Saturday, 4 April 2015

Misuse of Data

There are many ways that data can be corrupted and they are often driven by malicious intentions.

i. Computer technology can be used to spread forms of propaganda.

ii. Piracy is the act of taking or using someone else’s work without their permission. Piracy is illegal.
Examples of piracy:
Transferring of songs and movies from a friends computers
Burning copies of to CD and movies to to DVDS and selling to some one else
Coping and downloading photos of the internet without the photographer’s permission and using them for your own personal gain.
Recording a movie or television program then distributing it over the Internet for free or for money.

iii. Industrial espionage-  Espionage is Spying to gain information that can be used to further a purpose or that can be used against the party being spied on. Industrial espionage is when businesses spy on competitors to learn business secrets, one way is to infiltrate a computer network to view confidential information.

iv. Storing inaccurate information- one must ensure and check that data is up to date when it is stored. Inaccurate data can have damaging consequences. This can occur when data is accidentally changed or modified or when incorrect data is entered into a system.


v. Fraud and identify theft-  
Computer fraud means using computer system to carry out fraudulent activities like stealing personal data to do fraudulent transactions or creating fake websites and sending emails that require users to enter their personal details.
Identity theft is where someone uses another person’s personal details to cry out transactions and other activities in that persons name . For things over the Internet.
  

1 comment: