SlideShare uma empresa Scribd logo
1 de 45
INTRODUCTION TO ICT
                                         • ICT
                     • EVOLUTION OF COMPUTER
                • USAGE OF ICT IN EVERYDAY LIFE
• DIFFERENCES BETWEEN COMPUTERIZED AND NON-
                         COMPUTERISED SYSTEM
                    • IMPACT OF ICT ON SOCIETY
           • COMPUTER ETHICS AND LEGAL ISSUES
       • CONTROVERSIAL CONTENTS AND CONTROL
                             • COMPUTER CRIME
                         • COMPUTER SECURITY
                          • SECURITY MEASURE
ICT
• Information refer to the knowledge obtained from
  reading, investigation, study or research.
• Communication ia an act of transmitting message. It
  is a process whereby information is exchanged
  between individuals using symbols, signs or verbal
  interactions.
• Technology is the use of scientific
  knowledge,experience and resources to create
  processes and products that fulfill human needs.
• ICT is the technology required for information
  processing, in particular the use electronic computers,
  communication devices and application software to
  convert, store, protect, process, transmit and retreive
  information from anywhere, anytime.
EVOLUTION OF COMPUTERS
1.    3500 BC : The Summerians develop cuneiform writing
2.    In 1500 BC : The Phoenicians develop the alphabet
3.    In 105 BC : Tsai lun of china invented paper
4.    In 1454 :    Creation of a printing machine
5.    In 1793 :    Telegraph line was invented
6.    In 1876 :    Telephone was introduce
7.    In 1925 :    Television was introduce
8.    In 1941 :    Computer was created
9.    In 1958 :    Photocopier machine was introduced
10.   In 1963 :    The communication satellite was introduced
11.   In 1969 :    The first internet known as ARPANET was
                   introduced
GENERATION OF COMPUTERS
First generation 1940-1956 - VACUUM TUBE
•   used vacuum tube
•   electronic tube made by glass used as computer components to
    store and process data
•   ENIAC is first generation computer that contains of weights of 30
    tons,18000 vacuum tubes, 30-50 foot space and 16000 watts of
    power


Second generation computers(1956-1963) - TRANSISTOR
•   Transistors replace vacuum tubes. Transistors are small devices
    that transfer electronic signal across resistor.
•   Transistor do not produced lots of heats and use less power also
    faster, cheaper and smaller than vacuum tubes.
GENERATION OF COMPUTERS
Third generation computers(1964-1971) - INTERGRATED
CIRCUIT
•   Integrated circuits (IC) replaced transistor.
•   An IC is a complete electronic circuit on a small chip made of
    silicone.
•   IC was reliable, compact and cheaper than transistors.


Fourth generation computers(1971-present) -
MICROPROSESSOR
•   Microprocessor was introduced, from thousand of integrated
    circuits change onto single silicone chip.
•   The Intel 4004 chip developed in 1971, located all the components
    of the computer from the central processing units and memory to
    input/output controls on a single chip.
•   Computer is 100 times smaller than ENIAC computer in first
    generation.
GENERATION OF COMPUTERS
Fifth generation computer(present – beyond)
•   Based on artificial intelligence are still in development though
    there are some applications such as voice recognition that are
    being used today
USAGE OF ICT IN EVERYDAY LIFE
A. Education
   • Teachers use computers to research for teaching materials,
     participate in online forums and online conferences.
   • Students use the computers as a reference tool and browse the
     Internet.
   • Researchers use computers to collect and process data.
   • School administrators use computers for administrative
     purposes to make sure that the entire operation runs smoothly.
USAGE OF ICT IN EVERYDAY LIFE
B. Banking
  • Electronic Banking Services:
    Automated Teller Machine (ATM),Cheque Deposit,Electronic
    Fund Tranfer, Direct Deposit, Pay by phone system, Personal
    computer / internet banking.
  • Customers can make any transactions at the 24 hour service
    centres or via online.
  • Businessmen using the online services , access company
    accounts for loan applications, business transactions and
    update their cash flow at any time.
  • Bank administrators can oversee the entire banking activities
    such as reconciliations, inter-branch transactions (IBT),
    telegraphic transfer and others by referring to the banking
    system.
USAGE OF ICT IN EVERYDAY LIFE
C. Industry
   • Computers are used to facilitate production planning and
     control systems
   • Computers help Workers operate machines.
   • Computers help Researchers to analyse and collect research
     data for future reference.
   • Administrators use computers to oversee and control the
     entire operations in the factory.
USAGE OF ICT IN EVERYDAY LIFE
D. E-Commerce
•   makes buying and selling activities easier, more efficient and
    faster.
•   Customers use computers online with suppliers to purchase
    products.
•   Suppliers keep track of their transactions. All products are bar
    coded and can be read by the computer scanner to help in
    determining prices and managing inventory.
•   Employees use computers and telephones to communicate with
    their customers for any enquiries.
DIFFERENCES BETWEEN COMPUTERISED
AND NON-COMPUTERISED SYSTEM
                      BEFORE ICT                      AFTER ICT
BANKING     Banking was done manually by     Transactions are done by
            taking deposits directly.        computers.
            Transactions can only be made    Transaction can be done at
            during working hours.            anytime and place.
            Takes time to approve any loanFast : online services, phone
            applications.                 banking system, credit cards
                                          are available.
INDUSTRY Production was slow because      Production fast : can be
         done manually and depended on increased through an all day
         human labour                     operation
E-       Trading using the barter system Distribution, buying, selling
COMMERCE and currency.                    and servicing products that
         Advertisement was in the form of are done electronically.
         word of mouth, billboards and
         printed flyers.
          Trading extremely slow, late and
          expensive.
EDUCATION Teachers use chalk and talk for  Teachers use computers to
          teaching, forums and conferences research for teaching
                                           materials, participate in
                                           online forums and online
                                           conferences
IMPACT OF ICT ON SOCIETY
POSITIVE IMPACTS
•   Faster communication speed.
•   Lower communication cost.
•   Can share opinions and information.
•   Paperless environment.
•   Information and communication borderless through internet.


NEGATIVE IMPACTS
•   Can be negative because it courage people to access pornography
    and violence web sites.
•   Can harm uses for long hours used.
COMPUTER ETHICS AND LEGAL ISSUES
Computer ethics
•   is a system of moral standards or values used as a guideline
    for computer users.
Code of ethics
•   is guidelines in ICT that help determine whether a specific
    computer action is ethical or unethical.
Intellectual Property
•   refers to works created by inventors, authors and artists.
Privacy
•   refers to the right of individuals and companies to deny or
    restrict and collection and used of information about them.
Computer Crime
•   is any illegal acts involving computers.
Cyber law
•   refers to any laws relating to protecting the Internet and other
    online communication technologies
DIFFERENCES BETWEEN ETHICS AND LAW
            Ethics                             Law
As a guideline to computer        As a rule to control computer
users                             users.
Ethical behavior is judged by     To prevent misuse of computers.
moral standards.
Computer users are free to        Computer users must follow the
follow or ignore the code of      regulations and law.
ethics.
No punishment for anyone who      Penalties , Imprisonments and
violates ethics.                  other PUNISHMENTS.
Universal, can be applied         Depend on country and state
anywhere,                         where the crime is committed.
all over the world.
Not following ethics are called   Not obeying laws are called
immoral                           crime.
THE NEED FOR INTELECTUAL
PROPERTY LAWS
 •   Copyrights for materials
 •   Trademarks for brand identity
 •   Patents for inventions
 •   Design for product appearance
WAYS TO PROTECT PRIVACY
 Privacy can be protected by:
 A. PRIVACY LAW
 •   The privacy laws in Malaysia :
       Security Services to review the security policy
       Security Management to protect the resources
       Security Mechanism to implement the required security
        services
       Security Objects, the important entities within the system
        environment
 B. UTILITIES SOFTWARE
 •   Install anti-spam program, firewall, anti-spyware and
     antivirus
 •   Purchase goods with cash rather than credit card
 •   Clear your history file when you are finished browsing
 •   Fill in only necessary information on warranty and
     registration form.
AUTHENTICATION AND VERIFICATION
METHODS/ TECHNOLOGY
 Authentication is a process where users verify their identity.
 Authentication deals with the problem of determining whether a
 user should be allowed access to a particular system.


 METHODS OF AUTHENTICATION
 •   Biometric device is a device that translates personal
     characteristics into a digital code that is compared with a
     digital code stored in the database.
 •   Callback system refers to the checking system that
     authenticates the user
 •   Verification is the act of proving or disproving the
     correctness of a system with respect to a certain formal
     specification
AUTHENTICATION AND VERIFICATION
METHODS/ TECHNOLOGY
 METHODS OF VERIFICATION
 •   2 methods :
 •   User identification refers to the process of validating the
     user.
 •   Processed object refers to something the user has such as
     identification card, security token and cell phone
CONTROVERSIAL CONTENTS AND CONTROL
CONTROVERSIAL CONTENTS OF
PHONOGRAPHY ON SOCIETY
 Pornography:
 Any form of media or material (books,video,photos) that show
 erotic behavior and intended to cause sexual excitement.
 •   can lead to criminal acts such as exploitation of women and
     children
 •   can lead to sexual addiction or perversion
 •   can develop low moral value towards other men, women or
     children
 •   can erode good religious, cultural and social beliefs and
     behavior
CONTROVERSIAL CONTENTS OF
PHONOGRAPHY ON SOCIETY
 Slander :
 Is a false spoken statement about someone, intended to damage his
 reputation.
 •   can develop into a society that disregards honesty and truth
 •   can develop bad habit of spreading untruths and rumors
 •   can lead to unnecessary argument
 •   can cause people to have negative attitudes towards another
     person
THE PROCESS OF FILTERING TO CONTROL
ACCESS TO CONTROVERSIAL CONTENTS
 Internet Filtering
 •   Keyword blocking.
     Uses a list of banned word or objects terms such as xxx, sex,
     and nude. The filter searches, If found, it will blocked.
 •   Site blocking.
     Use software to list the websites that will be blocked by
     using software. The software prevents users from being access
     the web sites on list.
 •   Web rating system.
     Web sites are rating in terms of nudity, sex, violence and
     language. Can be done by setting the browser to only
     accept page with certain level of ratings.
COMPUTER CRIME
CYBER LAW
 refers to any laws relating to protecting the Internet and other
 online communication technologies.
 •   Examples of Malaysian cyber laws :
       Digital Signature Act 1997
          • A digital signature or digital signature scheme is a
            mathematical scheme for demonstrating the
            authenticity of a digital message or document.
          • A valid digital signature gives a recipient reason to
            believe that the message was created by a known
            sender such that they cannot deny sending it
            (authentication and non-repudiation) and that the
            message was not altered in transit (integrity).
          • Digital signatures are commonly used for software
            distribution, financial transactions, and in other cases
            where it is important to detect forgery or tampering.
CYBER LAW
      Computer Crimes Act 1997.
      Telemedicine Act 1997
      Communications and Multimedia Act 1998.
      Private Data Protection Bill
      Electronic Government Activities Bill
      Electronic Transactions Bill


 The needs of cyber law are:
      Integrity and security Information
      Legal status of online transactions
      Privacy and confidentially of information
      Intellectual property rights
      Security of government Data
COMPUTER CRIME
 Computer fraud
 •   defined as having an intention to take advantage over or
     causing loss to other people through the use of computers.
 •   Eg: e-mail hoaxes, program fraud, investment schemes, sales
     promotions and claims of expertise on certain fields.
 Copyright infringement :
 •   defined as a violation of the rights secured by a copyright.
 •   Eg: illegal copy or reproduction of copyrights material by the
     black market group.
 Computer theft :
 •   defined as the unauthorized use of another person’s
     property with the intention to deny the owner the rightful
     possession of that property or its use.
 •   Examples:
 •   transfer of payments to the wrong accounts
 •   get online materials with no cost
COMPUTER CRIME
 Computer theft :
 •   defined as the unauthorized use of another person’s
     property with the intention to deny the owner the rightful
     possession of that property or its use.
 •   Examples:
       transfer of payments to the wrong accounts
       get online materials with no cost
       tap into data transmission lines on database at no cost
       divert goods to the wrong destination
COMPUTER CRIME
 Computer attack :
 •   defined as any activities taken to disrupt the equipment of
     computer systems, change processing control or corrupt
     stored data.
 •   Eg:
 •   Physical attack that disrupt the computer facility or its
     transmission lines.
 •   An electronic attack that uses the power of electromagnetic
     energy to overload computer circuitry.
 •   a computer network attack that uses a malicious code to
     exploit a weakness in software, or in the computer security
     practices of a computer user
COMPUTER SECURITY
Computers security means
•   protecting our computer systems and the information
•   they contains against unwanted access, damage,
•   destruction or modification.


Types of computer Security
•   Hardware security
•   Software security/data security
•   Network security
THE DIFFERENT THREATS TO
COMPUTER SECURITY
 Malicious code known as a rouge program.
 •   It is a treat to computing assets by causing undesired
     effects in the programmer’s part. The effect cause by agent,
     with the intention to cause damage.
 •   The agent for malicious code is the writer of the code, or any
     person who causes its distribution. There are various kinds of
     malicious code.
 •   They include virus, Trojan horse, logic door, trapdoor and
     backdoor, worm and many others.
 Hacking is a source of threat to security in computer. It is
 defined as unauthorized access to the computer system by a
 hacker.
 •   Hackers are persons who learn about the computer system in
     detail. They write program referred to as hacks. Hackers may
     use a modem or cable to hack the targeted computers.
THE DIFFERENT THREATS TO
COMPUTER SECURITY
 Natural Disaster mean Computers are threatened by natural
 or environmental disaster. Be it at home, stores, offices and also
 automobiles.
 •   Examples of natural and environmental disasters:
       Flood, Fire, Earthquakes, storms and tornados, Excessive
        Heat, Inadequate Power Supply
 Computer theft is unauthorized use of another person’s property
 with the intention to deny the owner.
 •   Two types of Computer theft:
       Computer is used to steal money, goods, information
        and resources.
       Stealing of computer, especially notebook and PDAs
SECURITY MEASURE
THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
 1. ANTIVIRUS
     • An antivirus program protects a computer against viruses
     • Examples: virus, worm or Trojan horse.
 2. HUMAN ASPECTS
     • Refer to the user and also the intruder of a computer
       system.
     • Example: Most common problem is the lack of achieving a
       good information security procedure.
 3. DATA BACKUP
     • Data Backup is a program of file duplication.
     • Importance information can be backups daily, weekly or
       biweekly from a hard disk.
 4. FIREWALL
 •   Hardware or software which functions in a networked
     environment to prevent some communications forbidden by
     the security policy.
THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
  4. FIREWALL
  •   Hardware or software which functions in a networked
      environment to prevent some communications forbidden by
      the security policy.
  •   3 types :

                               PROXY
SCREENING ROUTERS                                 GUARD
                              GATEWAY
                  Simplest Somewhat        Most complex
                           complex
 See only add & service See full text of   See full text of
          protocol type communication      communication
        Screen based on Screen based on    Screens based on
       connection rules behaviour          interpretion of
                        proxies            message content
THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
 5. CRYPTOGRAPHY
   • Is a process of hiding information by altering the actual
     information into different representation.
   • Example, an APA can be written as I? X.
   • PLAINTEXT > Encryption > CIPHERTEXT > Decryption >
     PLAINTEXT
THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
 6. ANTI-SPYWARE
    • Is a program placed on a computer without the user’s
      knowledge. It secretly collects information about the user.
    • Examples popular anti-spyware programs :
         • Spybot Search and Destroy
         • Ad-aware
         • Spyware Blaster

         Security Threats Security Measures

        MALICIOUS CODE ANTIVIRUS AND ANTI-SPYWARE

                 HACKING FIREWALL

     NATURAL DISASTER DATA BACKUP

                    THEFT HUMAN ASPECTS

                 HACKING FIREWALL
APPLY THE CORRECT SECURITY PROSEDURES
 •   Antivirus                 •   Firewall
 •   Anti-spyware              •   Data backup
 •   Cryptography              •   Human aspects

        SECURITY THREATS SECURITY MEASURES
          MALICIOUS CODE ANTIVIRUS AND ANTI-SPYWARE
                HACKING FIREWALL
        NATURAL DISASTER DATA BACKUP

                     THEFT HUMAN ASPECTS
                    HACKING FIREWALL
RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
Security threats may come from in many forms.
•   Example: when someone is invading your account information
    from a trusted bank, this act is considered as a security threat.
Security measures can be used to prevent this invader from
getting the account information.
•   Example: the bank can use a firewall to prevent unauthorised
    access to its database.


MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI-
SPYWARE
•   Security threats include virus, Trojan horse, logic bomb,
    trapdoor and backdoor, and worm.
•   Antivirus and anti-spyware can be used to protect the computer
    from the threats by:
•   limiting connectivity
•   allowing only authorised media for loading data and software
RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI-
SPYWARE
•   Security threats include virus, Trojan horse, logic bomb,
    trapdoor and backdoor, and worm.
•   Antivirus and anti-spyware can be used to protect the computer
    from the threats by:
      limiting connectivity
      allowing only authorised media for loading data and software
      enforcing mandatory access controls
      blocking the virus from the computer program
RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
HACKING VS. FIREWALL
•   Hacking is an unauthorised access to the computer system done
    by a hacker. We can use firewall or cryptography to prevent the
    hacker from accessing our computers.
•   A firewall permits limited access to unauthorised users or any
    activities from the network environment. Cryptography is a
    process of hiding information by changing the actual
    information into different representation, for example, an APA
    can be written as 7&*.
RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
NATURAL DISASTER VS. DATA BACKUP
•   The natural and environmental disasters may include: flood, fire,
    earthquakes, storms , tornados
•   Natural disasters may threaten a computer’s hardware and
    software easily. Computers are also sensitive to their operating
    environment such as excessive heat or the inadequacy of power
    supply.
•   The backup system is needed to backup all data and applications
    in the computer. With the backup system, data can be recovered
    in case of an emergency.
RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
THEFT VS. HUMAN ASPECTS
•   Computer theft can be of two kinds:
•   can be used to steal money, goods, information and computer
    resources
•   the actual stealing of computers, especially notebooks and PDAs
•   Measures that can be taken to prevent theft:
      prevent access by using locks, smart-card or password
      prevent portability by restricting the hardware from being
       moved
      detect and guard all exits and record any hardware
       transported
NEXT LESSON

TOPIC 2 :
COMPUTER SYSTEM

Mais conteúdo relacionado

Mais procurados

Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
Rammel1
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
Kak Yong
 

Mais procurados (20)

Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki Verma
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our Society
 
INFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOL
INFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOLINFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOL
INFORMATION AND COMMUNICATION TECHNOLOGY FOR SENIOR HIGH SCHOOL
 
Impact of ICT on Society
Impact of ICT on SocietyImpact of ICT on Society
Impact of ICT on Society
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Internet Services
Internet ServicesInternet Services
Internet Services
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Advantages And Disadvantages of Using Computer
Advantages And Disadvantages of Using ComputerAdvantages And Disadvantages of Using Computer
Advantages And Disadvantages of Using Computer
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
Ict
IctIct
Ict
 
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ICT in Education
Introduction to ICT in EducationIntroduction to ICT in Education
Introduction to ICT in Education
 

Destaque

Customize Word Environment
Customize Word EnvironmentCustomize Word Environment
Customize Word Environment
Cik Na Shohaili
 
Microsoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning ClassMicrosoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning Class
Lady_Informationado
 
Introduction to Microsoft Office
Introduction to Microsoft OfficeIntroduction to Microsoft Office
Introduction to Microsoft Office
Cik Na Shohaili
 
Microsoft word basics ppt
Microsoft word basics pptMicrosoft word basics ppt
Microsoft word basics ppt
jdbutler13
 
Microsoft word presentation
Microsoft word presentationMicrosoft word presentation
Microsoft word presentation
egirshovich
 

Destaque (17)

Harga Diri
Harga DiriHarga Diri
Harga Diri
 
Customize Word Environment
Customize Word EnvironmentCustomize Word Environment
Customize Word Environment
 
Word quick-reference-2010
Word quick-reference-2010Word quick-reference-2010
Word quick-reference-2010
 
Word for Beginners
Word for BeginnersWord for Beginners
Word for Beginners
 
Beginners Microsoft Office Word 2007 Lesson 1
Beginners Microsoft Office Word 2007 Lesson 1Beginners Microsoft Office Word 2007 Lesson 1
Beginners Microsoft Office Word 2007 Lesson 1
 
Word quick-reference-2003
Word quick-reference-2003Word quick-reference-2003
Word quick-reference-2003
 
Pivot table
Pivot tablePivot table
Pivot table
 
Introduction to Excel - Excel 2013 Tutorial
Introduction to Excel - Excel 2013 TutorialIntroduction to Excel - Excel 2013 Tutorial
Introduction to Excel - Excel 2013 Tutorial
 
Ms word 2013
Ms word 2013Ms word 2013
Ms word 2013
 
Microsoft word ppt presentation
 Microsoft word  ppt presentation Microsoft word  ppt presentation
Microsoft word ppt presentation
 
Microsoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning ClassMicrosoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning Class
 
AutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 TutorialAutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 Tutorial
 
Introduction to Microsoft Office
Introduction to Microsoft OfficeIntroduction to Microsoft Office
Introduction to Microsoft Office
 
A presentation on ms office
A presentation on ms officeA presentation on ms office
A presentation on ms office
 
Microsoft word basics ppt
Microsoft word basics pptMicrosoft word basics ppt
Microsoft word basics ppt
 
Microsoft word presentation
Microsoft word presentationMicrosoft word presentation
Microsoft word presentation
 
MS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & ChartsMS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & Charts
 

Semelhante a 1 ICT in Society

Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
smkengkilili2011
 

Semelhante a 1 ICT in Society (20)

Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
1.1.2
1.1.21.1.2
1.1.2
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
 
ict.pptx
ict.pptxict.pptx
ict.pptx
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Lesson 2.0 definition, importance, and advantages of computers
Lesson 2.0   definition, importance, and advantages of computersLesson 2.0   definition, importance, and advantages of computers
Lesson 2.0 definition, importance, and advantages of computers
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
CS7330 - Electronic Commerce - lecture (2)
CS7330 - Electronic Commerce - lecture (2)CS7330 - Electronic Commerce - lecture (2)
CS7330 - Electronic Commerce - lecture (2)
 
Intro to ict
Intro to ictIntro to ict
Intro to ict
 
Introduction to computers notes
Introduction to computers notesIntroduction to computers notes
Introduction to computers notes
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Ict
IctIct
Ict
 
Impact of ICT on Society(Information).pptx
Impact of ICT on Society(Information).pptxImpact of ICT on Society(Information).pptx
Impact of ICT on Society(Information).pptx
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Último (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

1 ICT in Society

  • 1. INTRODUCTION TO ICT • ICT • EVOLUTION OF COMPUTER • USAGE OF ICT IN EVERYDAY LIFE • DIFFERENCES BETWEEN COMPUTERIZED AND NON- COMPUTERISED SYSTEM • IMPACT OF ICT ON SOCIETY • COMPUTER ETHICS AND LEGAL ISSUES • CONTROVERSIAL CONTENTS AND CONTROL • COMPUTER CRIME • COMPUTER SECURITY • SECURITY MEASURE
  • 2. ICT • Information refer to the knowledge obtained from reading, investigation, study or research. • Communication ia an act of transmitting message. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. • Technology is the use of scientific knowledge,experience and resources to create processes and products that fulfill human needs. • ICT is the technology required for information processing, in particular the use electronic computers, communication devices and application software to convert, store, protect, process, transmit and retreive information from anywhere, anytime.
  • 3. EVOLUTION OF COMPUTERS 1. 3500 BC : The Summerians develop cuneiform writing 2. In 1500 BC : The Phoenicians develop the alphabet 3. In 105 BC : Tsai lun of china invented paper 4. In 1454 : Creation of a printing machine 5. In 1793 : Telegraph line was invented 6. In 1876 : Telephone was introduce 7. In 1925 : Television was introduce 8. In 1941 : Computer was created 9. In 1958 : Photocopier machine was introduced 10. In 1963 : The communication satellite was introduced 11. In 1969 : The first internet known as ARPANET was introduced
  • 4. GENERATION OF COMPUTERS First generation 1940-1956 - VACUUM TUBE • used vacuum tube • electronic tube made by glass used as computer components to store and process data • ENIAC is first generation computer that contains of weights of 30 tons,18000 vacuum tubes, 30-50 foot space and 16000 watts of power Second generation computers(1956-1963) - TRANSISTOR • Transistors replace vacuum tubes. Transistors are small devices that transfer electronic signal across resistor. • Transistor do not produced lots of heats and use less power also faster, cheaper and smaller than vacuum tubes.
  • 5. GENERATION OF COMPUTERS Third generation computers(1964-1971) - INTERGRATED CIRCUIT • Integrated circuits (IC) replaced transistor. • An IC is a complete electronic circuit on a small chip made of silicone. • IC was reliable, compact and cheaper than transistors. Fourth generation computers(1971-present) - MICROPROSESSOR • Microprocessor was introduced, from thousand of integrated circuits change onto single silicone chip. • The Intel 4004 chip developed in 1971, located all the components of the computer from the central processing units and memory to input/output controls on a single chip. • Computer is 100 times smaller than ENIAC computer in first generation.
  • 6. GENERATION OF COMPUTERS Fifth generation computer(present – beyond) • Based on artificial intelligence are still in development though there are some applications such as voice recognition that are being used today
  • 7. USAGE OF ICT IN EVERYDAY LIFE A. Education • Teachers use computers to research for teaching materials, participate in online forums and online conferences. • Students use the computers as a reference tool and browse the Internet. • Researchers use computers to collect and process data. • School administrators use computers for administrative purposes to make sure that the entire operation runs smoothly.
  • 8. USAGE OF ICT IN EVERYDAY LIFE B. Banking • Electronic Banking Services: Automated Teller Machine (ATM),Cheque Deposit,Electronic Fund Tranfer, Direct Deposit, Pay by phone system, Personal computer / internet banking. • Customers can make any transactions at the 24 hour service centres or via online. • Businessmen using the online services , access company accounts for loan applications, business transactions and update their cash flow at any time. • Bank administrators can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic transfer and others by referring to the banking system.
  • 9. USAGE OF ICT IN EVERYDAY LIFE C. Industry • Computers are used to facilitate production planning and control systems • Computers help Workers operate machines. • Computers help Researchers to analyse and collect research data for future reference. • Administrators use computers to oversee and control the entire operations in the factory.
  • 10. USAGE OF ICT IN EVERYDAY LIFE D. E-Commerce • makes buying and selling activities easier, more efficient and faster. • Customers use computers online with suppliers to purchase products. • Suppliers keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory. • Employees use computers and telephones to communicate with their customers for any enquiries.
  • 11. DIFFERENCES BETWEEN COMPUTERISED AND NON-COMPUTERISED SYSTEM BEFORE ICT AFTER ICT BANKING Banking was done manually by Transactions are done by taking deposits directly. computers. Transactions can only be made Transaction can be done at during working hours. anytime and place. Takes time to approve any loanFast : online services, phone applications. banking system, credit cards are available. INDUSTRY Production was slow because Production fast : can be done manually and depended on increased through an all day human labour operation E- Trading using the barter system Distribution, buying, selling COMMERCE and currency. and servicing products that Advertisement was in the form of are done electronically. word of mouth, billboards and printed flyers. Trading extremely slow, late and expensive. EDUCATION Teachers use chalk and talk for Teachers use computers to teaching, forums and conferences research for teaching materials, participate in online forums and online conferences
  • 12. IMPACT OF ICT ON SOCIETY POSITIVE IMPACTS • Faster communication speed. • Lower communication cost. • Can share opinions and information. • Paperless environment. • Information and communication borderless through internet. NEGATIVE IMPACTS • Can be negative because it courage people to access pornography and violence web sites. • Can harm uses for long hours used.
  • 13. COMPUTER ETHICS AND LEGAL ISSUES
  • 14. Computer ethics • is a system of moral standards or values used as a guideline for computer users. Code of ethics • is guidelines in ICT that help determine whether a specific computer action is ethical or unethical. Intellectual Property • refers to works created by inventors, authors and artists. Privacy • refers to the right of individuals and companies to deny or restrict and collection and used of information about them. Computer Crime • is any illegal acts involving computers. Cyber law • refers to any laws relating to protecting the Internet and other online communication technologies
  • 15. DIFFERENCES BETWEEN ETHICS AND LAW Ethics Law As a guideline to computer As a rule to control computer users users. Ethical behavior is judged by To prevent misuse of computers. moral standards. Computer users are free to Computer users must follow the follow or ignore the code of regulations and law. ethics. No punishment for anyone who Penalties , Imprisonments and violates ethics. other PUNISHMENTS. Universal, can be applied Depend on country and state anywhere, where the crime is committed. all over the world. Not following ethics are called Not obeying laws are called immoral crime.
  • 16. THE NEED FOR INTELECTUAL PROPERTY LAWS • Copyrights for materials • Trademarks for brand identity • Patents for inventions • Design for product appearance
  • 17. WAYS TO PROTECT PRIVACY Privacy can be protected by: A. PRIVACY LAW • The privacy laws in Malaysia :  Security Services to review the security policy  Security Management to protect the resources  Security Mechanism to implement the required security services  Security Objects, the important entities within the system environment B. UTILITIES SOFTWARE • Install anti-spam program, firewall, anti-spyware and antivirus • Purchase goods with cash rather than credit card • Clear your history file when you are finished browsing • Fill in only necessary information on warranty and registration form.
  • 18. AUTHENTICATION AND VERIFICATION METHODS/ TECHNOLOGY Authentication is a process where users verify their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system. METHODS OF AUTHENTICATION • Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. • Callback system refers to the checking system that authenticates the user • Verification is the act of proving or disproving the correctness of a system with respect to a certain formal specification
  • 19. AUTHENTICATION AND VERIFICATION METHODS/ TECHNOLOGY METHODS OF VERIFICATION • 2 methods : • User identification refers to the process of validating the user. • Processed object refers to something the user has such as identification card, security token and cell phone
  • 21. CONTROVERSIAL CONTENTS OF PHONOGRAPHY ON SOCIETY Pornography: Any form of media or material (books,video,photos) that show erotic behavior and intended to cause sexual excitement. • can lead to criminal acts such as exploitation of women and children • can lead to sexual addiction or perversion • can develop low moral value towards other men, women or children • can erode good religious, cultural and social beliefs and behavior
  • 22. CONTROVERSIAL CONTENTS OF PHONOGRAPHY ON SOCIETY Slander : Is a false spoken statement about someone, intended to damage his reputation. • can develop into a society that disregards honesty and truth • can develop bad habit of spreading untruths and rumors • can lead to unnecessary argument • can cause people to have negative attitudes towards another person
  • 23. THE PROCESS OF FILTERING TO CONTROL ACCESS TO CONTROVERSIAL CONTENTS Internet Filtering • Keyword blocking. Uses a list of banned word or objects terms such as xxx, sex, and nude. The filter searches, If found, it will blocked. • Site blocking. Use software to list the websites that will be blocked by using software. The software prevents users from being access the web sites on list. • Web rating system. Web sites are rating in terms of nudity, sex, violence and language. Can be done by setting the browser to only accept page with certain level of ratings.
  • 25. CYBER LAW refers to any laws relating to protecting the Internet and other online communication technologies. • Examples of Malaysian cyber laws :  Digital Signature Act 1997 • A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. • A valid digital signature gives a recipient reason to believe that the message was created by a known sender such that they cannot deny sending it (authentication and non-repudiation) and that the message was not altered in transit (integrity). • Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
  • 26. CYBER LAW  Computer Crimes Act 1997.  Telemedicine Act 1997  Communications and Multimedia Act 1998.  Private Data Protection Bill  Electronic Government Activities Bill  Electronic Transactions Bill The needs of cyber law are:  Integrity and security Information  Legal status of online transactions  Privacy and confidentially of information  Intellectual property rights  Security of government Data
  • 27. COMPUTER CRIME Computer fraud • defined as having an intention to take advantage over or causing loss to other people through the use of computers. • Eg: e-mail hoaxes, program fraud, investment schemes, sales promotions and claims of expertise on certain fields. Copyright infringement : • defined as a violation of the rights secured by a copyright. • Eg: illegal copy or reproduction of copyrights material by the black market group. Computer theft : • defined as the unauthorized use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. • Examples: • transfer of payments to the wrong accounts • get online materials with no cost
  • 28. COMPUTER CRIME Computer theft : • defined as the unauthorized use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. • Examples:  transfer of payments to the wrong accounts  get online materials with no cost  tap into data transmission lines on database at no cost  divert goods to the wrong destination
  • 29. COMPUTER CRIME Computer attack : • defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data. • Eg: • Physical attack that disrupt the computer facility or its transmission lines. • An electronic attack that uses the power of electromagnetic energy to overload computer circuitry. • a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user
  • 31. Computers security means • protecting our computer systems and the information • they contains against unwanted access, damage, • destruction or modification. Types of computer Security • Hardware security • Software security/data security • Network security
  • 32. THE DIFFERENT THREATS TO COMPUTER SECURITY Malicious code known as a rouge program. • It is a treat to computing assets by causing undesired effects in the programmer’s part. The effect cause by agent, with the intention to cause damage. • The agent for malicious code is the writer of the code, or any person who causes its distribution. There are various kinds of malicious code. • They include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others. Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker. • Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.
  • 33. THE DIFFERENT THREATS TO COMPUTER SECURITY Natural Disaster mean Computers are threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles. • Examples of natural and environmental disasters:  Flood, Fire, Earthquakes, storms and tornados, Excessive Heat, Inadequate Power Supply Computer theft is unauthorized use of another person’s property with the intention to deny the owner. • Two types of Computer theft:  Computer is used to steal money, goods, information and resources.  Stealing of computer, especially notebook and PDAs
  • 35. THE APPROPRIATE SECURITY MEASURES TO OVERCOME THE IDENTIFIED COMPUTER THREATS 1. ANTIVIRUS • An antivirus program protects a computer against viruses • Examples: virus, worm or Trojan horse. 2. HUMAN ASPECTS • Refer to the user and also the intruder of a computer system. • Example: Most common problem is the lack of achieving a good information security procedure. 3. DATA BACKUP • Data Backup is a program of file duplication. • Importance information can be backups daily, weekly or biweekly from a hard disk. 4. FIREWALL • Hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.
  • 36. THE APPROPRIATE SECURITY MEASURES TO OVERCOME THE IDENTIFIED COMPUTER THREATS 4. FIREWALL • Hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy. • 3 types : PROXY SCREENING ROUTERS GUARD GATEWAY Simplest Somewhat Most complex complex See only add & service See full text of See full text of protocol type communication communication Screen based on Screen based on Screens based on connection rules behaviour interpretion of proxies message content
  • 37. THE APPROPRIATE SECURITY MEASURES TO OVERCOME THE IDENTIFIED COMPUTER THREATS 5. CRYPTOGRAPHY • Is a process of hiding information by altering the actual information into different representation. • Example, an APA can be written as I? X. • PLAINTEXT > Encryption > CIPHERTEXT > Decryption > PLAINTEXT
  • 38. THE APPROPRIATE SECURITY MEASURES TO OVERCOME THE IDENTIFIED COMPUTER THREATS 6. ANTI-SPYWARE • Is a program placed on a computer without the user’s knowledge. It secretly collects information about the user. • Examples popular anti-spyware programs : • Spybot Search and Destroy • Ad-aware • Spyware Blaster Security Threats Security Measures MALICIOUS CODE ANTIVIRUS AND ANTI-SPYWARE HACKING FIREWALL NATURAL DISASTER DATA BACKUP THEFT HUMAN ASPECTS HACKING FIREWALL
  • 39. APPLY THE CORRECT SECURITY PROSEDURES • Antivirus • Firewall • Anti-spyware • Data backup • Cryptography • Human aspects SECURITY THREATS SECURITY MEASURES MALICIOUS CODE ANTIVIRUS AND ANTI-SPYWARE HACKING FIREWALL NATURAL DISASTER DATA BACKUP THEFT HUMAN ASPECTS HACKING FIREWALL
  • 40. RELATIONSHIP BETWEEN SECURITY THREAT AND SECURITY MEASURE Security threats may come from in many forms. • Example: when someone is invading your account information from a trusted bank, this act is considered as a security threat. Security measures can be used to prevent this invader from getting the account information. • Example: the bank can use a firewall to prevent unauthorised access to its database. MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI- SPYWARE • Security threats include virus, Trojan horse, logic bomb, trapdoor and backdoor, and worm. • Antivirus and anti-spyware can be used to protect the computer from the threats by: • limiting connectivity • allowing only authorised media for loading data and software
  • 41. RELATIONSHIP BETWEEN SECURITY THREAT AND SECURITY MEASURE MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI- SPYWARE • Security threats include virus, Trojan horse, logic bomb, trapdoor and backdoor, and worm. • Antivirus and anti-spyware can be used to protect the computer from the threats by:  limiting connectivity  allowing only authorised media for loading data and software  enforcing mandatory access controls  blocking the virus from the computer program
  • 42. RELATIONSHIP BETWEEN SECURITY THREAT AND SECURITY MEASURE HACKING VS. FIREWALL • Hacking is an unauthorised access to the computer system done by a hacker. We can use firewall or cryptography to prevent the hacker from accessing our computers. • A firewall permits limited access to unauthorised users or any activities from the network environment. Cryptography is a process of hiding information by changing the actual information into different representation, for example, an APA can be written as 7&*.
  • 43. RELATIONSHIP BETWEEN SECURITY THREAT AND SECURITY MEASURE NATURAL DISASTER VS. DATA BACKUP • The natural and environmental disasters may include: flood, fire, earthquakes, storms , tornados • Natural disasters may threaten a computer’s hardware and software easily. Computers are also sensitive to their operating environment such as excessive heat or the inadequacy of power supply. • The backup system is needed to backup all data and applications in the computer. With the backup system, data can be recovered in case of an emergency.
  • 44. RELATIONSHIP BETWEEN SECURITY THREAT AND SECURITY MEASURE THEFT VS. HUMAN ASPECTS • Computer theft can be of two kinds: • can be used to steal money, goods, information and computer resources • the actual stealing of computers, especially notebooks and PDAs • Measures that can be taken to prevent theft:  prevent access by using locks, smart-card or password  prevent portability by restricting the hardware from being moved  detect and guard all exits and record any hardware transported
  • 45. NEXT LESSON TOPIC 2 : COMPUTER SYSTEM