Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1.1.3.2 Banking
i. Customers use computers to make online transactions
anytime, anywhere
ii. Bank administrators use computers to oversee the
entire banking activities and to secure their records
1.1.3.3 Industry
i. Workers use computers to work their machines in
production. In some cases, robots are used to do
dangerous jobs.
ii. Researchers use computers to analyse and collect
research data for future references.
iii. Administrators use computers to oversee the entire
operation and to detect errors or problems that occur.
1.1.3.4 E-Commerce
i. Customers use computers to do online shopping,
bidding and even pay their utility bills.
ii. Suppliers use computers to keep track of their
transactions.
iii. Employees use computers and telecommunication
technologies to communicate with their customers for
any enquiries.
1.1.4 Differences between computerized and non-computerised
systems
COMPUTERISED NON-COMPUTERISED
Speed Faster Slower
Medium Paperless Paper-based
Error Minimal or none Human error possible
Cost Expensive Cheap
TABLE 1: Differences Between Computerised and Non-Computerised Systems
1.2.1.4 Privacy
Privacy refers to the rights of an individual or an
organization to deny or restrict the collection and use
of information about them.
1.2.4 Privacy
1.2.4.1 Ways to Protect Privacy
Privacy can be protected using
i. Privacy law
ii. Utilities software
ii. Slander
Slander is a legal term for
malicious or false statements about someone that
are intentionally spread.
In a simpler definition, it is a lie
that we spread about someone even though we
know it is a lie.
Privacy and
confidentiality of
information
WHY DO WE
NEED CYBER
LAW?
iii. Theft
Theft refers to unauthorized use of other’s
property with the intention to deny the owner’s
rights.
Example, transfer of payments to the wrong
account, tap into data transmission lines or
database at no cost and diverts to the wrong
destination.
iv. Attacks
Computer attacks refers to acts to disrupt the
equipment of computer systems, change
processing control or corrupt stored data.
It can be in the form of physical attack,
electronic attack or computer network attack
1.3 Computer Security
1.3.1 Define Computer Security
Computer security means protecting our computer
systems and the information they contain against threats
such as unauthorized access, damage, destruction or
modification.
v. Worm
A program that copies and spreads
itself through a network
It can also spread through emails
ii. Hacking
Hacking is defined as an unauthorized access
to the computer system by a someone known as a
hacker
Hackers are people who learn about the
computer system in detail
iv. Theft
There are 2 types of theft:
i. Using computers to steal money,
information or resources
ii. Stealing the computers or its components
o Anti-spyware
A program that detects,
removes and prevents spyware or malware
from infecting the computer system
o Firewall
A device or software that
works in a networked environment to prevent
unwanted or unauthorized communications
o Cryptography
A process of hiding or
converting information into codes so that only
the authorized person can view its content
o Data backup
An act of making copies of the
original file which will be stored in a different
medium and location in case the original file
is damaged or destroyed
o Human aspects
Human aspects refer to the
security measures that uses human instead of
hardware or software such as putting a
security guard at a computer facility
FIREWALL
HACKING VS
CRYPTOGRAPHY
NATURAL
DISASTERS VS DATA BACKUP