Académique Documents
Professionnel Documents
Culture Documents
What is ICT?
O ICT is the technology required for information processing, in particular, the
use of electronic computers, communication devices and software
applications to convert, store, protect, process, transmit and retrieve
information from anywhere, anytime.
A.) Information
o Information refers to the knowledge obtained from reading,
investigation, study or research.
o The tools to transmit information are the telephone, television and
radio.
o We need information to make decisions and to predict the future. For
example, scientists can detect the formation of a tsunami using the
latest technology and warn the public to avoid disasters in the affected
areas.
o Information is knowledge and helps us to fulfill our daily tasks. For
example, forecasting the stock exchange market.
B.) Communication
o Is an act of transmitting messages. It is a process whereby
information is exchanged between individuals using symbols, signs or
verbal interactions.
o Previously, people communicated through sign or symbols,
performing drama and poetry. With the advent of technology, these
older forms of communication are less utilized as compared to the
use of the internet, e-mail or video conferencing.
C.) Technology
o Is the use of scientific knowledge, experience and resources to
create processes and product that fulfill human needs.
o Aiding Communication - telephone and fax machines are the devices
used in extending communication
o Spreading Information To broadcast information such as news or
weather reports effectively. Radio, television, satellites and the World
Wide Web (www) are powerful tools that can be used.
YEAR CREATION
3500 BC Sumerians developed cuneiform writing
Before the era of computer begins, counting machine was invented to help
people with business industry. The usage of counting machine, begin as
early as 200 B.C. Evolution of computers can be traced at 7 stages:
Year Invention
1. Presper Eckert and William Mauchly built the ENIAC (Electronic Numerical
Integrator and Computer) in 1946.
2. ENIAC use vacuum tubes rather than mechanical switches in Mark 1.
3. In 1951, Eckert and Machly build UNIVAC (Universal automatic computer)
which can calculate at the rate of 10 thousand additions per second.
a) Vacuum tube an electronic tube about the size of light bulbs. It was used
as the internal computer components. Thousands of them were used.
e) Faster
f) More reliable
1. IBM 370 series were introduced in 1964. It came in several models and
sizes. It is used for business and scientific programs.
2. Other computer models introduced were CDC 7600, BZ 500.
3. New hardware technology:
a) Silicone chip were manufactured in 1961 at the silicone valley.
5 Form 4 Lesson Notes Part 1 ICT & Society
b) Integrated circuit technology, which had reduced the size and cost of
computers. It is a complete electronic circuit or a small chip of silicone which
is also known as semiconductor.
c) The magnetic core memory was replaced by microchip. (The first 253 bit
Ram, basis for the development of the 1K bit Ram).
4. Advantages:
a) Silicone chips were reliable, compact and cheaper.
b) Sold hardware and software separately which created the software
industry.
c) Customer service industry flourished (reservation and credit checks)
5. Software technology:
a) More sophisticated
1. Super Computers
- Fastest, most powerful, most expensive.
- Used in applications such as sending astronauts into space, testing
safety and aerodynamic features on cars and aircraft, controlling
missile guidance systems, and weather forecasting which required
extreme accuracy and immense speed to perform the complex
calculation.
2. Mainframe computers
- Large, expensive, powerful computer that can handle hundreds or
thousands of connected user simultaneously.
- Used in large organization to handle high volume processing of
business transactions and routine paperwork.
3. Mini computer
- Medium sized computer
- Usually used as servers, with several PCs or other devices networked
to access the midrange computers resources.
4. Personal computers
- Small computer system, designed to be used by one person at a time.
- Widely used in small and large businesses. Examples: tracking
merchandise, billing customer, manage company accounts.
5. Mobile computers personal computer that you can carry from place to
place
6. Expert system teleconferencing, speech recognition system
LESSON THREE: USAGE OF ICT IN DAILY LIFE
Computer plays major roles in our daily lives. We need computers to assists
us in completing various tasks and jobs.
Among the sector where ICT is used widely are:
- education
- banking
- industry
- business
A.) Education
1. Today, most schools and higher education institution have computer in the
classroom for teachers and students.
2. Computer is used in the sector of education because they can offer
a) Enhanced learning
b) Cognitive development
c) Interactive experiences
3. User who benefits are
a) Teacher Teacher uses computers to research for teaching materials,
participate in online forums and online conferences as well as to aid their
teaching.
b) Students Students use the computers as a reference tool. They use
computers to browse the internet to look for information
c) Researchers Researchers use computers to collect and process data.
d) School administrators They use computers for administrative purposes
to make sure that the entire operation runs smoothly.
B.) Banking
1. The computer is the nerve centre of the banking system around the world. It
functions to control the entire banking system that also includes Electronic
Banking Services.
b) Business men Businessmen can save their time by using the online
services offered by banks. They can access company accounts for loan
applications, business transactions and update on their cash flow at anytime
c.) Bank administrators Bank administrators can oversee the entire banking
activities such as reconciliations, inter-branch transaction (IBT), telegraphic
transfer and others by referring to the banking system
C.) Industry
D.) E-commerce
Job opportunities that are related to ICT such as computer engineers, graphic
designer, software engineers and programmer offer more technical skill and
knowledge
- Government
To forecast weather, process immigrant
- Healthcare
- Home
Computers are use for record keeping, writing letters, preparing budget and
communicating with others
- Law enforcement
In maintaining national fingerprints floes, modeling DNA and others
information
- Transportation
In rapid transit system and tracking railway system
- Travel
Computers are use to do room reservation. It helps tourists to plan their
holiday well
LESSON FOUR: COMPUTERIZED AND NON-COMPUTERIZED SYSTEM
Computer System
o A system is an arrangement of elements that when it is put together it
becomes an organized and established procedure. (In Latin-Greek, the term
system means to combine, to set up, to place together)
o
A system typically consists of components connected together in order to
facilitate the flow of information, matter or energy.
o A computer system consists of a set of hardware and software which
processes data in a meaningful way.
A.) Education
ICT development has changed every aspect of the human society. It has
affected our life in many ways.
2. With the internet we do not have to pay for any basic services provided by
the Internet. Furthermore, the cost of connection to the internet is relatively
cheap.
1. ICT technology has created the term paperless environment. This term means
information can be stored and retrieved through the digital medium instead
of paper. Online communication via email, online chat and instant messages
also helps in creating the paperless environment.
In computing, ethics are the moral guidelines to referred to when using the
computer and computer networks.
Ethics Law
Guidelines - as a Control - as a rule to control computer
guidelines to computer users.
users
Judicial Standards - law is judge by
Moral standards - ethical judicial standards.
behavior is judge by moral
standards Must follow - computers user must
follow the regulations and law.
Free to follow - computer
users are free to follow or Penalties, imprisonments and
ignore the code ethics. other punishments - penalties,
imprisonments and other
No punishments - no punishments for those who break the
punishment for anyone
who violates ethics.
law.
Universals - Universals
Depends on country - depends on
can be applied anywhere,
country and state where the crime is
all over the world.
committed
Produce ethical
Prevent misusing of computers -
computer users - to
to prevent misuse of computers
produce ethical computer
users.
Crime - not honoring the law means
committing a crime.
Immoral - not honoring
computer ethics means
ignoring the moral
elements (immoral)
1. The United States Institute of Computer Ethics has come out with the Ten
Commandments of Computer Ethics.
2. These principles consider the effective code of conducts for the proper use
of information technology.
vi. You shall not copy or use proprietary software for which you have not
paid.
vii. You shall not use other peoples computer resources without
authorization or proper compensation.
viii. You shall not appropriate other peoples intellectual output.
ix. You shall think about the social consequences of the program you are
writing or the system you are designing.
x. You shall always use a computer in ways that ensure consideration and
respect for your fellow humans
1. Have you copied materials from the internet and claims that it is your own
and submit them as an assignment? If you have, you are reaching the
computer code of conducts. In other word, you are breaking the law of
intellectual property by stealing someone elses idea. Intellectual property
refers to any products of human intellect that is unique and has a value in
the market place. This covers ideas, inventions, unique names, computer
program codes and many more.
Summary
1. Ethics refers to a standard of moral guideline that is used to determine
proper behavior.
2. There are two codes of conducts that can be referred to which are the Ten
Commandments of Computer Ethics by the United States Institute of
Computer Ethics and the e-mails and Internet guidelines by the Department
of Public Services of Malaysia.
2. Law differs from one country to another. In the era of technology, computer
law is needed to clarify goods or actions that fall under the computer law.
Computer law refers to all areas in law that requires an understanding of
computer technology such as hardware, software and Internet.
1. Respecting Ownership
3. Respecting property
Property here means ownership. Since an individual data and information are
considered as property, therefore, an act of tampering and changing
electronic information is considered as vandalism and disrespect for other
peoples property.
D.) Similarities between Ethics and Law
1. Both ethics and law are complimentary to each other and are made
a. to guide user from misusing computers
b. to create a healthy computer society, so that computers are used to
contribute to a better life.
c to prevent any crime.
Ethics Law
1. Guideline 1. Control
As a guideline to computer users As a rule to control computer
users.
2. Moral standard 2. Judicial standard
Ethical behavior is judged by Law is judged by judicial standards
moral standard.
3. Free to follow 3. Must follow
Computer users are free to follow Computer users must follow the
or ignore the code of ethics regulations and law
4. No punishments 4. Penalties, imprisonments and
No punishments for anyone who other punishments. Penalties,
violates ethics
imprisonments and other
punishments for those who break
the law.
5. Universal 5. Depends on country
Universal, can be applied Depends on country and state
anywhere, all over the world where the crime is committed.
6. Produce ethical computer user 6. Prevent misusing of computers
To produce ethical computer users To prevent misuse of computers
7. Immoral 7. Crime
Not honoring the law means
Not honoring computer ethics committing a crime
means ignoring the moral
elements (immoral).
Summary
2. In our daily lives, we are surrounded by things that are protected by IP.
Your school bags, your shoes and even your socks are protected by
Intellectual Property Rights. Nike, Bata or Adidas, for example, are all
protected by a group of legal rights.
3. Example of creation that are covered under the Intellectual Property Law
include architectural, audio visual, sound recording, Literary, musical and
sculptural.
Summary
1. Intellectual Property (IP) refers to work created by investors, authors and
artists.
2. Intellectual Property Rights are rights to which creators are entitled to for
their inventions, writings and works of art.
a. Cookies
o are used to identify users by web casting, e-commerce and other web
applications.
o contain user information and are saved in the computer hard disk.
o are used by some websites to store passwords and track how regularly we
visit a website, thats how we become potential targets for web advertisers.
o enable web sites to collect information about your online activities and
store them for future use, then the collected details will be sold to any
company that requests for it.
b. Electronic profile
o electronic profile is the combining of data in a database that can be sold to
the Internet by the company to the interested parties.
o this database is in a form such as magazine subscription or product
warranty cards that had been filled by online subscribers.
o the information in electronic profile includes personal details such as your
age, address and marital status.
c. Spyware
o refers to a program that collects user information without users
knowledge.
o can enter computers, sneaking in like a virus.
o is a result of installing new programs.
o Communicates information it collects to some outside source while we are
online.
4. We do not want our private lives and habits exposed to third parties.
1. Privacy law
2. Utilities software
1. Privacy in IT refers to data and information privacy and the right of individuals
and companies to restrict the collection and use of information to others.
2. There are three ways computes technology can threaten our privacy:
a. Cookies
b. electronic profile
c. spyware
3. Privacy can be protected by privacy law and utilities software
Identification:
Verification:
Not
Verify the Valid
validity of the (F)
ID
VALID
(T)
Identification:
Access
-present what the user is (e.g. Denied
biometrics)
Authenticatio
n: FALSE
Authenticate
who the user is
TRU
E
Access Granted
LESSON TEN: AUTHENTICATIONS
1. Authentication is a process where users verify that they are who they say
they are. The user who attempts to perform functions in a system is in fact
the user who is authorized to do so.
2. For example, when you use an ATM card, the machine will verify the
validation of the card. Then, the machine will request for a pin number.
This is where the authentication takes place.
o Iris scanning analyses the features that exist in the coloured tissues
surrounding the pupil which has more than 200 points that can be used for
comparison, including rings, furrows and freckles.
o The scans use a regular video camera and can be done from further away
than a retina scan.
o It will work perfectly fine through glasses and in fact has the ability to
create an accurate enough measurement that it can be used for
identification purposes.
o The accuracy of this method is excellent while the cost involved is high.
o Retina biometrics involves the scanning of retina and analyzing the layer of
blood vessels at the back of the eye.
o Retina scanning involves using a low intensity light source and an optical
coupler and can read the patterns at a great level of accuracy.
o Retina scanning requires the user to remove glasses, place their eye close
to the device and focus on a certain point.
o Whether the accuracy can overweight the public discomfort is yet to be
seen.
o The accuracy in retina scanning is very good and the cost involves is fair.
o The callback system is commonly used in the bank operation and business
transaction.
o For example, when you book for the taxi services, the operator will ask you
to hang up and she will call you back to confirm for the service required.
Summary
1. Authentication is a process where users verify that they are who they say
they are.
2. There are 2 commonly used authentication methods, which are biometric
device and callback system.
3. Biometric device is a device that translates personal characteristics into a
digital code that is compared with a digital code stored in the database.
4. Callback system refers to the checking system that authenticates the user
5. Authentication is important in order to safeguard against the unauthorized
access and use.
A.)What is verification?
1. There are two methods, commonly used in verification, which are user
identification and processed object.
2. User identification refers to the process of validating the user.
3. Processed object refers to something the user has such as identification
card, security token and cell phone.
Summary
1. Verification is the act of proving or disproving the correctness of a system
with respect to a certain formal specifications.
2. Two methods commonly used in verification are user identification and
processed object.
3. User identification refers to the process of validating the user. Processed
objects refer to something the user has such as identification card, security
token, key, badge and cell phone.
C.) Pornography
D.) Slander
o Slander is a legal term for false and malicious statement (meaning knowing
that it is false or reckless disregard that it was false) about someone.
Examples:
You wrote an e-mail that a fellow classmate was having an affair with a
teacher, even though it was not true. You then sent it to five other friends.
Ahmad is a Muslim. One day, he received a spam e-mail stating that his
favourite soda drink Soda Moda uses non-halal food colouring, but he does
not know if the source of the content is credible or true. He decides to
forward the e-mail to 50 of his friends.
What can you conclude about the impact of controversial content on the
Kenyan society?
Pornography
Slander
INTERNET FILTERING
It is our responsibility to ensure that the teenagers are protected from these
corruptions of the mind by filtering access to the Internet. Internet filtering is
a process that prevents or blocks access to certain materials on the Internet.
It is our responsibility to ensure that the teenagers are protected from these
corruptions of the mind by filtering access to the Internet.
What is Internet filtering?
keyword blocking
site blocking
web rating systems
These methods require software to be installed at a client of server level.
KEYWORD BLOCKING
One of the strategies is by using the keyword blocking method. This method
uses a list of banned words or objectionable terms.
As the page is downloading, the filter searches for any of these words. If the
word is found, it will block the page completely, stop downloading the page,
block the banned words and even shut down the browser.
SITE BLOCKING
CYBER LAW
Intellectual Property
Legal Status of Online
Rights
Transactions
Privacy and
Confidentially
of Information
o These concerns and issues clearly indicate why Cyber Laws are needed in
online activities.
The Core Group of Experts has held five meetings; the first meeting was held
in Courmayeur, Italy, on 29 and 30 November 2007; and the other five
meetings were held in Vienna, Austria, on 2 and 3 June 2008; 20 to 22
January 2009 and most recently, 6-8 December 2010. The latter meeting
included the input of a wider group of new experts co-opted into the group,
including yours truly, who presented his assessment of identity-related crime
in East Africa in General and East Africa in particular.
East Africa has a union of five countries Burundi, Kenya, Rwanda, Tanzania
and Uganda. The East African Community (EAC) is the regional
intergovernmental organisation of the East African Union. The Treaty for
Establishment of the East African Community was signed on 30 November
1999 and entered into force on 7 July 2000 following its ratification by the
original three Partner States Kenya, Uganda and Tanzania. The Republic of
Rwanda and the Republic of Burundi acceded to the EAC Treaty on 18 June
2007 and became full Members of the Community with effect from 1 July
2007.
Progressively, the East African Region is moving towards political, social and
economic integration: it established a Customs Union in 2005, a Common
Market in 2010; a Monetary Union remains an imminent possibility by 2012
and ultimately a Political Federation of the East African States.
The Union has a combined population of more than 125 million people, a
land area of 1.82 million sq kilometers and a combined Gross Domestic
Product of $73 billion (2009). Kenya, Tanzania and Uganda have the highest
populations with each country exceeding 30 million (40 million for Kenya)
and Burundi and Rwanda having 9 and 10 million respectively.
Kenya, Tanzania and Uganda share a similar legal system/tradition. They are
all former colonies of Britain and their laws are largely descended from the
English Common law. Burundi and Rwanda, on the other hand, are former
colonies of Belgium and France and they both have civil law legal systems.
Generally, just like many other regions in the world, East Africa has its share
of identity related crimes, ranging from the serious and transnational to the
minor and localized offences. Money laundering and human trafficking
remains a major concern for both East Africas governments and its
international partners. New patterns of criminal activities have emerged in
the last decade due to the widespread availability and use of the mobile
phone and to a limited extent, the internet. This, among other things, have
prompted the EA countries to move towards enacting cyberlaws that define
computer and identity-related offences, including some related to identity.
However, even though the Union has adopted a general agreement of
principles on Cyberlaw and individual country commitments to the
enactment of new laws, the pace and flavour of the implementation has
hardly been uniform.
International Law
From the records of the United Nations, the following is the status of the EA
countries with respect to four major international instruments concerned
with cyber crime and identity related crime:
United Nations Convention against Transnational Organized Crime and the
Protocols thereto Kenya has signed and acceded; Tanzania & Rwanda have
ratified; Burundi and Uganda have signed
United Nations Convention against Corruption Burundi has acceded; all
the other EA states have ratified.
Council of Europe Convention on Cybercrime South Africa has for a long
time been the only African country to accede to the Convention, though to
be fair to other countries, this being by definition a European regional
convention, it has served only as a model for many non-European countries
and the failure to accede to it is not necessarily a reflection of a countrys
attitude towards combating cybercrime.
UNCITRAL Model Law on Electronic Commerce This model law has been
the touchstone of principles and practices for many countries, including East
African countries, in the formulation of cyberlaw legislation.
Municipal Law
Because of their common English descent, most of the Constitutional,
criminal and procedural laws of three of the East African countries Kenya,
Tanzania & Uganda - are similar. On August 27, Kenya promulgated a new
Constitution which replaced the old Constitution negotiated by the countrys
founding fathers with the former English colonialists in the 1960s. In the
three countries, with the new Constitution of Kenya being the recent
exception, the right to privacy has not been expressly legislated as a
constitutional or statutory right. Rather, it has been expressed as a broad
constitutional norm encompassed in the freedom from unlawful entry into
ones premises, the search and seizure of ones property and effects and
freedom from interference with ones correspondence. As a corollary, there
has been no express constitutional right to confidentiality and the protection
of personal information. The practice on the right to privacy and
confidentiality has been guided by the English Common law as applied
through judicial opinions.
The East African Cyberlaw Framework was an initiative of the East African
Community with the support of UNCTAD, to develop a general framework on
legislative approaches to cyberlaw. The framework was adopted in June
2010. It seeks to promote regional harmonisation in the legal response to the
challenges raised by the increasing use and reliance on ICTs for commercial
and administrative activities and outlines agreed features to be transposed
into national legislation in order to address the various issues identified in
respect of: Electronic transactions, electronic signature and authentication,
data protection and privacy, consumer protection and computer crime.
The application of data protection rules may be limited only to private sector
entities or public bodies. A sectoral regulatory response may be appropriate
to address specific uses and abuses of personal data, whether driven by
domestic or foreign concerns, such as the financial services sector.
In terms of the entity responsible for the processing, the following minimum
obligations represent international best practice in the area:
To supply the individual with a copy of any personal data being held and
processed and provide an opportunity for incorrect data to be amended.
The cost of regulation will be a critical factor in data protection. The cost
associated with a comprehensive or omnibus approach, specifically the
establishment of a dedicated regulatory authority, will generally be
excessive for most developing countries, especially if borne by the private
sector through licensing or notification fees. However, in terms of addressing
privacy concerns vis--vis public sector infringements, an authority
independent from government will generally be necessary in order to provide
the necessary trust and assurance in its activities. The regulatory authority
may not have an exclusively data protection remit, which mitigates the costs
involved.
The Task Force recognises the critical importance of data protection and
privacy and recommends that further work needs to be carried out on this
issue, to ensure that (a) the privacy of citizens is not eroded through the
Internet; (b) that legislation providing for access to official information is
appropriately taken into account; (c) the institutional implications of such
reforms and (d) to take into account fully international best practice in the
area.
With the widespread use of the mobile telephone in East Africa, (for
example, over half of the Kenyan population has access to a mobile phone),
a new pattern of offences began to emerge.
o Kidnappings with the kidnappers using the convenience of the mobile
phone to get in touch with the victims family and make a ransom demand
o Hoax promotions/raffles where a subscriber is called by a person
purporting to be from a mobile service provider or a company running a
promotion and informed that they have won a prize in a draw and in order
for them to collect their money they need to pay via mobile money transfer
an administrative charge
o Or being falsely advised to dial a certain code ostensibly to register but the
effect of dialing that code transfers airtime to the criminals number
o A number of these crimes were being committed by convicts who had
unathorised access to mobile phones while in custody.
In July 2009, Kenyas President Mwai Kibaki directed the Ministry of
Information and Communication to establish a databank of all mobile
telephone subscribers. The directive was preceded by the Presidents
concern over a reported increase in phone-related crime.
These crime statistics published by the Kenya Police for various types of
crime between 2006 and 2008 are presumably (because the report does not
say so) reports of crime incidents recorded at police stations throughout the
country and not necessarily actual convictions for the crimes.
The categories of crimes included in the table above are those that are
related to identity crime. Though I have included them in the table, it is not
clear from the statistics what ranges of crimes are covered by the
expressions other offences against persons or other Penal Code offences.
Even far from the immediate loss and damage suffered that is the
consequence of the direct consequence of identity crimes on the part of the
victim, there are other challenges for victims of such crimes that relate to
access to legal aid and justice:
Because identity crime is not sufficiently mapped or studied by law
enforcement, there is inadequate information for both potential victims and
victims on how to avoid and mitigate the effects of such offences.
Inadequate legal framework While laws on certain aspects of identity
related crime are lacking or insufficient, existing laws focus mostly on the
punishment of the criminal and less on regulating the collection and
management of personal information.
The subject of the technical measures and minimum compliance standards
for protecting information, communications and commercial systems not
captured in legislation
East Africas governments have been challenged that they have not fully
complied with the minimum standards for the elimination of identity related
transnational crimes human trafficking, money laundering, economic fraud,
organized crime/terrorism.
Poor crime reporting and crime mapping. Though prosecutions for identity
related crimes are conducted, data on such cases is not compiled at the
provincial or national level, and any data compiled is not readily available to
the public.
Poor access to legal aid:
Poor victim access to knowledge on basic laws, prevention and self-help
High cost of professional legal aid
Poor forensic and prosecutorial knowledge and skills on the part of law
enforcement
Difficulties of jurisdiction and mutual-legal assistance in dealing with
transnational crimes
The following scenario extracted from the U.S. State Department Trafficking
in Persons Report, June 200 is illustrative of the plight of victims of identity-
related crimes:
Police reportedly arrested foreign trafficking victims for being in [the
country] without valid identity documents; in most cases, they pled guilty to
immigration violations and were quickly deported. The government did not
provide legal alternatives to the removal of victims to countries where they
would face hardship or retribution.
i. The computer crimes Act 1997 gives protection against the misuses of
computers and computer criminal activities such as criminal activities
unauthorized use of program, illegal transmission of data or messages
over computers and hacking and cracking of computer systems and
networks.
ii. By implementing Computer Crimes Act 1997 users can protect their rights
to privacy and build trust in the computer system. At the same time, the
government can have control at a certain level over the Cyber Space to
reduce Cyber Crime activities.
i. The Telemedicine Act 1997 ensures that only qualified medical practitioners
can practice the telemedicine and that their patients rights and interest are
protected.
ii. These acts provide the environment for the future development and
delivery of healthcare in Malaysia.
d. Communications and Multimedia Act 1998
i. The implementation of Communication and Telecommunication 1998
ensures that information is secure, the network is reliable and the service is
affordable all over Malaysia.
ii. This act also ensures high level of users confidence in the information and
communication technology industry.
o Besides these Cyber Laws, there are three other Cyber Laws being drafted
i. Private Data Protection Bill
ii. Electronic Government Activities Bill
iii. Electronic Transactions Bill
iv. Security Protection Bill
Summary
1. Cyber law refers to any laws relating to protecting the Internet and other
online communication technologies.
COMPUTER CRIMES
1. A computer crime is defined as any criminal activity that is related to the
use of computers.
2. Any illegal act involving a computer is referred as a computer crime.
3. These activities include computer fraud, copyright infringement, and
computer theft and computer attack.
A. COMPUTER FRAUD
2. There are many forms of computer fraud which include e-mail hoaxes,
program fraud, investment schemes, sales promotion, and claims of
expertise on certain field, health frauds, scams and hacking.
B. COPYRIGHT INFRINGEMENT
C. COMPUTER THEFT
1. Computer Theft is defined as the unauthorized use of another persons
property with the intention to deny the owner the rightful possession of that
property or its use.
D. COMPUTER ATTACK
2. It is very hard to trace the authors of cyber threats. Therefore, the school
authority will not know whether a virus entered their system from someones
e-mail or is generated by school hackers.
SUMMARY
1. Computer crime is any criminal activity that is related to the use of computers
such as fraud, copyright infringement, and theft and computer attack.
3. We do not want strangers to read our email, use our computer to attack other
systems, send forged e-mail from our computer, or examine personal
information stored on our computer such as financial statements.
HARDWARE SECURITY
1. Hardware security refers to security measures used to protect the
hardware specifically the computer and its related documents.
2. The examples of security measures used to protect the hardware include
PC-locks, keyboard-lock, smart cards and biometric devices.
3. Besides these Cyber Laws, there are three other Cyber Laws being drafted
NETWORK SECURITY
1. The transfer of data through network has become a common practice and
the need to implement network security has become significant.
2. Network security refers to security measures used to protect the network
system.
3. One example of network security measures is firewall. With firewall,
network resources can be protected from the outsiders.
In order to make sure our computers are secured, here are the computers
security checklists to follow.
a) Do not eat, drink or smoke near the computer.
b) Do not place the computer near open windows or doors.
c) Do not subject the computer to extreme temperatures.
d) Clean the equipment regularly.
e) Place a cable lock on the computer.
f) Use a surge protector.
g) Store disks properly in a lock container.
h) Maintain backup copies of all files.
i) Stores copies of critical files off sites.
j) Scan a floppy disk before you open it.
k) Do not open any unknown email received.
SUMMARY
A. MALICIOUS CODE
1. Malicious code is also known as a rouge program. It is a threat to
computing assets by causing undesired effects in the programmers part.
The effect is caused by an agent, with the intention to cause damage.
2. The agent for malicious code is the writer of the code or any person who
causes its distributions.
3. There are various kinds of malicious code. They include
Virus
Virus is a program that can pass on the malicious code to other
non-infected programs by modifying them.
To infect a computer, the virus needs to attaches itself to the program,
usually files with .doc (document), .xls (spreadsheet), .exe (executable
file) extensions.
It will then destroy or co-exists with the program.
Once the infected file is open; the virus will copy itself into that
particular system and perform its functions.
Eventually, it can overtake the entire computing system and spread to
other connected systems.
Trojan horse
A program which can perform useful but unexpected actions.
Must be installed by users or intruders before it can affect the systems
assets
An example of a Trojan horse is the login script that request for users
login ID and password.
The user will then successfully pass the login process, but the Trojan
horse will keep a copy of the information to be use for malicious
purposes.
Logic bomb
Logic bomb is a malicious code that goes off when a specific condition
occurs.
An example of a logic bomb is the time bomb. It goes off and causes
threats at a specified time or date.
Trapdoor or backdoor
A feature in a program that allows someone to access the program and
use it with special privileges.
Worm
A program that copies and spreads itself through a network.
Worm Operates through the network While Virus Spreads through any
medium. (Usually copied programs or data files)
Worm Spreads copies of itself as a standalone program While Virus
Spread copies of itself as a program that attaches to other program.
B. HACKER
2. Hackers are persons who learn about the computer systems in detail. They
wrote program referred to as hacks. Hackers may use a modem or cable to
hack the targeted computers.
3. Kevin Mitnick is the most notorious hacker ever caught. He had stolen
millions of dollars worth of software and credit card information on the net.
He used new identities and cleverly concealed his locations. He spent 5 years
in jail for his hacking activity.
D. THEFT
SUMMARY
B.) Cryptography
C.) Antivirus
3. Identifying virus:
Two techniques are use to identify the virus:
a) Virus signature also called a virus definition. It is a specific
pattern of the virus code.
4. An Antivirus program scans for programs that attempt to modify the boot
program, the operating system and other programs that normally are read
from but not modified.
5. Many Antivirus programs automatically scan files downloaded from the
web, e-mail attachments and all types of removable media inserted into the
computer.
D.) Anti-Spyware
E.) Firewall
1. Human aspects refer to the user and also the intruder of a computer
system.
2. It is one of the hardest aspects to give protection to.
3. The most common problem is the lack of achieving a good information
security procedure.
4. There are three ways to protect computer from human aspect threat:
Security threats may come in many forms. For example, when someone is
invading our account information from a trusted bank, this act is considered
as a security threat. Security measures can be used to prevent this invaders
from getting the getting the account information. For example, the bank can
use a firewall to prevent unauthorized access to its database.
1. Security threats causes data loss, computer damage and the misuse of
content. These threats include malicious code, hacking, natural disaster and
theft.
2. People need to apply some security measures to overcome these threats. The
examples of security measures include data backup, cryptography, Antivirus,
Anti-Spyware, firewall and human aspects.
3. The backup system is needed to backup all data and applications in the
computer. With the backup system, data can be recovered in case of an
emergency.
1. We need to protect the data in the computer as it may somehow get lost or
corrupted due to some viruses or mishap like fire, flood, lightning, machine
failures and even human errors.
1. The computer system is able to detect any illegal access to the system by
a user who does not have any authorization.
2. Basically, a corporation will simply use tcpwrappers and tripwire to detect
any illegal access to their system.
a)Tcpwrappers
Tcpwrappers will control access at the application level, rather than at the
application level, rather than at the socket level like iptables and ipchains.
The system will run tcpwrappers to log access to fttp, tftp, rch, rlogin,
rexe and telnet.
o Tcpwrappers stop the attempted connection
o examines its configuration files
o Will decide whether to accept or reject the request.
b)Tripwire
1. There are things that cannot be taken inside the airplane. It is for the
purpose of security procedures. It is the same as computer systems. It would
not allow any unauthorized users to simply access the systems.
E.) Patch
2. Patch supplies small updates to software, provided that the source code is
available.
3. Resources are not enough to patch all security holes that we can hear
about through the bugtraq list.
Summary
There are a few ways to protect information. They are
o Make backup files
o Detect the virus and clean the computer
o Warn others on virus attack
Computers help them to do their work faster and more efficient by using the
software application that consists of special program for specific task.
SOFTWARE APPLICATIONS
o To facilitate communication.
Reference
B) BUSINESS
3 Computers in Banking
o In the banking sector. Many financial institutions offer online banking.
People can access their financial records from anywhere in world. Example of
online banking is Maybank2u.
(www.maybank2u.com)
4 Industry
o By using the CAM system, computers record actual labour, material,
machine & computer time used to manufacture a particular product.
o Computer process this data & automatically update inventory, production,
payroll & accounting records on the companys networks.
o Examples of companies using this system are Proton
(www.proton.com.my) & Perodua (www.perodua.com.my).
3. Computer- Aided Design, Desktop Publishing, Paint/ Image Editing, Video &
audio editing & Multimedia Authoring are among the popular applications
software.
D) COMMUNICATION
4. Computers in Tourism
Today, people will go online to get all related information about traveling.
They can visit websites to get information on destinations, prices, hotels,
flights & car rentals.
iv. Using medical software to help with researching & diagnosing health
conditions.
6. Science
o In the scientific world, computers are used in all fields of science from
biology to astronomy to meteorology and others. These are thing that can be
done by computer, namely;
i. Collecting, analyzing & modeling data
ii. Serving as medium of communication with colleagues around the
world
iii. Contributing to new inventions or breakthrough in surgery, medicine
& treatment.
iv. Imitating functions of the central nervous system, retina of the eye
& others by tiny computers.
v. Allowing a deaf person to listen through cochlear implant
SUMMARY
1. Computers help people to do their work faster & more efficient by using
the software applications that consist of special programs for specific tasks.
2. Software applications are used for many reasons such as to enhance the
learning process, to help in business activities, to assist the graphic &
multimedia projects & to facilitate communication.
HOME USERS
The computer is a basic necessity. Each home user spends time on computer
for different reasons:
Business
Entertainment
Communication
Education
MOBILE USER
Mobile users:
include real estate agents, insurance agents, metre readers and
journalists
use notebook computers, internet-enabled PDAs or smart phones
Work with basic business software such as word processing and
spreadsheet business software
use presentation graphics software to create and deliver
presentations to a large audience by connecting a mobile computer or
device to a video projector
POWER USER
Power user:
include engineers, scientists, architects and virtual reality animators
use computers with extremely fast processor, bigger storage and
customized software
Work with mini computers that uses design to meet the
organizational needs
use software such as CAD, CAM and MATLAB
a) Narrow down the topic by reading the sources and form some specific
questions related to the topic. By doing this, we may have awareness of the
various aspects that we may want to study.
a) Study materials are available offline and online. We can search for the
information that we want in books, journals, articles or other resource
materials found in the library and the internet.
b) Perspective:
Is this a primary source (presenting the authors own research and
ideas) or a secondary source (summarizing and discussing the
research and ideas of others)?
Is the evident biased? Does the author attempt to sway the readers
opinion?
c) Reliability/ Credibility
Is the information accurate?
Has the information been peer reviewed?
Are the authors and publishers reputable?
Do they cite their credentials?
Are there footnotes and a bibliography?
d) Update
How recent is the information published?
How recent has it been updated?
Have there been new developments on the topic?
Could the information you are using be misleading because of the
publication date?
1. Introduction
is at the beginning of the research
includes the objectives of the research
provides a clear statement on why the study was undertaken
includes the limitations/assumptions and analytical techniques
2. Content
consists of facts or arguments related to subject matter
can be presented in an argument format or just as an overview
3. Conclusion
is a review of content (not repetition of content)
relates to the statement of objectives in the introduction
should not introduce new issues
should contain judgment or decision that has been reached
There are varieties of ways to write out your research. However, there is a
set of basic requirements that must be followed when it comes to submitting
or presenting written presentation.
There are a variety of ways to write out your research. However, there is a
set of basic requirements that must be followed when it comes to submitting
or presenting written presentation.
1. General Points
number all pages
use one side of A4 paper
secure all pages with a staple (top left-hand corner)
dont use paper clips/pins or folders
must be typed/word processed
clear and easy to read print-out
spell check your paper
supply an estimated word count on the cover sheet
include your name, course name and teachers name
2. Style
double-spaced
12 point minimum and 14 point maximum (with the exception of
headings and footnotes)
2 spaces after a full stop and 1 space following a comma, semi-
colon or colon
no abbreviation such as e.g., & or etc. unless it is included in
a bracket. Write everything in full: for example, that is, and so
on.
numerals are used when the number is more than two words; for
tabulation; statistical discussion; sums of money; addresses;
dates; time; and page, chapter, volume numbers (for example, 2
June, 2000)
consistency in style for example in writing out headings
3. Quote
a direct quote must be placed in quotation
Block quotes are used if a direct quote is more than three lines
long.
if possible, paraphrase information in preference to using direct
quotes.
use quotes and paraphrasing to support argument
4. Clarity
helps your readers understand your paper by organizing your
paper well and dont forget to insert the page numbers
Edit your work means reading through the paper several times
before submission and dont just rely on the rough spelling and
grammar checks offered by your software.
5. Indicating your intentions
In a complex study, the introduction of every section should
inform the reader what to expect in that section should contain
judgment or decision that has been reached.
The final paragraph in each section should tie the contents of
that section together with a short conclusion.
do not use too many words to say what you are going to do and
what you have done, keep to the necessary minimum
PREPARING THE PRESENTATION
A WHAT IS DELEGATION?
C WHAT TO DELEGATE
In order to complete a team project, you will be asked to use your skills in
research, presentation and task delegation. When working on a large project
you must know what task to delegate and how to assign them.
1. QUESTIONING
Discover a problem
Form a question to answer the problem
2. PLANNING
Set out steps to find answer
Select sources for possible answer
Plan a basic draft for reporting
Assign tasks to team members
Agree on contingency plans
3. GATHERING
Go to agreed sources of information
Collect information
4. SORTING
Put similar information together
Highlight valuable credible information
5. SYNTHESISING
Discuss information with others
Combine different information
6. EVALUATING
Discuss if information gathered supports the answer
Test out solution and decision that supports the answer
The head librarian wants us to finish the work Set clear task deadline.
by the end of the day, which is about 5 pm.
We have to sort out these books according to Describe in detail the task
their subjects. Remember to stick the correct objective.
book codes onto the books.
Chong, you take the science books and Indra, Delegate task to those
you take the art books. qualified to do the job.
Form into groups. Discuss with the team members and choose ONE (1) of the
study topics below:
1. Team journal
study project introduction page
minutes of team meetings
initial project plan/calendar
conflict resolution report
2. Initial framework for presentation
3. Final presentation
The purpose of team journal is to keep track the progress of the project.
The teams initial framework is where the team should do some basic study
on the topic and decide what should be included in the presentation.
The print out of the final presentation will be given to the teacher for final
grading.
A presentation should:
Practice in advance.
Prepare notes on paper or cue cards to help you remember what you
need to say during the presentation.
Remember to speak out clearly for people at the back to hear you.
Do not shout!