IT Notes
1. Computer Vulnerability
A vulnerability is a weakness in a computer
system (hardware, software, data, or users)
that can be exploited.
Makes systems susceptible to damage, data
theft, or unauthorised access.
Vulnerabilities can be external or internal.
External Vulnerabilities:
No protection from natural disasters (floods,
hurricanes, earthquakes).
Lack of safeguards against power
surges/spikes.
Terrorist attacks targeting infrastructure.
Internal Vulnerabilities:
Human error (accidental deletion or
overwriting).
No backup systems in place.
Absence of anti-virus protection.
Former employees still having access.
2. Threats and Security
A threat is any action that takes advantage of
a vulnerability.
Computer security protects hardware/software
from damage, theft, and corruption.
3. Types of Damage
Deliberate Damage:
Hacking – breaking into a computer without
permission.
Changing data- Editing files to create false
information.
Accidental Damage:
Mistakes like wrong commands.
Human error.
4. Data Communications
Data shared via electronic methods can be
intercepted.
Sensitive information can be accessed by third
parties.
Security involves encryption, secure channels,
and access controls.
5. Cyber Threats & Cyber Security
A cyber threat is an unauthorised attempt to
access systems/networks via the Internet.
Cyber security defends systems by:
o Monitoring attacks
o Preventing future attacks
6. Misuse of Information
Organisations collect data from users (e.g.
hospitals, banks).
Misuse includes selling info (e.g. for
advertising) without consent.
Individuals should have a choice regarding use
of their data.
7. Proprietary Data and Software
Proprietary software/data: Created and used
exclusively by an organisation.
Must be protected to maintain business
operations and data integrity.
8. Computer Fraud
Fraud increases with electronic transactions.
Examples:
o Fake websites to steal payments
o Changing financial account details for
personal gain
9. Propaganda
Computers and the internet can spread both
positive and harmful messages.
Can be used to sway public opinion or discredit
opponents.
10. Identity Theft
Stealing personal info (e.g. credit card
numbers, DOB).
Used to make purchases or cash transfers
fraudulently.
Preventing Identity Theft:
Check bank/credit card statements.
Use secure websites for purchases.
Don’t input personal info on public computers.
Cybersecurity Threats
1. Phishing
Fake websites/emails mimic trusted sources
(banks, schools) to steal info.
Common tactics: forms requesting personal
info, attachments with malware, fake requests
for money.
2. Denial-of-Service (DoS)
Floods a system/network with traffic until it
crashes.
Symptoms: Slow network, can't access sites,
junk email overload.
3. Industrial Espionage
Gaining competitive info through hacking.
Stealing data like marketing plans, R&D,
business strategies.
4. Electronic Eavesdropping
Monitoring digital communications without
permission.
Uses: capturing data via radio waves,
keyloggers, intercepted emails.
Protection: Encryption makes data unreadable
without a key.
Misuse of Information
1. Hacking
Unauthorised access to systems, often for
sabotage or "fun".
2. Piracy
Illegal copying/distribution of software or
music.
Breaks copyright law; companies lose income.
Data Protection & Prevention
1. Countermeasures
Actions to reduce/eliminate threats (firewalls,
access control, encryption).
2. Virus Protection
Viruses: Malicious programs that spread via
files.
Worms: Self-replicate, don’t need a host file.
Macro Viruses: Embedded in documents.
Prevention:
o Use antivirus software (e.g., AVG, Avast,
McAfee).
o Avoid suspicious emails or downloads.
o Enable macro protection in software.
3. Backups & Archives
Store copies of important files in safe
locations.
Regular backups = essential.
Archives store old, rarely used data.
4. Encryption
Converts data into unreadable format unless
decrypted.
Used for safe transmission over networks.
Monitoring & Surveillance
1. Software Monitoring
Packet sniffers track data in/out of networks.
2. Hardware Monitoring
Devices like keyloggers record every
keystroke.
Legal issues if used without consent.
3. Physical Security
Locks, alarms, access cards, biometrics, CCTV
to protect hardware.
Environmental & Natural Threats
1. Natural Disasters
Use fireproof safes, surge protectors, and UPS
systems to protect data.
2. Theft
Lock devices, restrict access, track usage.
Copyright & Legal Implications
Copyright Laws
Software/music creators own rights to their
work.
Illegal to copy, distribute, or use beyond the
license.
Illegal Acts
Hacking, virus spreading, identity theft,
unauthorised work = criminal offences.
Impact of IT in the Workplace
1. Social Impact
Less face-to-face interaction.
Easier digital communication (emails, social
media).
Privacy issues.
2. Work Patterns
Remote work (telecommuting) more common.
Pros: Flexibility, no commute.
Cons: Isolation, distractions.
3. Employment
Some jobs lost, others created (IT support,
programming).
Need for retraining.
4. Health & Safety
Risks: Eye strain, posture issues, RSI.
Prevention: ergonomic equipment, regular
breaks.
Telecommuting & Society
Reduces office costs and pollution from
commuting.
Increases utility costs for employees.
Can be isolating.
Legal, Ethical & Moral Issues
Data Protection Acts: regulate how personal
info is stored/used.
Ethical questions:
o How much access should governments
have to private info?
o Should surveillance be allowed
everywhere?
o What about people without access to tech?
Quick Revision Summary: Must-Know Terms
Term Definition
Fake emails/websites to steal personal
Phishing
info
DoS Attack Floods a system to make it unusable
Scrambles data so only authorized
Encryption
users can read it
Virus Malware that spreads through files
Worm Malware that spreads without a file
Term Definition
Backup Copy of data stored safely
Hacking Unauthorized access to systems
Illegal copying/distribution of
Piracy
software/music
Telecommuti
Working from home using tech
ng