Page 251 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 251
Exposure to Computer Disciplines
Notes 13.4.2 Data Protection
Data protection means making sure that private data belonging to a person or organization is
kept hidden from those who are not authorized to use it.
Many organization collect data of their customers. Some of this data is needed for efficient
processing the business transactions but much of this data is personal information of the customer.
For example, a hospital collects data about the disease history of patients. All the personal data
kept by different organizations may be disclosed for some legal purpose. The data protection
rules do not allow anyone to disclose personal data of any person. It means that any personal data
kept by some organization should never be disclosed to unauthorized persons or organizations
under any circumstances.
Caution: Data protection and Threat to data.
13.5 Cyber Terrorism
Cyber terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities,
including acts of deliberate, large-scale disruption of computer networks, especially of personal
computers attached to the Internet, by the means of tools such as computer viruses.
Cyber terrorism is a controversial term. Some authors choose a very narrow definition, relating to
deployments, by known terrorist organizations, of disruption attacks against information systems
for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to
identify any instances of cyber terrorism.
Cyber terrorism can also be defined much more generally as any computer crime targeting
computer networks without necessarily affecting real world infrastructure, property, or lives.
There is much concern from government and media sources about potential damages that could
be caused by cyber terrorism, and this has prompted official responses from government agencies.
Cyber terrorism is defined by the Technolytics Institute as “The premeditated use of disruptive
activities, or the threat thereof, against computers and/or networks, with the intention to cause
harm or further social, ideological, religious, political or similar objectives. Or to intimidate any
person in furtherance of such objectives.” The term was coined by Barry C. Collin.
The National Conference of State Legislatures, an organization of legislators created to help
policymakers issues such as economy and homeland security defines cyber terrorism as:
“The use of information technology by terrorist groups and individuals to further their agenda.
This can include use of information technology to organize and execute attacks against networks,
computer systems and telecommunications infrastructures, or for exchanging information or
making threats electronically. Examples are hacking into computer systems, introducing viruses
to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made
via electronic communication.
Cyber terrorism can also include attacks on Internet business, but when this is done for economic
motivations rather than ideological, it is typically regarded as cybercrime.
As shown above, there are multiple definitions of cyber terrorism and most are overly broad.
There is controversy concerning overuse of the term and hyperbole in the media and by security
vendors trying to sell “solutions”.
244 LOVELY PROFESSIONAL UNIVERSITY