Вы находитесь на странице: 1из 15

INFORMATION SYSTEMS & TECHNOLOGY

SCSD 1513

REPORT CICT VISIT

PREPARED FOR :DR. AZURAH BINTI A SAMAD


PREPARED BY :
No

Name

Matric No

IC No

1.

INTAN NURUL SYAFINAZ

A15HA0045

961011-10-6082

2.

BINTI AZMAN
NABILAH BT. SHAMSUDDIN

A15HA0096

960827-08-5590

3.

SITI NUR ATIKAH BT.

A15HA0202

960821-02-6362

4.

IBRAHIM
NIHAYATUL AZIZAH BT.

A15HA0104

960720-10-5838

5.

IMAM SYAFII
LIM YI HUI

A15HA0066

960323-07-5380

ACTIVITIES DONE DURING THE VISIT

The CICT Open Day 2015 was held on the 27th to 29th October 2015, located at
PusatTeknologiMaklumatdanKomunikasi (CICT), UniversitiTeknologi Malaysia, Johor
Bahru.Lots of activities were carried out during that 3 days programs including Microsoft
Azure workshop, Cyber Games : 1 Day Tournament which is Counter Strike and Pacman
and many more. There were even many booths and sales stall at every floor in the
building.
We attended Microsoft Azure workshop that is held on the 27th October 2015 in the
seminar room. CICT has invited one of the Microsoft staff along with some of his friends
to give a talk along with some guidance in downloading and using the latest Microsoft
Azure.
During the workshop, we were given a clear exposure to the latest feature of Microsoft
Azure. We were given instructions and guidance on how to install the software. There
was also a Q&A session at the end of the workshop. Those with doubts and questions
regarding the software had their chance to make all their doubts clear.
After the workshop, we went to a room that resembles a studio. There, we learnt about
Chroma Key tricks. A video of Chroma Key tricks were played for us. We were also
shown the green screen that is the key to the trick. We even had the chance to take our
class picture together with our lecturer.
We were all dismissed after the visit to the studio.

SUMMARY OF TOPIC 10 : PRIVACY AND SECURITY

Effective implementation of computer technology involves maximizing positive


effects while minimizing its contrast which is the negative effects. The most significant
concerns are privacy, security and ethics.
Privacy concerns the collection and also the use of data about individuals. There are
three primary privacy issues which are accuracy, property and access. Accuracy relates to
the responsibility of those who collects the data to ensure that the data collected is correct
and accurate. Property relates to who owns data and rights to software. Access relates to
the responsibility of those who have data to control and who is able to use the data.
Some federal laws governing privacy matters such as Gramm-Leach-Bliley Act that
protects personal financial information, the Health Insurance Portability and
Accountability Act (HIPAA) that protects medical records and the Family Educational
Rights and Privacy Act (FERPA) that restricts disclosure of educational records have
been created.
Computer crime is an illegal action involving special knowledge of computer
technology, taking various forms including the creation of malicious programs which
consists of viruses, worms, Trojan horses; denial of service attacks, Internet scams, theft
and data manipulation. Typically, computer criminals are either employees, outside users,
hackers, crackers, organized crime members or even terrorists.
Security is concerned with keeping hardware, software, data and programs safe from
unauthorized personnel and unforeseen events. Some preventive measures are restricting
access by using biometric scanning devices, passwords and firewalls.
Ethics are standards of moral conduct. Computer ethics are guidelines for the morally
acceptable use of computers in our society. Copyright is a legal concept that gives the
creators the right control the usage and distribution of their work. Software piracy is the
unauthorized copying and distributing of software. Plagiarism is the illegal and unethical
representation of other peoples work or idea and making it your own without
acknowledging or giving credit to the original source.
BACKGROUND OF CICT

CICT was established in the year 1975. At first theres only the Computer Centre. 6 years
later, Computer Science department was established. The original Computer Centre
combined with the Computer Science department, forming a new department known as
the Computer Science department of Faculty of Science. In 1984, it was upgraded to
Computer Science Institute. Moving on to 1991, the institute was structured into Faculty
of Computer Science & Information System and Computer Centre UTM. Finally in the
year 2014, the name CICT was given to the Computer Centre UTM.
The function of CICT to UTM is to prepare high quality infrastructure ICT
accessibility to all UTM students as well as the staffs. CICT provides and build the
information system including the applications involving the universitys Financial System
and Human Resources, Assets Management System, Documents and Management
System, new systems development and lastly, reengineering process.
CICT also provides as well as supports the need of ICT in teaching and learning
process which involves managing the E-learning portal, E-portfolio, UTMotion, UTM
Grid, technical support for Grid/Cluster and also management of students lab and
multimedia.
Providing customer service and support to all UTM staffs which includes technical
and database support is also part of CICTs function. Not only that, CICT also ensures
that all the ICT safety measures that are taken and established consists of the ICTs
management policy, identity management and also supervision of the operating systems.
CICT also manages and govern the universitys database, management of the backup
and recovery system as well as the security of the database system. It manages UTMs
data from the architecture system, data extraction, system integration and lastyly,
reporting.
Last but not least, CICT serves to expand users knowledge on ICT literation and also
its usage.

QUESTIONS ASKED AND ANSWERS RECEIVED DURING THE VISIT

1. Does CICT face system failure when there is flood?


Yes. CICT were once flooded and the flood damages most of the properties including the
computers. Repairing the damages caused by the flood consumes a large sum of money.
2.What type of security systems is used by CICT to protect students and staffs data?
Here in CICT, we keep all students and staffs data in our database system in order to
secure it from unauthorized personnel.
3. Has the CICT system been hacked before?
Yes. Our system was hacked before. In fact, the hacker has been recognized to be one of
our own student.
4. Did the UTM system in CICT ever been infected by virus? What is the solution to
the problem?
Yes but all students and staffs were provided with antivirus so there should be no problem
to overcome the virus.
5. Is there any misusing of computers in the CICT lab or cyberbullying?
Until now, theres only a few cases. Here in CICT, we have firewall security which will
detect and block any websites that are inappropriate or contain sexual elements.
6. What measures should be taken if students data happened to be lost?
CICT has backup for all students data and the backup process is always done regularly at
a specific period.
7. If there happens to be cybercrime in the usage of the system in CICT, what
actions will be taken?
Cybercrime happens most of the time. The action will be taken upon the student that
conduct the crime. Lecturer will alter the students examination marks.
8. Does CICT backup students personal information?
Yes, through a generator.
9. What are the actions taken if CICT was to receive unwanted e-mails?
Theres a program installed that will detect either the e-mails received are spams or junk.
Now, CICT uses Gmail services to ensure that no spams are received.

10. What system is used by CICT to ensure the smoothness of the system flow?
Sometimes, when there happens to be lightning, the system server will be down. When
the server is down, it will be tracked by the CICT monitoring unit. Actions will be then
taken to bring up the system server.

KNOWLEDGE AND SOFT SKILLS GAINED


From the Microsoft Azure workshop, we learnt that from the latest Windows application,
we can create blogs and even our own websites to send information through the
applications. During the workshop, videos about holographic games where played.
Windows have invented a device that implies the idea of hologram. Users can now
experience 3D effect when they are gaming just like what we saw on Iron Man movies.
From the visit to the studio, we learnt that pictures can be edited their background as
long as we follow the Chroma Key tricks. A lime green or blue backdrop must be used as
the background. Not only that, the model whose picture will be taken must not wear any
clothing that is green.
From the visit to CICT, we learnt that in order to clear our doubts, it is important to
always raise our hands and ask questions. As a student, one must always be willing to
learn new things and keep ourselves equipped with new information. The world today is
just on our fingertips. Everything now is accessible anytime, anywhere. All we need is
Internet and a smartphone. Various source of information can be obtained via online.

BENEFITS OF THE SITE VISIT


After the visit, we gained lots of experience as well as new information. We were
exposed to stuffs that we might not even know about before this. We can now explain a
little about the CICT system as we were exposed to it. We knew more information
regarding its system and also the preventive measures taken in case accidents happen.
Not only that, we even gained confidence as well as courage to raise up our hands to clear
our doubts.
We acquired communication skills when we raise our hands and ask questions as well
as during the Q&A session with the person in charge of CICT. We learnt to work as a
team when doing our presentation slides and also the report. Lastly, we learnt to manage
our time so that we will be punctual in submitting our work.

APPENDIX

Resource of Information and Contact


1. Suraya binti Ibrahim
Pegawai Teknologi Maklumat
Bahagian Infrastruktur & Keselamatan ICT
Pusat Teknologi Maklumat& Komunikasi (CIT)
Universiti Teknologi Malaysia
81310 UTM Skudai, Johor, Malaysia

Вам также может понравиться