Sei sulla pagina 1di 13

ICT AND SOCIETY

Define ICT (1.1.1.1)

ICT is the technology required for information processing, in particularly, the use of
electronic computers, communication devices and software applications to convert,
store, protect, process, transmit and retrieve information from anywhere, anytime.

Teaching courseware – lesson 1

Describe the brief evolution of computer (1.1.1.2)

In the evolution of computers their first generation was characterized by the use of
vacuum tubes. These computers were expensive and bulky. They used machine
language for computing and could solve just one problem at a time.

In the 1960s, transistor based computers replaced vacuum tubes. Transistors made
computers smaller and cheaper. They made computers energy efficient. The use of
transistors marked the second generation of computers. Computers belonging to
this generation used punched cards for input

The use of Integrated circuits ushered in the third generation of computers. Small
transistors placed on silicon chips, called semi conductors. This increased the speed
and efficiency of computers. In 1968, DEC launched the first minicomputer called
the PDP-8.

Thousands of integrated circuits placed onto a silicon chip made up a


microprocessor. Introduction of microprocessors was the hallmark of fourth
generation computers. In 1972, Intel introduced the 8080 microprocessors

The fifth generation computers are current and futere development. They are going
to be based on principles of artificial intelligence and natural language recognition.

http://www.buzzle.com/articles/evolution-of-computers.html

Explain the need for Cyber Law (1.2.4.1)

Cyber law refers to legal issues related to protecting the internet and online
communication technologies. Many concerns and issues were raised on the integrity
and security of information, legal status of online transactions, privacy and
confidentiality of information, intellectual property right and security of government
data placed on the internet. Examples of cyber law are,
• Digital signature Act 1997
• Computer crimes Act 1997
• Telemedicine Act 1997
• Communication and multimedia Act 1998

Teaching courseware – lesson 14


Explain briefly the computer crimes below: • Fraud • Copyright
Infringement • Theft • Attacks (1.2.4.2)

A computer crime is defined as any criminal activity that is related to the use of
computers. These activities include computer fraud, copyright infringement,
computer theft and computer attack.

Computer fraud

Computer fraud is defined as having an intention to take advantage over or causing


loss to other people, mainly on monetary basis through the use of computer. There
are many forms of computer fraud which include e-mail hoaxes, investment
schemes and sales promotion.

Copyright infringement

Copyright infringement is defined as a violation of the right secured by a copyright.


It involves illegal copy or reproduction of copyrights material by the black market.
For example, open commercial sale of pirated item.

Computer theft

Computer theft is defined as the unauthorized use of another person’s property with
the intention to deny the owner’s rightful possession of that property or its use. For
example, transfer of payment to wrong account.

Computer attack

Computer attack is defined as any activities taken to disrupt the equipment of


computer system, change processing control or corrupt stored data. For example,
physical attack that disrupt the computer facilities or its transmission lines.

Teaching Courseware– lesson 15

List ways to protect privacy (1.2.2.1)

Privacy can be protected by privacy law and utilities software :-

a) Privacy law

The privacy laws in Malaysia emphasizes on the following :-

• Security Services to review the security policy


• Security Management to protect the resources.
• Security Mechanism to implement the required security services.
• Security Objects, the important entities within the system environment
b) Utilities software

A service program, perform maintenance type task related to the managing of a


computer, or its devices or its program. Examples: anti-spam program, firewall,
anti-spyware and antivirus.

State authentication and verification method/technologies (1.2.2.2)

Methods of Authentication

There are two commonly used in authentication methods :-

a) Biometric devices

Biometric device is a device that translates personal characteristics into digital code
that is compared with a digital code stored in database. Biometric devices include:-

• Fingerprint recognition
• Facial recognition
• Hand geometry
• Iris scanning
• Retinal scanning
• Voice recognition
• Signature verification

b) Callback system

Callback system refers to the checking system that authenticate the user . The
callback system is commonly used in the bank operation and business transaction.

Methods of Verification

There are two commonly used in verification methods :-

a) User Identification

User identification refers to the process of validating the user.

b) Processed Object

Processed Object refers to something the user has such as identification card,
security token and cell phone.
Select the appropriate security measures to overcome the identified
computer threats (1.3.3.1)

Security threats may come from many forms and security measures can be used to
prevent these threats.

a) Malicious code threats versus antivirus and antispyware

Malicious codes include virus, Trojan horse, logic bomb, trapdoor and backdoor, and
worm. Antivirus and antispyware can be used to protect the computer from these
threats.

b) Hacking versus Firewall and cryptography

Hacking is an unauthorised access to the computer system done by a hacker. We


can use firewall or cryptography to prevent the hacker from accessing our
computer.

c) Natural Disaster versus Data Backup

The natural disaster may threaten a computer’s hardware and software easily. The
natural and environmental disasters may include flood, fire, earthquakes, storms
and tornados. Computers are also sensitive to their operating environment such as
excessive heat or the inadequacy of power supply. The backup system is needed to
backup all data and application in the computer.

d) Theft versus Human aspects

Computer theft can be of two kinds:-

• Can be used to steal money, goods, information and computer resourses.


• The actual stealing of computer, especially notebooks and PDAs.

Measures that can be taken to prevent theft :

• Prevent access by using locks, smart-card or password


• Prevent portability by restricting the hardware from being moved.
• Detect and guard all exits and record any hardware transported.

Apply the correct security procedures (1.3.3.2)


a) Antivirus

An antivirus program protects a computer against viruses by identifying and


removing any computer viruses found in the computer memory, on storage media
or incoming e-mail files. An antivirus program scans for programs that attempt to
modify the boot program, the operating system and other programs that normally
are read from but not modified. Examples of antivirus programs are Kaspersky
Antivirus, Norton Antivirus, Avira Antivirus and etc.

b) Anti-Spyware

An anti-spyware application program sometimes called tracking software or a


spybot is used to remove spyware. Spyware is a program placed on a computer
without the user’s knowledge. It secretly collects information about the user.
Examples of anti-spyware are Ad-aware, Spyware Blaster and etc.

c) Cryptography

Cryptography is a process of hiding information by altering the actual information


into different representation, for example an APA can be written as I?X.

d) Firewall

Firewall is a piece of hardware or software which functions in a networked


environment to prevent some communications forbidden by the security policy. It
might permit limited access from in or outside the network perimeters. Examples of
firewall are screening routers, proxy gateway and guard.

e) Data Backup

Data Backup is a program of file duplication. Backup of data applications are


necessary so that they can be recovered in case of an emergency. Depending on
the importance of the information, daily, weekly or biweekly backups from a hard
disk can be performed.

f) Human Aspects

Human aspects refer to the user and also the intruder of a computer system.
Human aspect can be divided into three:-

• Organisation Self Awareness


• Organisational User Self Awareness
• Individual User Self Awareness.
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy,
Computer Crime and Cyber Law (1.2.1.1)

Computer Ethics is a system of moral standard or values used as a guideline for


computer users. It is needed to stop the current technology products from being
exploited.

Examples of Computer Ethics

• You shall not use a computer to harm other people


• You shall not interfere with other people’s computer work

Code of Ethics means moral guidelines to refer to when using the computer and
the Internet.

Intellectual Property refers to any product of human intellect that is unique and
has value in a market place. This covers ideas, inventions, unique names, computer
program codes and many more.

Information Privacy refers to data and information privacy. It is described as the


rights of individuals and companies to deny or restrict the collection and use of
information about them.

Computer Crime is defined as any criminal activities that are related to the use of
computers. This activities include computer fraud, copyrights infringement,
computer theft and computer attack.

Cyber Law refers to legal issues related to protecting the Internet and other online
communication technology.

Example: Copyright Act 1987, Computer Crime Act 1997, Telemedicine Act 1997,
Communication and Multimedia Act 1998

Differentiate between ethics and law. (1.2.1.2)

ETHICS LAW

As a guideline to computer users As a rule to control computer


users

Ethical behaviour is judged by Law is judged by to judicial


moral standards. standards

Computer users are free to follow Computer users must follow the
or ignore the code of ethics regulations and law

No punishment for anyone who Penalties, imprisonments and other


violates ethics punishments for those who break
the law

Universal, can be applied Depends on country and state


anywhere, all over the world where the crime is committed

To produce ethical computer To prevent misused of computer


users

Not honouring computer ethics Not honouring the law means


means ignoring the moral elements committing a crime
(immoral)

State the need for Intellectual Property Laws (1.2.1.3)

• To established and safeguard the intellectual property which refers to works


created by inventors, authors and artists.
• As businesses today continue to expand globally.
• Four types of Intellectual Property protection:

patent for invention

Trademarks for brand identity

Designs for products appearance


Copyright for material

Define Computer Security (1.3.1)

Computer security means protecting our computer systems and the information
against unwanted access, damage, destruction or modification.

Three types of computer security:-

• Hardware security
• Software security / Data security
• Network security

Security Threats (1.3.2)

References : CD courseware
Books – Information and Communication Technology (ICT)(2007) ,
Ibrahim Ahmad, Venton Publishing (M) Sdn. Bhd

Discovering Computers 2007 a Gateway to Information (2007), Shelly


Cashman Vermaat, Shelly Cashmant Series.

Explain briefly the different threats to computer security (1.3.2.1)

Malware or Malicious software is software designed to infiltrate or damage a


computer system without the owner’s informed consent.

There are various kinds of malicious code :-

• Virus –is a computer program that can copy itself[1] and infect a computer.
• Trojan Horse – or Trojan, is malware that appears to perform a desirable
function for the user prior to run or install but instead facilitates unauthorized
access of the user's computer system. A Trojan does not duplicate viruses do.
• Worm – a program that copies itself repeatedly into a computer’s memory or
onto disk drive through a network.
• Trapdoor and Backdoor – In a computer system is a method of by passing
normal authentication, securing remote access to a computer,obtaining
access to plain text, and so on,while attempting to remain undetected.
• Logic Bomb – or time bomb, goes off when a specific condition occurs either
specified time or date.
• and others

Hacking is defined as unauthorized access to the computer system by a hacker.


Hackers are person who accesses a computer or network illegally. There write
program referred to as hacks. Hackers may use a modem or cable to hack the
targeted computers.

Hackers use a variety of methods to break into computer system :-

• Sniffing – refers to finding a user’s password


• Spoofing – alter an e-mail header to make it appear that it request for
information originated from another address
• Phishing- Hacker may use any number of frauds to con victims out of their
passwords

Natural Disaster
Computers are also threatened by natural or environmental disaster. Example of
natural and environmental disasters such as flood, fire, earthquake, storms,
tornados, excessive heat and inadequate power supply.

Theft

Theft is the illegal taking of another person’s property without that person’s freely
given consent.

There are three types of computer theft.

Software theft occurs when someone steal software media , intentionally erases
program or illegally copies are program.

Hardware theft is the act of stealing computer equipment.

Information theft occurs when someone steals personal or confidential


information.

ICT In Everyday Life: Education, Banking, Industry and Commerce (1.1.2)

List the usage of ICT in everyday life. (1.1.2.1)

• Education
Teachers, students, researchers and school administrators benefits from the

usage of ICT. Examples are research, online conferences, browse the


internet to

look for information collect and process data.

• Banking
Customers, businessman and bank administrator benefits from the usage of
ICT.

They can make any transactions at anytime they want using the online
services

offered by banks, examples are

• Automated Teller Machine (ATM)


• Cheque Deposit
• Electronic Fund Tranfer

• Industry
Workers, researchers and administrator benefits from the usage of ICT.

Examples are accounting, inventory management, marketing, analyse and


collect

research data.

• E-Commerce
Customers, suppliers and employees benefits from the usage of ICT.
Examples are online purchase products and keep track of their transactions.

State the differences between computerized and non-computerised


system (1.1.2.2)

Non-computerised Computerised

• banking was done manually by taking • all transactions are done by computers
at anytime and any place
deposits directly
• transactions can only be made during

working hours

Production was slow because depended on Production can be increased through an all day
human labour. operation.

• Advertisement was in the form of word of Distribution, buying, selling and servicing
mouth, billboards and printed flyers. products are done electronically.
• Trading globally was extremely slow, late

and expensive.

State the impact of ICT on society (1.1.2.3)

• Faster Communication Speed


With the capability of bandwidth, broadband and connection speed on the Internet,
any information can travel fast and at an instant. It saves time and is inexpensive

• Lower Communication Cost


Using the Internet is cost-effective than telephone, mailing or courier
service. It

allows people to have access to large amounts of data at a very low cost.

• Reliable Mode Of Communication


Computers are reliable. With the internet, information could be accessed and
retrieved from anywhere and at anytime.

• Effective Sharing Of Information


Information can be shared by people all around the world, share and
exchange

opinions, news and discussion groups, mailing list and forums on the
Internet.

• Paperless Envirolnment
Information can be stored and retrieved through the digital medium instead of
paper.

• Borderless Communication
Internet offers fast information retrieval, interactivity, accessibility and versatility.
It has become a borderless sources for services and information.

• Social Problems
People tend to become more individualistic and introvert. Another negative
effect

are fraud, identity theft, pornography and hacking.

• Health Problems
Computer users are also exposed to bad posture, eyestrain, physical and mental
stress if they use it for long hours frequently.

Controversial Contents and Control (1.2.3)

List effects of controversial contents on society (1.2.3.2)

• Pornography
Any form of media or material (like books or photographs) that depicts erotic

behaviour and is intended to cause sexual excitement.

• Slander
A false and malicious statement or report about someone.

Describe the process of filtering to control access to controversial contents (1.2.3.2)

Filtering software is a term for software designed and optimized for controlling
what content is permitted to a reader when it is used to restrict material delivered
over the web.Content-control software determines what content will be available.
Examples for filtering to control access to controversial contents are:

• keyword blocking
. The filter searches for any banned words or objectionable terms. If found, it
will

block the page completely, stop downloading the page

• site blocking
The software prevents access to any sites on this list ‘denial lists’ regularly

updated
Filters can use both site blocking and word blocking

• web rating systems


Web sites are rated in terms of nudity, sex, violence and language. Browsers
set

to only accept pages with certain levels of ratings.

http://en.wikipedia.org/wiki/content_filter

Potrebbero piacerti anche