web browser while the user is browsing
Copyright
A legal right that gives the creator of an original work exclusive rights over its use and distribution
Copyright infringement
Reproducing, creating a derivative work, distributing, performing or otherwise benefiting from the copyright without obtaining the requisite permissions
One effect of copyright infringement is the loss of revenue for the rights holder
Software piracy
The unauthorized reproduction, distribution or use of software products
Data theft
The unauthorized access and theft of data
Denial-of-service (DOS) attack
A cyber-attack where the intent is to prevent a Service being delivered by the target system
Distributed denial-of-service (DDOS) attack
A cyber-attack during which the target system is flooded with requests that overload the target system
DDOS attack
Can cause businesses to lose revenue and customers may decide to switch to a more reliable alternative