ways in which information can be misused misuses of information the misuse of information by:...

16
Ways in which Information can be Misused

Upload: diane-parsons

Post on 02-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Ways in which Information can be Misused

Page 2: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

THE Misuse of information

By: Antoinette Harris, Nickietha Phinn, Ashley

Williams and Racquel Murray

Page 3: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

SUB-TOPICSWays in which information can be

misused and computer crimes

Software piracy

Industrial Espionage

Computer Fraud

Electronic Eavesdropping

Surveillance

Page 4: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

1. Software piracySoftware Piracy is

the unauthorised use, lending, copying, downloading, selling or otherwise distribution of computer programs without the permission of the software licence owner

Page 5: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

When we ‘buy’ software all we are really buying is permission to use it, usually on one computer. We do not actually own the software, it remains the property of the programmer or company that created it. We get a licence to use it.

To share it or sell it to anyone else is a violation of the copyright law and is called software piracy.

Misuses Of Information

Page 6: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

Copyright infringement of this kind is extremely common.

Most countries have copyright laws which apply to software, but they are better enforced in some countries than others.

Page 7: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

2. Industrial Espionage

This is an attempt to access information about a company’s plans, product, clients or trade secrets.

While this may have nothing to do with technology, the use of the computer makes industrial espionage easier.

Competitors can hack into the computer network of another organisation and illegally access their information.

Page 8: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Industrial Espionage

Trade Secrets

Bribery

Blackmail

Technological Surveillance

Industrial espionage can involve :

Page 9: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

3. Computer Fraud

Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful gain.).

Computer fraud is a type of computer crime. A computer crime is using the computer to perform an illegal act or using the computer illegally.

Page 10: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

4. Electronic eavesdropping

Electronic eavesdropping is the term applied to monitoring electronic radiation from computer equipment and reconstituting it into discernible information

i.e. using electronic means to monitor communication between parties without their permission.

Page 11: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Electronic eavesdropping

Most common type is wiretapping.Wiretapping monitors telephonic and

telegraphic communication.It was forbidden in the US as early as

1862.In England permission to wiretap is only

given in cases of serious offense.Intercepting and spying on emails is also

electronic eavesdropping

Page 12: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

Surveillance is the observation of people and their activities from a distance by means of electronic equipment or interception of electronically transmitted information

Misuses Of Information

5. Surveillance

Page 13: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

Surveillance can be done using hardware or software

These methods secretly monitors user’s action without their knowledge .

They acquire private information about an person or organization .

Misuses Of Information

5. Surveillance

Page 14: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

Surveillance

The hardware methodkey logging

The software methodSpyware

Page 15: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

Fun trivia

W hat is Industrial Piracy?What is Industrial Espionage?What are the two(2) types of

surveillance?

Page 16: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and

Misuses Of Information

Please do

Be careful what you do on your computer.

Do not ever misuse information.Report fraud and theft.Wiretapping is illegal.