Vous êtes sur la page 1sur 37

CHAPTER 10

CURRENT ISSUES IN
INFORMATION TECHNOLOGY
Current issues in Malaysia
International Current Issues
Career in IT
TTS2233 : IT Skills & Application
A. CURRENT ISSUES IN MALAYSIA AND WORLDWIDE
• A digital security risk is any event or action that could cause a loss of
or damage to a computer or mobile device hardware, software, data,
information, or processing capability
• Any illegal act involving the use of a computer or related devices
generally is referred to as a computer crime
• A cybercrime is an online or Internet-based illegal act

TTS2233 : IT Skills & Application


i) Unauthorized Access and Use

Unauthorized access is Unauthorized use is the


the use of a computer or use of a computer or its
network without data for unapproved or
permission possibly illegal activities

TTS2233 : IT Skills & Application


Unauthorized Access and Use
• Organizations take several
measures to help prevent
unauthorized access and use
• Acceptable use policy
• Disable file and printer sharing

TTS2233 : IT Skills & Application


Unauthorized Access and Use
• Access controls define who can access a computer, device, or network; when
they can access it; and what actions they can take while accessing it
• The computer, device, or network should maintain an audit trail that records
in a file both successful and unsuccessful access attempts
• User name
• Password

TTS2233 : IT Skills & Application


Unauthorized Access and Use
• A passphrase is a private combination of words, often containing mixed capitalization and
punctuation, associated with a user name that allows access to certain computer resources
• A PIN (personal identification number), sometimes called a passcode, is a numeric
password, either assigned by a company or selected by a user
• A possessed object is any item that you must possess, or carry with you, in order to gain
access to a computer or computer facility
• A biometric device authenticates a person’s identity by translating a personal characteristic
into a digital code that is compared with a digital code in a computer or mobile device
verifying a physical or behavioral characteristic

TTS2233 : IT Skills & Application


To Prevent Unauthorized Access and Use :
Biometric Device
Face
Fingerprint
recognition
reader
system

Hand Voice
geometry verification
system system

Signature Iris
verification recognition
system system
TTS2233 : IT Skills & Application
Unauthorized Access and Use
• Digital forensics is the discovery, collection, and analysis of evidence found on
computers and networks
• Many areas use digital forensics

Law Criminal Military


enforcement prosecutors intelligence

Information
Insurance
security
agencies
departments
TTS2233 : IT Skills & Application
ii) Ethics and Society
• Technology ethics are the moral guidelines that
govern the use of computers, mobile devices,
information systems, and related technologies
• Information accuracy is a concern
• Not all information on the Internet is correct

TTS2233 : IT Skills & Application


Ethics and Society
• Intellectual property refers to unique and original works such as ideas,
inventions, art, writings, processes, company and product names, and logos
• Intellectual property rights are the rights to which creators are entitled to their
work
• A copyright protects any tangible form of expression
• Digital rights management (DRM) is a strategy designed to prevent illegal
distribution of movies, music, and other digital content

TTS2233 : IT Skills & Application


Ethics and Society
• A code of conduct is a written guideline that helps determine whether a
specification is ethical/unethical or allowed/not allowed

TTS2233 : IT Skills & Application


Ethics and Society
• Green computing involves reducing the electricity and environmental waste
while using computers, mobile devices, and related technologies

TTS2233 : IT Skills & Application


iii) Hardware Theft, Vandalism, and Failure

Hardware vandalism
Hardware theft is
is the act of defacing
the act of stealing
or destroying digital
digital equipment
equipment

Page 233 TTS2233 : IT Skills & Application


Hardware Theft, Vandalism, and Failure

TTS2233 : IT Skills & Application


iv) Information Privacy
• Phishing is a scam in which a perpetrator sends an official looking email
message that attempts to obtain your personal and/or financial information
• With clickjacking, an object that can be tapped or clicked on a website
contains a malicious program
• Spyware is a program placed on a computer or mobile device without the
user’s knowledge that secretly collects information about the user and then
communicates the information it collects to some outside source while the
user is online
• Adware is a program that displays an online advertisement in a banner or pop-
up window on webpages, email messages, or other Internet services

TTS2233 : IT Skills & Application


Information Privacy
• Social engineering is defined as gaining unauthorized access to or obtaining
confidential information by taking advantage of the trusting human nature of
some victims and the naivety of others
• Some social engineers trick their victims into revealing confidential
information

TTS2233 : IT Skills & Application


B. The Multimedia Supercoridor Vision

TTS2233 : IT Skills & Application


MULTIMEDIA SUPERCORRIDOR
• The Multimedia Super Corridor (MSC) is Malaysia’s most exciting
initiative for the global information and communication technology
(ICT) industry.

• Conceptualized in 1996, the MSC has since grown into a thriving


dynamic ICT hub, hosting more than 900 multinationals, foreign-
owned and home-grown Malaysian companies focused on
multimedia and communications products, solutions, services and;
research and development.

TTS2233 : IT Skills & Application


TTS2233 : IT Skills & Application
• MSC PHASE 1 (1996-2003)
• In Phase One of the MSC (Figure 2), five Cybercities were successfully
developed, more than 1,000 companies, as well as universities, granted
MSC status; seven major MSC flagship initiatives piloted, 22,000 high-value
jobs created, and total worth of RM 6 billion in revenue generated.

• MSC NEXT LEAP (2004-2010)


• In the initial stage of MSC National Rollout under MSC Next Leap, MSC
Cybercity status has been awarded to Penang (in Bayan Lepas Free
Industrial Zones and vicinity) and Kulim Hi-Tech Park (see below).

TTS2233 : IT Skills & Application


• However, during the 17th Meeting of the MSC Implementation
Council, chaired by the YAB Prime Minister of Malaysia on 21 June
2004, a decision was made to rollout the MSC Cybercity / Cybercentre
status beyond the original designated area in order to spread the MSC
benefits nation-wide.

• MSC PHASE 3 (2011-2020)


• By end of Phase 3 in year 2020, the MSC Agenda will be extended to
the whole country. It will be a national transformation for Malaysia to
become a Knowledge- based Economy and Society, as envisaged in
the Vision 2020
TTS2233 : IT Skills & Application
EXTRA READING :
• Cyberlaws
• Cybercrimes

TTS2233 : IT Skills & Application


C. Careers : Information Technology Careers
• Business and government organizations of all sizes use a variety of computers,
mobile devices, and other technology
• Larger organizations use computers and other technology to answer and route
phone calls, process orders, update inventory, and manage accounts
receivable, accounts payable, billing, and payroll activities

TTS2233 : IT Skills & Application


Information Technology Careers
• IT jobs usually are divided into the following areas:

Research and
Technical support
Management software Operations
services
development

Information
Training/Support Marketing/Strategy
security services

Page 564 TTS2233 : IT Skills & Application


Technology Careers
• The technology equipment field
consists of manufacturers and
distributors of computers, mobile
devices, and other hardware, such
as magnetic and optical drives,
monitors, printers, and
communications and networking
devices

• The software and apps field consists


of companies that develop,
manufacture, and support a wide
range of software and apps for
computers, the web, and mobile
devices

TTS2233 : IT Skills & Application


Technology Careers
• The technology service and repair field provides preventive maintenance,
component installation, and repair services to customers

TTS2233 : IT Skills & Application


Technology Careers
• Technology salespeople must possess a general understanding of technology
and a specific knowledge of the product they are selling

TTS2233 : IT Skills & Application


Technology Careers
• Schools, colleges, universities, and private companies all need
qualified educators to provide technology-related education and
training
• Corporate trainers teach employees how to use software and
apps, design and develop systems, write programs, integrate and
sync data from apps used on multiple devices, and perform other
technology-related activities

TTS2233 : IT Skills & Application


Technology Careers
• A help desk specialist answers hardware, software, and networking questions
in person, over the phone, or electronically via email or a chat room
• An IT consultant, typically hired based on expertise, provides technology
services to his or her clients

TTS2233 : IT Skills & Application


Technology Careers

TTS2233 : IT Skills & Application


Technology Careers

TTS2233 : IT Skills & Application


Technology Careers

TTS2233 : IT Skills & Application


Technology Careers

TTS2233 : IT Skills & Application


Technology Careers

TTS2233 : IT Skills & Application


Technology Careers

TTS2233 : IT Skills & Application


CHAPTER 10 COMPLETED

Reference : Discovering Computers, Shelly Cashman 2016

TTS2233 : IT Skills & Application

Vous aimerez peut-être aussi