Learn It 17.4.1: Issues in Information Technology

  • Recognize security issues associated with information technology
  • Recognize privacy issues associated with information technology
  • Identify trends in information technology

Cybersecurity

Now that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take cybersecurity seriously.

Data Security Issues

Unauthorized access into a company’s computer systems can be expensive, and not just in monetary terms. It is estimated that global cybercrime will cost businesses around the world $10.5 trillion annually by 2025, compared to $3 trillion annually in 2015.[1] The most costly categories of threats include worms, viruses, and Trojan horses; computer theft; financial fraud; and unauthorized network access.[2]

Early cybercrooks were typically amateur hackers working alone, but many operating now are highly skilled and often work in gangs to commit large-scale internet crimes for large financial rewards. The internet, where criminals can hide behind anonymous screen names, has increased the stakes and expanded the realm of opportunities to commit identity theft and similar crimes. Catching such cybercriminals is difficult, and fewer than 5 percent are caught.[3]

Costly Computer Crimes and Problems

  • Unauthorized access and security breaches. Whether from internal or external sources, unauthorized access and security breaches are a top concern of IT managers. These can create havoc with a company’s systems and damage customer relationships. Unauthorized access also includes employees, who can copy confidential new-product information and provide it to competitors or use company systems for personal business that may interfere with systems operation. Another problem is a denial-of-service attack (DoS attack) where the perpetrator seeks to make a machine or network resource unavailable to its intended users by overwhelming it with excessive traffic.
  • Computer viruses, worms, and Trojan horses. Viruses can hide for weeks, months, or even years before starting to damage information. To protect data from virus damage, virus protection software automatically monitors computers to detect and remove viruses. Program developers make regular updates available to guard against newly created viruses. In addition, experts are becoming more proficient at tracking down virus authors, who are subject to criminal charges.
  • Deliberate damage to equipment or information. For example, an unhappy employee in the purchasing department could get into the company’s computer system and delete information on past orders and future inventory needs. The sabotage could severely disrupt production and the accounts payable system. Willful acts to destroy or change the data in computers are hard to prevent. To lessen the damage, companies should back up critical information.
  • Spam. Although you might think that spam, or unwanted email, is just a nuisance, it also poses a security threat to companies. Viruses spread through email attachments that can accompany spam emails. The purpose of some spam is phishing, an attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons like identity theft. Often the sender of the electronic communication also uses spoofing, a deliberate disguising of the sender’s identity that fools the recipient into thinking that the communication is from a trustworthy source. Spam presents other threats to a corporation: lost productivity and expenses from dealing with spam, such as opening the messages and searching for legitimate messages that special spam filters keep out.
  • Software and media piracy. The copying of copyrighted software programs, games, and movies by people who haven’t paid for them is another form of unauthorized use. Piracy, defined as using software without a license, takes revenue away from the company that developed the program—usually at great cost. It includes making counterfeit CDs to sell as well as personal copying of software to share with friends.

 


  1. Morgan, Steve. Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Cybercrime Magazine, 2020. https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/.
  2. Steve Morgan, “Cyber Crime Costs Projected to Reach $2 Trillion by 2019,” Forbes, https://www.forbes.com, January 17, 2016.
  3. How Hackers Get Caught - Security IT Summit | Forum Events Ltd. Security IT Summit , 2022. https://securityitsummit.co.uk/briefing/how-hackers-get-caught/.