Top Banner
CHAPTER 1 INFORMATION & COMMUNICATION TECHNOLOGY AND SOCIETY
40
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 1

CHAPTER 1INFORMATION & COMMUNICATION TECHNOLOGY AND SOCIETY

Page 2: Chapter 1

DEFINITION OF ICT

ICT is the technology required for information processing, in particular, the use electronics computers, communication devices and application software convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

Page 3: Chapter 1

THE USAGE OF ICT IN EVERYDAY LIFE Education

Students use computer to research for teaching materials, participate in online forum and online conferences

Banking Customers can make any transaction at 24 hours

service centre Industry

To help in product design by using CAD (Computer Aided Design)

E-commerce To make buying and selling activities faster and

more efficient through internet.

Page 4: Chapter 1

DIFFERENCES BETWEEN COMPUTERISED & NON-COMPUTERISED SYSTEM

COMPUTERIZED NON-COMPUTERIZED

All banking activities are done by using computer system

All banking activities were done manually

Transaction can be done anywhere and

anytime

Transaction can only be made during working hours

It takes shorten time for any banking

process

It takes long time for any banking process

More productive Less productive

Page 5: Chapter 1

THE POSITIVE IMPACT OF ICT ON SOCIETY

Faster communication speed Lower communication cost People can share opinions and information

through discussion groups and forums through Internet

Paperless environment – information can be stored and retrieved through the digital medium instead of paper.

Information can communication can be borderless through Internet

Page 6: Chapter 1

THE NEGATIVE IMPACT OF ICT ON SOCIETY

Borderless information at time can be negative because courage people to access pornography and violence web sites.

Computers can harm users if they use for long hours frequently.

Page 7: Chapter 1

2.0 COMPUTER ETHICS AND LEGAL ISSUES Computer Ethics

Is a system of moral standards or moral values used as a guideline for computer users.

Code of EthicsIs a guidelines in ICT that help

determine whether a specific computer action is ethical or unethical

Intellectual PropertyIs work created by inventors,

authors and artists.

Page 8: Chapter 1

PrivacyRefers to the right of individuals and

companies to deny or restrict the collection and use of information about them

Computer crimeIs any illegal acts involving

computers Cyber Law

Is any laws relating to protect the Internet and other online communication technologies

Page 9: Chapter 1

DIFFERENCES BETWEEN ETHICS AND LAWEthics Law

As a guideline to computer users

As a rule to control computer users

Computer users are free to follow or ignore the code of ethics

Computer user must follow the regulations and law

Universal, can be applied anywhere, all over the world

Depend on country and state where the crime is committed

To produce ethical computer users

To prevent misuse of computers

No following ethics are called immoral

No obeying laws are call crime

Page 10: Chapter 1

INTELLECTUAL PROPERTY LAWS

Intellectual Property laws cover ideas, inventions, literary creations, unique names, business modals, industrial processes, computer program codes and many more.

Four types of Intellectual Property are:Patents for inventionsTrademarks for brand identityDesign for product appearanceCopyright for materials

Page 11: Chapter 1

CONTROVERSIAL CONTENTS AND CONTROL

Pornography Slander

Page 12: Chapter 1

CONTROVERSIAL CONTENTS AND CONTROL

PornographyPornography is any form of media or

material that show erotic behavior and intended to cause sexual excitement. The effects of pornography on society are:Can lead to criminal acts such as exploitation of women.

Can lead sexual addiction can develop lower moral values towards other people

Can erode good religious, cultural, behaviors and beliefs

Page 13: Chapter 1

Slander Slander is a false spoken statement about

someone, intended to damage his or her reputation. The effects of slander on society are:Can develop society that disregards on honesty and truth

Can lead to bad habits of spreading rumors and untruth

Can cause people to have negative attitudes towards another person

Page 14: Chapter 1

TOPICS THAT WE WILL LEARN FOR TODAY

The process of filteringCyber law

Page 15: Chapter 1

THE PROCESS OF FILTERING

To control access to controversial contents. The method of choice to limit access on the

Internet is to filter either by: Keyword blocking Site blocking Web rating system

Page 16: Chapter 1

KEYWORD BLOCKING

This method uses a list of banned word or object terms such as xxx, sex and nude. As the page is downloading, the filter searches for any these words. If found, it will blocked the page completely, stop downloading the page, block the banned words and even shut down the browser.

Page 17: Chapter 1

SITE BLOCKING

This method use software to list the web sites that will be blocked by using software. The software also prevents user from being access the web site on list.

Page 18: Chapter 1

WEB RATING SYSTEM

Web sites are rating in terms of nudity, sex, violence and language. The web sites rates can be done by setting the browser to only accept pages with certain level of ratings.

Page 19: Chapter 1

CYBER LAW

Cyber law is any laws relating to protect the Internet and other online communication technologies.

Examples of cyber abuse on the users: Sending a computer virus via e-mail Harassment through e-mail Hacking into your school’s database to change

your examination result Why we need cyber law:

Cyber law are made to force people to be good To give protection against the misuse of

computers and computer criminal activities

Page 20: Chapter 1

Malaysian Cyber Law Computer Crime Act 1997 Copyright (Amendment) Bill 1997 Digital Signature Act 1997 Telemedicine Bill 1997 Communication and Multimedia Act 1998 Digital Signature Regulations 1998

Page 21: Chapter 1

COMPUTER CRIME

1. Computer Fraud2. Copyright Infringement3. Theft4. Attacks

Page 22: Chapter 1

COMPUTER FRAUD

Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of computers. There are many forms of computer frauds which include E-mail hoaxes (hoax – an attempt to make

people believe something that is not true) Program fraud Investment scheme Sales promotions Claim of expertise on certain fields

Page 23: Chapter 1

COPYRIGHT INFRINGEMENT

Copyright infringement is defined as a violation (an action to break the law) of the rights secured by a copyright. Copyright is the legal right to be the only producer or seller of a book, song and film.

Infringement of copyright occurs when you break the copyright law such as copying movie, software or CD’s illegally – selling pirate software.

Piracy is the crime of illegally copying and selling books, tapes, videos, computer programs.

Page 24: Chapter 1

COMPUTER THEFT

Computer theft is defined as the unauthorized used of another person’s property. Example of computer theft are Transfer of payment to the wrong accounts Get online material with no cost Tap(memasuki) into data transmission line

Page 25: Chapter 1

COMPUTER ATTACKS

Computer attack is defined as any activities taken to disrupt the equipments computer systems, change processing controls and corrupt data.

Computer attack can be in the forms of: Physical attack An electronic attack A computer network attck

Page 26: Chapter 1

COMPUTER SECURITY

Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification.

Computer security: Computer threats Security measures

Page 27: Chapter 1

COMPUTER THREATS

Malicious code Hacking Natural disaster Theft

Page 28: Chapter 1

MALICIOUS CODE Malicious code is a computer program that

perform unauthorised processes on a computer or network. There are various kinds of malicious code.VirusWormLogic bomb : Malicious code that goes off

when a specific condition occurs. Example: time bomb.

Trapdoor and backdoor : A feature in a program that allows someone to access the program with special privileges.

Trojan horse: program that performs a useful task while the same time carry out some secret destructive act.

Page 29: Chapter 1

DIFFERENCES BETWEEN WORM & VIRUS

WORM VIRUSOperates through the network

Spreads through any medium

Spread copies of itself as a stand alone program

Spread copies of itself as a program that attaches to other program

Page 30: Chapter 1

A COMPUTER INFECTED BY A VIRUS, WORM OR TROJAN HORSE OFTEN HAS ONE OR MORE OF THE FOLLOWING SYMPTOMS:

Screen displays unusual message or image Music or unusual sound plays randomly Available memory is less than expected Existing programs and files disappear Files become corrupted

Page 31: Chapter 1

HACKING

Hacking refer to unauthorized access to the computer system by a hacker.

A hacker is a person who accesses a computer or network illegally.

A cracker also is someone who accesses a computer or network illegally but has no intent of destroying data, stealing information, or other malicious action.

Both hacker and cracker have advanced computer and network skills.

Page 32: Chapter 1

NATURE THREATS

Computer are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles.

Examples of natural and environmental disasters are flood, fire, earthquakes, storms, tornados, excessive heat and inadequate power.

Page 33: Chapter 1

THEFT Two type of theft

(a) Computer is used to steal money, goods, information and resources.

(b) Stealing of computers especially notebook and PDA.

Three approaches to prevent theft:(a) Prevent access by using locks, smart card

or password.(b) Prevent portability by restricting the

hardware from being moved.(c) Detect and guard all exits and record any

hardware.

Page 34: Chapter 1

SECURITY MEASURES

Security measures are measures taken as a precaution against theft or espionage or sabotage or possible danger or failure. Usually we use antivirus, cryptography, firewall and data backup to protect sensitive information.

Security procedures: Anti-virus Anti-spyware Firewall Backup Cryptography

Page 35: Chapter 1

ANTI-VIRUS

Anti-virus is utility program that we use to protect a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage or incoming e-mails files.

Examples: Norton antivirus, AVG, Kaspersky, Bitdefender and Nod32.

Page 36: Chapter 1

ANTI-SPYWARE

Anti-spyware is a utility program that we use to protect the computers from spyware.

Spyware is software or computer program that is designed secretly record and report an individual’s activities on the Internet. Spyware usually enters your system through the Internet, sometimes when you open e-mail or download software especially shareware and freeware.

Examples : Spybot Search and Destroy, Ad-aware and Spyware Blaster.

Page 37: Chapter 1

FIREWALL

Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by security policy.

We use firewall to prevent hacking

Page 38: Chapter 1

BACKUP

Backup is utility program that makes a copy of all files or selected files that have been saved onto a disk.

Backup data is important when original data is corrupted.

Page 39: Chapter 1

CRYPTOGRAPHY Cryptography is a process of transforming

plaintext into ciphertext then back again. Encryption is a process of converting

plaintext into ciphertext. Decryption is the process of converting

ciphertext into plaintext. We use cryptography to secure the

information and prevent hacking or unauthorized access.

Cipher = secret language Plaintext Ciphertext

Plaintext Ciphertext

encrypt

decrypt

Page 40: Chapter 1

HUMAN ASPECT

Refer to the user and also the intruder of a computer system. Human aspect security is the hardest aspects to give protection to. The most common problem of human aspect security is the lack of achieving a good information security procedure.