CyberSecurity and Computer Misuse
CyberSecurity and Computer Misuse
The increasing use of technology along with the expansion of the internet,
and the many services, have resulted in many risks to users and computer
systems.
The software method of computer surveillance involved the use of spyware. This type
of software, which is usually secretly installed on a computer, covertly (secretly)
monitors the user’s actions without his or her knowledge. It can save its findings locally
or transmit them to someone else.
Spyware software can be categorized as surveillance spyware and advertising spyware.
Computer Surveillance
Surveillance spyware can be used by:
Law enforcement and intelligence agencies, to solve or prevent crimes
Corporations and companies, to monitor the use of their computer resources for
many different reasons, including to help fix problems.
Criminals, to acquire passwords and credit card numbers
Private investigators, hired to spy on individuals or organisations
Government agencies, to spy on citizens
Parents, to monitor their children’s use of the computer
Computer Surveillance
Advertising spyware, also known as adware, is used to gather personal information
about computer users or to show advertisements. Some advertising spyware records
information such as email addresses, web browsing history, online shopping habits,
passwords and other personal information.
The effect of cybercrime can be extremely upsetting for victims, and not just for
financial reasons. Victims may feel that their privacy has been violated, and that they
are powerless.
Cyberbullying
Cyberbullying or stalking occurs when someone engages in offensive, menacing or
harassing behavior using electronic means. Although it has become increasingly popular
among teenagers, it can happen to people of any age, at any time, and often
anonymously. Examples of some ways cyberbullying can occur:
Posting hurtful messages, images or videos online
Repeatedly sending unwanted messages online
Sending abusive texts and emails
Excluding or intimidating others online
Creating fake social networking profiles or websites that are hurtful
Nasty online gossip and chat
Prohibited, obscene, offensive and illegal content
Illegal and prohibited content can be found almost anywhere online: newsgroups,
forums, blogs, social media, peer-to-peer networks, live visual and audio. One of the
major risks of illegal and prohibited content is that it may reach children, for whom such
content can be especially damaging.
In order to keep the internet safe for all users, you should report prohibited online
content. The following types of content may be classified as prohibited, offensive and
illegal:
Child pornography
Content showing extreme sexual violence or overtly violent material
Content that provokes the viewer into committing crimes and terrorism.
Software, music and video piracy
Piracy is the unauthorized copying, usage or selling of software, music or films that are
copyrighted.
Licensed-user duplication for unlicensed users
Pre-installed software – software for 1 PC but installs it on many computers
Internet piracy – some websites allow users to download unauthorized copies of
software, music or films.
Counterfeiting – when individuals or companies make illegal copies of software, music
and films and package it to look like the original packaging from the manufacturer.
Software, music and video piracy
Piracy is an infringement of ownership rights. It is the theft of the work and effort of
another individual or company. Pirated material is theft, and using it is morally wrong.
Some of the reasons why pirated material should not be used are:
Pirated software may not contain all the elements and documentation of the program
Pirated software may not have the upgrade options often provided as an add-on in
legitimate software
Pirated software may have viruses
Pirated material is illegal
Income from pirated material is often used to support organized crime.
Phishing
Phishing refers to attempts by cybercriminals and hackers to trick you into giving away
personal information to gain access to account numbers or to infect your machine with
malware.
How to avoid phishing attempts? Phishing attempts can often get through spam filters
and security software that you may have on your computer.
Keep an eye out for poor spelling, unexpected urgency or a wrong salutation
Think twice about clicking a link or opening a document that looks suspicious.
Double-check that every URL or email address where you enter your password looks
real. If anything raises doubt, delete the communication.
Hacking
Hacking is the unauthorized accessing of a computer system; the individual who does
this is referred to as a hacker. Hacker may gain access to your computer or device
through security weaknesses, phishing or malware.
Once they have compromised your email, banking or social media accounts, they can
change passwords, preventing you from accessing your accounts.
Hackers are usually excellent computer programmer. Many hackers are young people
who hack into systems just for the challenge or as a prank. Hacking is illegal in many
countries.
Hacking
The more criminally-minded hackers access computer systems for one or more reasons:
To steal important and highly confidential information
To copy computer programs illegally
To alter data
To delete data or install a virus to destroy or corrupt it
To transfer money from one bank account to another using electronic funds transfer
(EFT)
Internet Fraud
Internet fraud refers generally to any type of fraud scheme that uses one or more
components of the internet – such as chatrooms, email, message boards or websites –
to present fraudulent transactions. Some major types of internet fraud are:
Online trading schemes – online businesses collects money and does not deliver or
delivers a substandard product.
Credit Card fraud – this fraud involves setting up temporary bogus businesses on the
internet to lure individuals into giving their credit card numbers.
Business opportunity / ‘work-at-home’ schemes online – there are many fraudulent
schemes that use the internet to advertise business opportunities. Individuals have to
pay for information and material to start a business or get a job but then don’t
receive any materials, information or job.
Other Online scams or fraud
There are dishonest schemes that take advantage of unsuspecting people to gain a benefit.
These are often contained in spam or phishing messages. Common online scams include:
Unexpected prize scams – these scams inform you that you have won a prize and to claim
it you are asked to send money.
Unexpected money scams – these scams ask you to send money upfront for a product or
reward (inheritance, etc.)
Threats and extortion scams – these involve scammers sending random death threats via
SMS or email from a supposed hitman, if monies are not paid.
Identity Theft
Identity theft is a widespread crime that is continually evolving with the constant evolution
of technology and trends. Cybercriminals have a variety of schemes to get hold of your
personal information and use it to steal your money, sell your identity, and commit fraud or
other crimes in your name. Criminals may steal your identity in the following ways:
Credit card theft – many people use credit cards everywhere, so many people may have
access to an individual’s credit card or the card number. To safeguard against this, e
person should never let their credit card out of their sight during transactions.
Unsecure websites – whenever you shop or make a transaction online, there is a chance
that an identity thief could intercept your personal information. Make sure the website is
secure; websites with URL beginning with ‘http’ are usually safe (‘s’ means it is secure)
Identity Theft
Shoulder surfing – thieves will stand over the shoulder of unsuspecting individuals while
they input their PIN and credit card numbers with the intent to steal the information.
When entering PINs, make sure there is no one looking over your shoulder and cover
your screen with your hand.
Skimming – this occurs when an identity thief installs an additional device onto an
existing ATM or credit card reader. This device can read your credit card information
including your PIN. If you notice the reader or ATM machine looking different, do not use
the machine.
Dumpster diving – thieves will go through your trach looking for bills, receipts, credit
card statements and other documents containing you personal information. Shred your
statements or make account numbers illegible when you throw them away.
Identity Theft
Mail theft – thieves sometimes steal bank statements or new credit cards directly from
the mailbox. If you notice someone has tampered with your mailbox, contact you local
post office and report the incident to the police.
Identity Theft
How to protect yourself from identity theft:
Shred – shred any document s containing personal information before you toss them in
the bin.
Use secure passwords – be sure to password protect all your devices, and use different
unique, and complicated passwords for each of your online accounts
Use secure connections – never log in to financial accounts or shop online while using
free public Wi-Fi, and make sure you encrypt and password protect your Wi-Fi at home.
Monitor – review your credit card reports and bank accounts periodically to look for
suspicious activity and errors that could mean identity theft.
Detect – use an identity theft detection product that includes identity theft restoration.
Industrial Espionage
Industrial espionage is when confidential information from within companies and other
commercial organizations is obtained by spying, in an effort to gain some advantage. Spying
is illegal in most countries. Such information may be the design of a new gadget, a list of
unpublished prices, secret recipes, etc.
The spies on the ground are usually employees or on-site contractors. Companies that are
victim of industrial espionage attacks may suffer financial losses as a result of the
usefulness of the information to those spying – for example, if a competitor adjusts their
prices in line with those of its victim, thereby gaining some of their customers.
Data Theft
Data theft is the unauthorized copying or removal of data from the legitimate owner’s
computer system.
The Dark Net is the term given to parts of the Internet that are kept hidden from the
general public and cannot be accessed by standard search engines such as Google and
Bing. Suspect activities such as computer hacking and fraud take place on Dark Net
websites.
Criminals target computers that store personal or commercial data because this data,
especially in large volumes, has significant economic value in the criminal underworld.
Denial-of-service Attack
A denial-of-service attack (DOS attack) is a cyber-attack where the intent is to prevent a
service being delivered by the target system.
The attack could be by an individual hacker exploiting a vulnerability in the target system to
gain unauthorized access and so crash the system from within. When the attack is directed
from the outside in, it may be a distributed denial-of-service attack.
A distributed denial-of-service attack (DDOS attack) is a cyber attack during which the
target system is flooded with requests that overload the targeted system. A DDOS attack is
often staged by activists and blackmailers.
Propaganda
Propaganda is communication of information that is of a biased or misleading nature and
that is aimed at influencing the recipient. Propaganda can be used by many different
organisations, including activist groups, companies, the media and government bodies, for
various purposes.
The content is usually repeated and dispersed over a wide variety of media. Online
platforms such as Facebook, Twitter and YouTube give individuals worldwide reach for their
opinions with very little regulation.
Personal Security Practices
Protect yourself against cybercrime:
• Beware of scams. If you receive an email or SMS that looks like a scam, delete it. Do not
respond, attempt to unsubscribe, or call any telephone number listed in the message.
Most importantly, do not send any money, credit card details or other personal details to
scammers.
• Use good, cryptic passwords that cannot be easily guessed, and keep your passwords
secret
• Minimise storage of sensitive information
• Do not send personal information such as bank account numbers and credit card
numbers over open Wi-Fi networks.
• Secure laptop computers and mobile devices; lock them up or carry them with you.
Personal Security Practices
Protect yourself against cybercrime:
Do not install or download unknown or unsolicited programs or apps.
Make sure anti-virus and anti-spyware software are up to date.
Shut down, lock, log off, or put your computer and other devices to sleep before leaving
them unattended, and make sure they require a secure password to start up or wake-up.
Make back-up copies of files or data you are not willing to use.