The Dark Side of Computing PDF
Document Details
Tags
Summary
This document is an overview of the different threats and challenges involved in computer use, focusing on social engineering, privacy, malware, and misuse. It also outlines the consequences of these issues. This is part of a module on the dark side of computing.
Full Transcript
THE DARK SIDE OF “Guns don’t kill COMPUTING MODULE 1.6 people, people kill people” HUMAN AND SOCIAL ASPECTS – THE TECHNICAL ASPECTS OF PROTECTING OURSELVES FROM HUMAN ERRORS IN COMPUTING PEER DISCUSSION 1. What...
THE DARK SIDE OF “Guns don’t kill COMPUTING MODULE 1.6 people, people kill people” HUMAN AND SOCIAL ASPECTS – THE TECHNICAL ASPECTS OF PROTECTING OURSELVES FROM HUMAN ERRORS IN COMPUTING PEER DISCUSSION 1. What do you understand by the term "information accuracy"? Why is it important in computing? 2. Can you think of a situation where bad programming or poor system design caused problems? What were the consequences? 3. Have you ever encountered or heard of social engineering attacks (e.g., phishing emails or fraudulent calls)? How do they work? 4. What steps do you take to protect your personal data, both online and offline? INFORMATION ACCURACY Bad logic errors programmi missing data validation techniques ng Poor make mistakes training lose trust in system poor procedures for capturing data or Poor generating reports procedures poorly designed forms that people fill in poorly designed data flow INFORMATION ACCURACY Errors and failures lead to inaccurate information and have negative consequences: Breakdown in user trust Decreased product quality People make excuses not to use it Poor information accuracy They run manual backup systems Increased workload – less efficient leads to decreased product Incorrect or delayed decision- quality making People who use information People do not trust the information (= ourselves) must learn They delay making decisions / how to analyse / interpret / make wrong decision judge the quality of It can cost money or even lives information DATA PROTECTION It is important to protect data and information from corrupted or lost or even stolen. Human and social components of data protection entails: Control access to physical data Keep paper records and backup media securely stored Control access to computers Keep computers locked up Disable screen when not at computer Make sure computer requires a login Limit and control use of portable storage Control what portable storage people can use THE CRIMINAL SIDE OF THINGS SOCIAL ENGINEERING The use of deception to manipulate or ‘con’ someone into giving out confidential information or into giving access to their computer or premises This can be used to impersonate them, to install malware, or for other fraudulent purposes SOCIAL ENGINEERING Typical examples of social engineering are when you get emails... telling you that you have won the lottery offering you a job or a business opportunity telling you of an unexpected inheritance telling you there is a problem with your online banking details SOCIAL ENGINEERING Best protection against social engineering: Remember – ‘if it sounds too good to be true, then it probably is’ Know the people you work with and don’t trust strangers around data Be sceptical of offers that need something from you THINK before you act COMPUTER MISUSE Where computer resources are used without permission or for tasks not authorised by the owner of the computer Cuts productivity and ‘steals’ both computer time and work time INVASION OF PRIVACY Looking at your Consequences of boyfriend’s/girlfriend’s invasion of privacy: SMS messages on their Loss of productivity phone without their knowing Identity theft it invades their privacy Your online view of reality is ‘customised’ to match as much as any what companies think you company that tracks will like what you do on the internet MALWARE Malware is any software that is designed to damage or disrupt a user’s computer and takes many forms: Ransomware Malware that encrypts data until you pay the hacker a ransom fee Viruses Software that disrupts normal functioning of a computer Spyware Any technique or software that tries to monitor and track the way you use your computer Keyloggers Type of spyware that records your keystrokes as you type Trojans A destructive program disguised as a useful application MALWARE The social consequences of malware Financial cost Cost to prevent infection Ransomware – direct financial cost Lost productivity Time wasted on recovery Pay people to remove malware Costs passed on to consumer Personal implications Less trust in others Possibility of fraud Life more complicated – passwords for everything Time wasted – dealing with spam, etc.