Videos: Computer Misuse

See the following objective content and related videos

These videos were chosen for each topic because they cover the subject matter in a relevant context. They definitely were not created specifically for the CSEC an Syllabus, however , they do address the fundamental concepts in real world scenarios.

(Created for CSEC syllabus, but some content also applies to NCSE ICT)

Syllabus ObjectiveContentSuggested Videos
2.                   assess the potential impact of computer systems misuse based on the main entities impacted; Misuse:
(a) Cyberbullying, copyright
infringement, data theft, denial of
service attacks,  transmission  of
viruses and malware, identity theft,
online publication of obscene
materials, phishing attacks, software
and music piracy, financial abuses,
violation of  privacy, propaganda,
electronic eavesdropping, industrial
espionage; and,
(b) Entity impacted: individual,
organization, government.
 Cyberbullying:
  Cyber Bullying (UNICEF)

How to Combat Cyberbullying | Child Mind Institute  

Copyright Infringement  

C&C B.1 What is Copyright Infringement, and Why Does it Matter?  

Data Theft
What Is Data Theft In Cyber Security? – SecurityFirstCorp.com
 
Denial Of Service Attacks  
DDoS Attack Explained in 2 Minutes

DDoS Attack Visually Explained

DDoS Attack Explained (Advanced )

Identity Theft   What is Identity Theft?    

Phishing attacks  

Funny Animation Video(Phishing Attack ) | Pencil animation | Short animated films (Set Induction)

What is Phishing?    

Software and music piracy  

Software:
Software Piracy | Animated Presentation (Set Induction)

The Impact Of Piracy

Music:
What is Music Piracy

Violation of  privacy  
What is an example of a data privacy violation?

Understanding “Privacy Violation”: A Simple Guide

What Is A Privacy Violation? – SecurityFirstCorp.com  

Propaganda  

What is propaganda and how can you spot it? | CBC Kids News

What is propaganda? | Jason Stanley | Explain It Like I’m Smart by Big Think     

Electronic eavesdropping   What Is Eavesdropping In Cyber Security

What Is Eavesdropping In Computer Security? – SecurityFirstCorp.com  

Industrial espionage
Industrial Espionage: The War on Information

What Is Industrial Espionage? – SecurityFirstCorp.com

When Chinese Industrial Espionage Goes Wrong  

© 2025  Vedesh Kungebeharry. All rights reserved. 

Leave a comment