Page 251 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 251

Exposure to Computer Disciplines



                   Notes         13.4.2 Data Protection
                                 Data protection means making sure that private data belonging to a person or organization is
                                 kept hidden from those who are not authorized to use it.

                                 Many organization collect data of their customers. Some of this data is needed for efficient
                                 processing the business transactions but much of this data is personal information of the customer.
                                 For example, a hospital collects data about the disease history of patients. All the personal data
                                 kept by different organizations may be disclosed for some legal purpose.  The data protection
                                 rules do not allow anyone to disclose personal data of any person. It means that any personal data
                                 kept by some organization should never be disclosed to unauthorized persons or organizations
                                 under any circumstances.
                                 Caution: Data protection and Threat to data.

                                 13.5  Cyber Terrorism


                                 Cyber terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities,
                                 including acts of deliberate, large-scale disruption of computer networks, especially of personal
                                 computers attached to the Internet, by the means of tools such as computer viruses.
                                 Cyber terrorism is a controversial term. Some authors choose a very narrow definition, relating to
                                 deployments, by known terrorist organizations, of disruption attacks against information systems
                                 for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to
                                 identify any instances of cyber terrorism.

                                 Cyber terrorism can also be defined much more generally as any computer crime targeting
                                 computer networks without necessarily affecting real world infrastructure, property, or lives.
                                 There is much concern from government and media sources about potential damages that could
                                 be caused by cyber terrorism, and this has prompted official responses from government agencies.
                                 Cyber terrorism is defined by the Technolytics Institute as “The premeditated use of disruptive
                                 activities, or the threat thereof, against computers and/or networks, with the intention to cause
                                 harm or further social, ideological, religious, political or similar objectives. Or to intimidate any
                                 person in furtherance of such objectives.” The term was coined by Barry C. Collin.

                                 The National Conference of State Legislatures, an organization of legislators created to help
                                 policymakers issues such as economy and homeland security defines cyber terrorism as:

                                 “The use of information technology by terrorist groups and individuals to further their agenda.
                                 This can include use of information technology to organize and execute attacks against networks,
                                 computer systems and telecommunications infrastructures, or for exchanging information or
                                 making threats electronically. Examples are hacking into computer systems, introducing viruses
                                 to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made
                                 via electronic communication.

                                 Cyber terrorism can also include attacks on Internet business, but when this is done for economic
                                 motivations rather than ideological, it is typically regarded as cybercrime.

                                 As shown above, there are multiple definitions of cyber terrorism and most are overly broad.
                                 There is controversy concerning overuse of the term and hyperbole in the media and by security
                                 vendors trying to sell “solutions”.





        244                               LOVELY PROFESSIONAL UNIVERSITY
   246   247   248   249   250   251   252   253   254   255   256