Download presentation
Presentation is loading. Please wait.
Published byValentine Holmes Modified over 9 years ago
1
Ways in Which Information Can Be Misused
2
In this information age in which we live information is a precious and powerful commodity Unfortunately it can be used for good as well as for bad.
3
This presentation will be about: ╚ Software piracy ╚ Industrial espionage ╚ Computer fraud ╚ Electronic eavesdropping and ╚ Surveillance
4
What is SOFTWARE PIRACY? This is the unauthorized use, copying or distribution of computer software
5
Software Piracy cont’d When we ‘buy’ software what we are really buying is the licence to use it on (usually) one computer. It is illegal to install it on other computers or to copy it and give / sell it your friends.
6
The rate of infringement of copyrighted software in the Asia- Pacific Region has been estimated as Year 2004 2006 Percentage 53% 82% Imagine it how much it has grown since then!
7
Software does not actually belong to us, it belongs to the programmer. We only have a licence to use it. When we violate the terms of that licence, we are involved in software piracy.
8
SURVEILLANCE This is the monitoring of the behavior of a person or a group of people, often in surreptitious manner
9
Ways and Items used in Surveillance CCTV camera (close circuit television ) Internet traffic Phone calls Computer usage The computer now plays a large part in most surveillance systems
10
Surveillance Many organisations or government bodies carry out surveillance on people The knowledge gained about you when you are under surveillance can be misused to your detriment. Do you feel comfortable with the thought of being under surveillance?
11
Industrial Espionage
12
Industrial espionage is the act of obtaining an organisation’s information without the permission of the company for commercial purposes
13
Industrial Espionage involves Activities such as … ╘ Theft of trade secrets ╘ Bribery lackmail ╘ Technology surveillance
14
The purpose of espionage is to gather knowledge about a competitor's operations, plans and strategies. This may be done by a spy or someone in the company maybe bribed to do it. An organisation may also attempt to hack into another organisation’s computer system to get at their data.
15
Electronic Eavesdropping Electronic eavesdropping is intercepting electronic communication (such as emails) without the authority of the communicating parties.
16
Electronic eavesdropping usually involves monitoring electronic radiation from computing equipment and reconstituting it into desirable information
17
What is Computer Fraud? Computer fraud is any dishonest deed in which the use of the computer plays a significant part
18
The term ‘computer fraud’ therefore covers a wide range of illegal activities from hacking to computer theft.
19
THE END!!
20
Courtesy of Team 3.2
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.