Вы находитесь на странице: 1из 3

ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and

software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

ICTS

INTRODUCTION
1. EVOLUTION 2. USAGE IN EVERYDAY LIFE 3. COMPUTERISED VS NONCOMPUTERISED 4. IMPACT ON SOCIETY
EVOLUTION/GENERATION

COMPUTER ETHICS & LEGAL ISSUES


1. 2. 3. ETHICS VS LAW 1. INTELLECTUAL PROPERTY LAW PRIVACY AUTHENTICATION & VERIFICATION 2. CONTROVESIAL CONTENT PROCESS FILTERING COMPUTER CRIME
EDUCATION

COMPUTER SECURITY
COMPUTER SECURITY COMPUTER THREATS SECURITY MEASURES CRYPTOGRAPHY

4.
5. 6. 7.

USAGE IN EVERY DAY LIFE

Generation 1st (1940 1956)

Component Vacuum tube

Inventor & computer


ENIAC Presper Eckert & Willian Mauchly 1951: Eckert & Mauchly build the UNIVAC

Teachers use computers to research for teaching materials, participate in online forums and online conferences as well as to aid their teaching. Students use the computers as a reference tool. They use computers to browse the Internet to look for information. Researchers use computers to collect and process data. School administrators use computers for administrative purposes to make sure that the entire operation runs smoothly. Customer : Make any transactions at the 24 hour service centres or via online.These services allow them to do transaction at anytime they want. Businessmen : save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.

2nd (1956 1963) 3rd (1964 1971)

Transistor

BANKING

John Bardeen, Walter Houser Brattain 1964 : IBM


370 series were introduced

Integrated circuits(IC)

4th (1971 present)

Microprocessor

1971 : Intel create 1st microprocessor Steve Job, Bill Gates, Michael Dell

5th (present & beyond)

Artificial intelligence INTRODUCTION

Bank administrators : can oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic transfer and others by referring to the banking system. The services provides 24 hour : Automated Teller Machine (ATM) Cheque Deposit Electronic Fund Tranfer Direct Deposit Pay by phone system

COMPUTERISED VS NON-COMPUTERISED COMPUTERISED NON-COMPUTERISED All banking activities are done All banking activities were by using computer system done manually Transaction can be done Transaction can only be made anywhere and anytime during working hours It takes shorten time for any It takes long time for any banking success banking process More productive Less productive IMPACT OF ICT ON SOCIETY POSITIVE NEGATIVE Faster communication speed Low moral value : Courage people to access pornography and violence Lower communication cost Create problem such as gambling, information theft and fraud Share opinions and Can harm users if they use for information long hour frequently Information & communication can be borderless through internet.
INDUSTRY

Personal computer banking/ internet banking

Workers use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers. Researchers use computers to analyse and collect research data for future reference. Administrators use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process. Customers use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets. Suppliers use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help

E-COMMERCE

ETHICS VS LAW COMPUTER ETHICS : A system of moral standards or moral values used as a guideline for computer users. CYBER LAW : Any laws relating to protect the internet and other online communication technologies. Differences: Ethics Law As a guideline to computer user As a rule to control computer users Computers users are free to Computers users must follow follow or ignore the code of the regulations and law ethics Universal, can be applied Depend on country and state anywhere, all over the world where the crime is commited To produced ethical computer To prevent misuse of computers users Not following ethics are called Not obeying laws are called immoral crime CONTROVESIAL CONTENT is information that causes disagreement in opinions and may cause the disruption of peace because different people or culture will have different views about the contents. Pornography Slander Definition any form of media or a legal term for false and material (like books or malicious statement (meaning photographs) that depicts knowing that it is false, or erotic behaviour and is reckless disregard that it was intended to cause sexual false) about someone. - fitnah excitement.

INTELLECTUAL PROPERTY LAW : cover ideas,


inventions, literary creation, unique name, business modals, industrial processes, computer program codes and many more.

AUTHENTICATION : a process where users verifies their identity. Callback system 2 methods Biometric device (Something you are part of user;s body)

1. Patents for invention 2. trademarks for brand identity 3. design for product appearance PRIVACY : Privacy in IT refers to data and information privacy. 4. copyright for material

4 Types of Intellectual Property Protection

Ways Computer Technology Threaten Our Privacy : Cookies Privacy can be protected by: Electronic profile Privacy law Spyware Utilities software: Example: anti-spam program, firewall, anti-spyware and antivirus.

Def :a device that translates personal characterstics into a digital code that is compared with a digital code stored in the database. Fingerprint Recognition Facial Recognition Hand Geometry Scanning

COMPUTER ETHICS & LEGAL ISSUES Iris Scanning Retinal Scanning Voice Recognition Signature Verification System

COMPUTER CRIME : defined as any criminal activity that is related to the use of computers. computer fraud Def: having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers. Eg: e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields. Copyright Def: defined as a violation of the rights infringement secured by a copyright. Impact/ can lead to can develop into a Eg: you break the copyright law such as effect criminal acts such as society that disregards honesty copying ,movie, software or CDs illegally exploitation of women and truth selling pirate software and children can develop bad habit of Computer theft Def: the unauthorised use of another persons can lead to spreading untruths and property with the intention to deny the owner sexual addiction or rumours the rightful possession of that property or its perversion can lead to unnecessary use. can develop low argument transfer of payments to the moral value towards can cause people to wrong accounts other men, women or have negative attitudes tap into data transmission children towards another person lines on database at no cost can erode good divert goods to the wrong religious, cultural and destination social beliefs and Computer attack Def: any activities taken to disrupt the behaviour equipment of computer systems, change Web rating system processing control or corrupt stored data. Keyword blocking method Web sites are rated in physical attack that disrupt terms of nudity, sex, the computer facility or its transmission PROCESS OF list This method uses aFILTERING: a process that prevents or blocks access Site blocking violence and language. lines. to certain words or of banned materials on the Internet. browsers set to only an electronic attack that objectionable terms. accept pages with uses the power of electromagnetic energy Use software to list the website certain levels of ratings to overload computer circuitry. that will blocked by using software.

VERIFICATION : the act of proving or disproving the correctness of a system with respect to a certain formal specification. example 2 methods : User (something Key in the user name to identification you know) log-in to a system and the process of system will verify whether the validating the user is valid or invalid user user. Show the exam slip to verify that you are the valid candidate for the exam.

Possessed object (something you have an object) something the user has such as identification card, security token and cell phone.

show a passport before departure. the policeman will check on the drivers license to identify the valid driver employees have to swipe their security card to enter the building buy blouses at the mall using a credit card

a computer network attack that uses a malicious code to exploit a

COMPUTER SECURITY

Protecting computer systems and the information that contains against unwanted access, damage, destruction or modification

3 TYPES OF COMPUTER SECURITY Hardware security : refers to security measures used to protect the hardware specifically the computer and its related documents. Software/data security: security measures used to protect the software and the loss of data files. Network security : security measures used to protect the network system.

COMPUTER THREATS

examples
1. Malicious code

(Ancaman-ancaman terhadap komputer)

SECURITY MEASURES (langkah keselamatan) 6 types: Antivirus : program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming email files. Anti-spyware : a program placed on a computer without the users knowledge. It secretly collects information about the user. Firewall : a piece of hardware or software which functions ina networkedenvironmentto preventsome communications forbidden by the security policy. Backup : a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency. Cryptography : a process of hiding information by altering the actual information into different representation, for example, an APA can be written as I? X. Human aspects : refer to the user and also the intruder of a computer system.

precautionary measures taken toward possible danger or damage.

PC-locks, keyboard-locks, smart cards and biometric devices. activation code and serial number

A computer program that perform unauthorized processes on a computer or network.

Examples:
Norton antivirus AVG Kaspersky Bitdegender Nod32 Panda

a. Virus : a program that can pass on the malicious code to other program by modifying them.

c. Logic bomb : goes off when a specific condition occurs. It goes out & causes threats at a specific time. d. Trapdoor/backdoor : A feature in a program that allows someone to access the program with special privileges.

e. Worm : a program that copies itself and spread through the network.

Use firewall. With firewall, network resources can be protected from the outsiders.

b. Trojan horse: a program that performs a useful task while the same time carry out some secret destructive act. 2. Hacking

Spybot Search and Destroy Ad-aware Spyware Blaster

A Hacker : a person who accesses a computer or network illegally, A cracker : also someone who accesses a computer or network illegally but has to intent of destroying data, stealing information or other malicious system

unauthorized access to computer system by a hacker

3. Nature & Examples: environmental Flood threat Fire Earthquakes, storms and tornados Excessive Heat Inadequate Power Supply

Symptoms for computer infected by a virus, worm or Trojan horse : 1. screen displays unusual message or image 2. music or unusual sound plays randomly 3. available memory is less than expected 4. existing programs and files disappear 5. files become coruppted

Computer is used to steal money, goods, information and resources. 2 types Stealing of computers especially notebook & PDA

5. Theft

Вам также может понравиться