Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 61

LEARNING AREA 1 ICT & SOCIET

Topic 1.1 - Introduction to Information and Communication


Technology

Topic 1.1 Pengenalan kepada Teknologi maklumat dan


komunikasi
1

1.1.1.1 Define ICT

ICT is the technology required for information


processing, in particular, the use electronics
computers, communication devices and
application software to convert, store, protect,
process, transmit and retrieve information from
anywhere, anytime.

ICT ADALAH TEKNOLOGI BERKAITAN


PEMPROSESAN MAKLUMAT , DALAM KATA
LAINNYA ADALAH BERKENAAN PENGGUNAAN
KOMPUTER, PERANTI KOMUNIKASI DAN APLIKASI
PERISIAN UNTUK MENUKAR , MENYIMPAN,
MELINDUNGI, MEMPROSES, MENGHANTAR DAN
MEMPEROLEH MAKLUMAT BILA-BILA DAN DI MANA
SAHAJA
2

INFORMATION

knowledge
obtained from
reading,
investigation,
study or research
to make decisions
and to predict
the future
knowledge and
helps us to fulfill
our daily tasks
MAKLUMAT
pengetahuan
yang boleh
didapati dari
pembacaan,kajia
n,pembelajaran

COMMUNICATION

TECHNOLOGY

an act of transmitting the use of


messages a process
scientific
whereby information knowledge,
is exchanged
experience
between individuals
and resources
using symbols, signs to create
or verbal
processes and
interactions,
product that
internet, e-mail or
fulfill human
knowledge obtained
video conferencing
needs
from reading,
investigation,

KOMUNIKASI
proses bertukartukar maklumat
dengan
menggunakan
peranti dan

TEKNOLOGI
penggunaan
peralatan atau
peranti
komunikasi
yang

Timeline for the development of


technology

3500BCSumerians created cuneiform


writing

1925television

1500BCPhoenicians developed the


alphabet

1941 computer

105 BC Tsai Lun of China invented


paper

1958photocopier
machine

1454 printing machine

1963communication
satellite

1793telegraph line

1969 first Internet


(ARPANET)

1876telephone
4

1.1.1.2 Describe the brief evolution of computers


FIRST GENERATION COMPUTERS(1940-1956)

VACUUM TUBES WAS INTRODUCES, IS AN ELECTRONIC


TUBE MADE OF GLASS USED AS COMPUTER COMPONENTS
TO STORE AND PROCESS DATA.
ENIAC IS FIRST GENERATION COMPUTER THAT CONTAINS
WEIGHTS OF 30 TONS, 18000 VACUUM TUBES, 30-50 FOOT
SPACE AND 16000 WATTS OF POWER.

Generasi Pertama (1940-1956)

Tiub Vakum diperkenalkan,merupakan alat


elektronik diperbuat daripada kaca dan
digunakan sebagai komponen komputer untuk
menyimpan dan memposes data
generasi komputer pertama (ENIAC) mempunyai
berat 30 tan, 18000 tiub vakum, luas 30 ke 50
kaki dan menggunakan kuasa 16000 watts.
5

SECOND GENERATION COMPUTERS(1956-1963)


TRANSISTORS REPLACE VACUUM TUBES IN THIS
GENERATION. TRANSISTORS ARE SMALL DEVICES THAT
TRANSFER ELECTRONIC SIGNAL ACROSS RESISTOR.
TRANSISTOR DO NOT PRODUCED LOTS OF HEATS AND USE
LESS POWER ALSO FASTER, CHEAPER AND SMALLER THAN
VACUUM TUBES.

Komputer Generasi Kedua (1956-1963)


Transistor menggantikan tiub vakum dimana ia

peranti lebih kecil yang menukar signal


elektronik merentasi perintang
transistor tidak menghasilkan haba yang
banyak(tidak panas) dan kurang menggunakan
kuasa, murah dan kecil berbanding tiub
vakum.
6

THIRD GENERATION COMPUTERS(1964-1971)


INTEGRATED CIRCUITS (IC) REPLACED TRANSISTOR.
AN IU IS A COMPLETE ELECTRONIC CIRCUIT ON A SMALL
CHIP MADE OF SILICONE.
IU WAS RELIABLE, COMPACT AND CHEAPER THAN
TRANSISTORS

Komputer Generasi Ketiga (1964-1971)


Litar bersepadu menggantikan transistor
ia merupakan litar elektronik yang lengkap

diatas cip yang kecil diperbuat daripad silikon


ia sangat sesuai, kecil dan murah berbanding
transistor
7

FOURTH GENERATION COMPUTERS(1971-PRESENT)

MICROPROCESSOR WAS INTRODUCED, FROM THOUSAND OF


INTEGRATED CIRCUITS CHANGE ONTO SINGLE SILICONE CHIP.
THE INTEL 4004 CHIP DEVELOPED IN 1971, LOCATED ALL THE
COMPONENTS OF THE COMPUTER FROM THE CENTRAL
PROCESSING UNITS AND MEMORY TO INPUT/OUTPUT CONTROLS
ON A SINGLE CHIP.
COMPUTER IS 100 TIMES SMALLER THAN ENIAC COMPUTER IN
FIRST GENERATION.

Komputer Generasi keempat (1971-akan datang)


menggunakan mikropemprosesan, daripada beribu

slitar berintegrasi bertukar kepada cip silikon yang


tunggal
cip intel 4004 dibangunkan pada 1971, dimana
terletaknya semua komponen komputer daripada
unit pemeprosesan pusat dan memori untuk
pengawalan input output data cip tunggal.
8

FIFTH GENERATION COMPUTER(PRESENT BEYOND)

FIFTH GENERATION COMPUTING DEVICES BASED ON ARTIFICIAL


INTELLIGENCE ARE STILL IN DEVELOPMENT THOUGH THERE ARE
SOME APPLICATIONS SUCH AS VOICE RECOGNITION THAT ARE
BEING USED TODAY.

Generasi Kelima Komputer (akan datang masa depan)


berdasarkan kepada kepintaran buatan dimana telah

dibina dan dipertingkatkan pembangunannya seperti


face verification (pengenalan melalui wajah) yang
mana telah mula digunakan kini.
9

1.1.2.1 LIST THE USAGE OF ICT IN


EVERYDAY LIFE.

EDUCATION
(PENDIDIKAN)
BANKING
(PERBANKAN)
INDUSTRY
(INDUSTRI)
E-COMMERCE (E-DAGANG)

10

Teachers - use computers to


search for teaching materials,
participate in online forums
and online conferences as well
as to aid their teaching.

Guru -Mencari bahan


pengajaran, menyertai
forum dan telesidang

Students - use the computers


as a reference tool. They use
computers to browse the
internet to look for
information.

Pelajar-Mencari bahan
rujukan di internet

School Administrators - use


computers for administrative
purposes to make sure that
the entire operation runs

Pentadbir sekolah -Guna


komputer dalam
pengurusan pentadbiran
11

Customers - can make any


transactions at the 24 hour
service centers or via online.
These services allow them to
do transaction at anytime they
want.

Pelanggan urusniaga
24jam sehari, secara
atas talian, bila-bila
masa

Businessman - can save their


time by using the online
services offered by banks.
They can access company
accounts for loan applications,
business transactions and
update on their cash flow at
any time.

Ahli perniagaan - urusan


perbankan syarikat boleh
dilakukan secara atas
talian seperti urusniaga
perniagaan dan
kemaskini aliran tunai

12

Workers - use machines that


are connected to computers to
operate. In some productions,
robots are used to take over
jobs that are dangerous to the
workers.

Pekerja guna mesin yang


disambung kepada
komputer. Robot digunakan
untuk mengambil alih
pekerjaan yang merbahaya

Researchers- use computers to Penyelidik-guna komputer


analyse and collect research
untuk menganalisa dan
data for future reference.
mendapatkan data sebagai
rujukan masa akan datang
Administrators - use
computers to oversee the
entire operations in the plant
or factory to detect specific

Pentadbir guna komputer


untuk memantau
keseluruhan operasi di
13
dalam kilang dan

Customers - use computers to be


connected online with suppliers
to purchase products. This
method can save time and cost
as they do not have to go to any
outlets.

Pelanggan - Boleh
berhubung dengan
pembekal secara atas
talian, jimat masa dan
kos, tidak perlu ke
tempat pembekal

Suppliers - use computers to


keep track of their transactions.
All products are bar coded and
can be read by the computer
scanner to help in determining
prices and managing inventory.

Pembekal komputer
digunakan untuk
memantau urusniaga.
Semua produk
menggunakan kod bar
dan boleh di imbas oleh
pengimbas

Employees - use computers and


telephones to communicate with
their customers for any

Pekerja guna komputer


dan telefon untuk
berkomunikasi dengan 14

COMPUTERIZED

ALL BANKING ACTIVITIES


ARE DONE BY USING
COMPUTER SYSTEM
TRANSACTION CAN BE
DONE ANYWHERE AND
ANYTIME
IT TAKES SHORTEN TIME
FOR ANY BANKING
PROCESS
MORE PRODUCTIVE.

NON COMPUTERIZED

BERKOMPUTER

semua aktiviti
perbankan
menggunakan sistem
komputer
transaksi boleh
dilakukan bila-bila dan
di mana sahaja
mengambil masa yang

ALL BANKING ACTIVITIES


WERE DONE MANUALLY
TRANSACTION CAN ONLY
BE MADE DURING
WORKING HOURS.
IT TAKES LONG TIME FOR
ANY BANKING PROCESS
LESS PRODUCTIVE

TIDAK BERKOMPUTER

semua aktiviti bank


dijalankan secara
manual
transaksi dijalankan
dalam waktu kerja
sahaja
mengambil proses lama
menjalankan kerja
15

1.1.2..1 State the impact of ICT on society.


POSITIVE IMPACTS

FASTER COMMUNICATION
SPEED
LOWER COMMUNICATION
COST
CAN SHARE OPINIONS
AND INFORMATION
PAPERLESS
ENVIRONMENT
INFORMATION AND
COMMUNICATION
BORDERLESS THROUGH
INTERNET.

KESAN POSITIVE

komunikasi cepat
kos komunikasi rendah
perkongsian maklumat
persekitaran tiada kertas

NEGATIVE IMPACTS

CAN BE NEGATIVE
BECAUSE IT COURAGE
PEOPLE TO ACCESS
PORNOGRAPHY AND
VIOLENCE WEB SITES.
CAN HARM USES FOR
LONG HOURS USED

KESAN NEGATIF

penyalahgunaan
komputer pornografi dan
keganasan
kesan buruk jika

16

17

Topic 1.2 Computer Ethics and Legal Issues


Etika Komputer Dan Isu Undangundang

18

Computer
ethics

Codes of
ethic

Intellectual
properties

privacy

Computer
crime

Cyber Law

SYSTEM
OF MORAL
STANDARD
S OR
VALUES
USED AS A
GUIDELINE
FOR
COMPUTER
USERS
ETHICAL.

GUIDELINES
IN ICT THAT
HELP
DETERMINE
WHETHER A
SPECIFIC
COMPUTER
ACTION IS
ETHICAL OR
UNETHICAL.

WORKS
CREATED
BY
INVENTORS
, AUTHORS
AND
ARTISTS.

THE RIGHT OF
INDIVIDUALS
AND
COMPANIES
TO DENY OR
RESTRICT
AND
COLLECTION
AND USED OF
INFORMATION
ABOUT THEM.

ANY
ILLEGAL
ACTS
INVOLVING
COMPUTERS
.

ANY LAWS
RELATING
TO
PROTECTIN
G THE
INTERNET
AND OTHER
ONLINE
COMMUNICA
TION
TECHNOLOG
IES

ETIKA
KOMPUTER
standard
moral atau
nilai yang
digunakan
ebagai
panduan
bagi

KOD ETIKA
panduan
bagi
memastikan
samada
perlakuan
menggunak
an
komputer
itu beretika
atau tidak

HAK MILIK
INTELEKTU
AL
kerja yang
dibuat oleh
pencipta
seperti
artis ,
pembuat
program

PRIVASI
privasi
merujuk
kepada hak
milik induk
atau syarikat

JENAYAH
KOMPUTER
jenayah
komputer,
perlakuan
tidak baik
membabitka
n komputer

UNDANGUNDANG
SIBER
undangundang
siber
merujuk
kepada
undangundang bagi
melindungi
kepentingan 19
berkaitan

Law

Ethics

AS A RULE TO CONTROL COMPUTER USERS.


PERATURAN MENGAWAL PENGGUNA PC

AS A GUIDELINE TO COMPUTER USERS


PANDUAN UNTUK PENGGUNA KOMPUTER

TO PREVENT MISUSE OF COMPUTERS


MENGELAKKAN PENYALAHGUNAAN PC

ETHICAL BEHAVIOR IS JUDGED BY MORAL


STANDARDS. KELAKUAN DIHAKIMI OLEH
STANDARD MORAL

COMPUTER USERS MUST FOLLOW THE


REGULATIONS AND LAW. PENGGUNA PC
MESTI MEMATUHINYA

COMPUTER USERS ARE FREE TO FOLLOW


OR IGNORE THE CODE OF ETHICS. BEBAS
UNTUK MENGIKUT ETIKA ATAU TIDAK

PUNISHMENTS
ADA HUKUMAN

NO PUNISHMENT FOR ANYONE WHO


VIOLATES ETHICS. TIADA HUKUMAN UNTUK
MEREKA YANG MELANGGARNYA

DEPEND ON COUNTRY AND STATE WHERE


THE CRIME IS COMMITTED BERGANTUNG
KEPADA NEGARA YANG TERBABIT

UNIVERSAL, CAN BE APPLIED ANYWHERE,


ALL OVER THE WORLD
SEMUA TEMPAT DI DUNIA

NOT OBEYING LAWS ARE CALLED CRIME


TIDAK MEMATUHI AKAN DIGELAR
PENJENAYAH

NOT FOLLOWING ETHICS ARE CALLED


IMMORAL TIDAK MEMATUHINYA DIGELAR
TIDAK BERMORAL
20

AS BUSINESSES CONTINUE TO EXPAND GLOBALLY, BUSINESS OWNERS MUST


REALIZE THE IMPORTANCE OF GETTING PROFESSIONAL ADVICE ON HOW TO
ESTABLISH AND SAFEGUARD THEIR INTELLECTUAL PROPERTY RIGHTS. THESE
INCLUDE :
oTRADEMARKS FOR BRAND IDENTITY
oCOPYRIGHTS FOR MATERIALS
oPATENTS FOR INVENTIONS
oDESIGN FOR PRODUCT APPEARANCE

perniagaan berkembang secara global dimana pemilik mesti sedar


kepentingan mendapatkan khidmat nasihat bagaimana menjaga
harta intelek mereka. ini merangkumi
oIDENTITI PRODUK
oHAKCIPTA
oPATEN
oREKABENTUK
21

terdapat 3 cara untuk mendapatkan privasi dari


pemilik

1.

o
o
C

s
e
i
k

22

ic
n
ro
t
e c il e
l
E of
.
2 pr

p
S
3.

re
a
yw

1. cookies

used to identify users by web casting, e-commerce and other


contain user information and are saved in the computer hard disk
used by some websites to store passwords and track how
regularly we visit a websites, thats how we become potential
targets for web advertisers

Cookies digunakan dalam penggunaan internet untuk tujuan


peribadi seperti login atau menyimpan rekod2 aktiviti di internet.
Keadaan ini boleh meyebabkan

23

2. Electronic Profile
the

combining of data in a database that can


be sold to the Internet by the company to the
interested parties
this database is in a form such as magazine
subscription or product warranty cards that
had been filled by online subscribers
includes personal details such as your age,
address and marital status

24

3. Spyware
A

program that collects user information


without the users knowledge
Can enter computers, like a virus
Is a result of installing new programs
Communicates information that collects to
some outside source while we are online

25

1.2.2.1 List ways to protect privacy.


PRIVACY CAN BE PROTECTED BY:
(A) PRIVACY

LAW

THE PRIVACY LAWS IN MALAYSIA EMPHASISES ON THE FOLLOWING:


- SECURITY SERVICES TO REVIEW THE SECURITY POLICY
- SECURITY MANAGEMENT TO PROTECT THE RESOURCES
- SECURITY MECHANISM TO IMPLEMENT THE REQUIRED SECURITY
SERVICES
- SECURITY OBJECTS, THE IMPORTANT ENTITIES WITHIN THE
SYSTEM ENVIRONMENT
(A) UNDANG-UNDANG

PRIVASI

undang-undang privasi di malaysia berkaitan dengan


- servis keselamatan untuk memaparkan polisi keselamatan
- pengurusan keselamatan untuk mengawal sumber
- mekanisma keselamatan bagi mengimplementsi keperluan
perkhidmatan keselamatan
- objek keselamatan, entiti penting berkaitan persekitaran
keselamatan
26

1.2.2.1 List ways to protect privacy.


PRIVACY CAN BE PROTECTED BY:
(B) UTILITIES SOFTWARE
- INSTALL ANTI-SPAM PROGRAM, FIREWALL, ANTI-SPYWARE AND
ANTIVIRUS
- PURCHASE GOODS WITH CASH RATHER THAN CREDIT CARD
- CLEAR YOUR HISTORY FILE WHEN YOU ARE FINISHED BROWSING
- FILL IN ONLY NECESSARY INFORMATION ON WARRANTY AND
REGISTRATION FORM.
(B) Perisian Utiliti
- menginstall program anti spam, dinding api, anti perisik dan
antivirus
- membeli barangan secara tunai
- menghilangkan sejarah carian internet apabila selesai
melayari internet
- hanya mengisi perkara yang perlu dalam borang internet
27

1.2.2.2 State authentication and verification methods/ technologies.


AUTHENTICATION IS A PROCESS WHERE USERS VERIFY THEIR IDENTITY.
AUTHENTICATION DEALS WITH THE PROBLEM OF DETERMINING WHETHER A
USER SHOULD BE ALLOWED ACCESS TO A PARTICULAR SYSTEM.
PEMBUKTIAN merupakan proses di mana pengguna mengesahkan bukti
identiti samada pengguna itu dibenarkan atau tidak mengakses sesuatu
sistem
METHODS OF AUTHENTICATION
BIOMETRIC DEVICE

CALL BACK SYSTEM

TRANSLATES PERSONAL CHARACTERISTICS


INTO A DIGITAL CODE THAT IS COMPARED
WITH A DIGITAL CODE STORED IN THE
DATABASE.

CHECKING SYSTEM THAT


AUTHENTICATES THE USER
-BANK

PERANTI YANG MENUKAR KARAKTOR PERIBADI


KEPADA KOD DIGITAL YANG BOLEH
MEMBANDINGKAN DENGAN KOD DIGITAL
YANG DISIMPAN DALAM PANGKALAN DATA

SISTEM YANG MENYEMAK


PEMBUKTIAN OLEH PENGGUNA
-BANK
28

29

METHOD OF VERIFICATION/PENGESAHAN
USER IDENTIFICATION/pengenalan
pengguna

PROCESSED OBJECT/ OBJEK


PEMPROSESAN

REFERS TO THE PROCESS OF


VALIDATING THE USER.
-show exam slip to verify that you are
the valid candidate for the exam
-password

REFERS TO SOMETHING THE USER


HAS SUCH AS IDENTIFICATION CARD,
SECURITY TOKEN AND CELL PHONE.

MERUJUK KEPADA PROSES YANG


DIJALANKAN PRNGGUNA BAGI
PENGESAHAN

MERUJUK KEPADA PENGGUNA YANG


MEMPUNYAI OBJEK SEPERTI KAD
PENGENALAN, TOKEN KESELAMATAN
DAN TELEFON.

-Menunjukkan slip peperiksaan


-Kata laluan

30

31

32

1.2.3.1 a)List effects of controversial contents of pornography on society


PORNOGRAPHY
CAN LEAD TO CRIMINAL ACTS SUCH AS EXPLOITATION OF WOMEN AND CHILDREN
CAN LEAD TO SEXUAL ADDICTION OR PERVERSION
CAN DEVELOP LOW MORAL VALUE TOWARDS OTHER MEN, WOMEN OR CHILDREN
CAN ERODE GOOD RELIGIOUS, CULTURAL AND SOCIAL BELIEFS AND BEHAVIOR
PORNOGRAFI
boleh menggalakkan perlakuan jenayah seperti eksploitasi wanita dan
kanak-kanak
boleh menjurus kepada perlakuan seks
boleh membangunakan nilai moral yang rendah terhadap lelaki dan wanita
mahupun kanak-kanak
SLANDER
CAN DEVELOP INTO A SOCIETY THAT DISREGARDS HONESTY AND TRUTH
CAN DEVELOP BAD HABIT OF SPREADING UNTRUTHS AND RUMORS
CAN LEAD TO UNNECESSARY ARGUMENT
CAN CAUSE PEOPLE TO HAVE NEGATIVE ATTITUDES TOWARDS ANOTHER PERSON
FITNAH

boleh membangunkan masyarakat yang tidak jujur


boleh membangunkan tabiat buruk seperti menyebarkan khabar angin
membawa kepada pertelingkahan yang tidak perlu
boleh menyebabkan perlakuan negatif antara sau sama lain atau masyarakat
keseluruhannya
33

34

1.2.3.2 Describe the process of filtering to control access to controversial contents


THE METHOD OF CHOICE TO LIMIT ACCESS ON THE INTERNET IS TO FILTER EITHER BY
A. KEYWORD BLOCKING. THE METHOD USES A LIST OF BANNED WORD OR OBJECTS
TERMS SUCH AS XXX, SEX, AND NUDE. AS THE PAGE IS DOWNLOADING, THE
FILTER SEARCHES FOR ANY OF THESE WORDS. IF FOUND, IT WILL BLOCKED THE
PAGE COMPLETELY. STOP DOWNLOADING THE PAGE, BLOCK THE BANNED WORDS
AND EVEN SHUT DOWN THE BROWSER.
B. SITE BLOCKING. THE METHOD USE SOFTWARE TO LIST THE WEBSITES THAT WILL BE
BLOCKED BY USING SOFTWARE. THE SOFTWARE PREVENTS USERS FROM BEING
ACCESS THE WEB SITES ON LIST.
C. WEB RATING SYSTEM. WEB SITES ARE RATING IN TERMS OF NUDITY, SEX, VIOLENCE
AND LANGUAGE. THE WEB SITES RATE CAN BE DONE BY SETTING THE BROWSER
TO ONLY ACCEPT PAGE WITH CERTAIN LEVEL OF RATINGS.
LANGKAH PENAPISAN DALAM MELAYARI INTERNET ADALAH
a. PENGHALANG KATAKUNCI

katakunci yang berkaitan dengan perkara-perkara buruk disimpan dalam


pangkalan data.pengguna yang menaip atau menekan perkataan tersebut
akan dihalang dari mengakses laman berkaitan perkara tersebut
b. PENGHALANG TAPAK

satu perisian berfungsi untuk mengenalpasti laman-laman yang tidak


patut atau boleh dilayari.
c. SISTEM RATING WEB

merupakan sistem yang mengenalpasti laman-laman yang tidak baik yang


selau dilayari. sistem akan menghalang pengguna daripada melayari
laman-laman web tersebut.
35

1.2.4.1 Explain the need for cyber law


THE NEED FOR CYBER LAW IS TO PROTECT THE INTERNET AND OTHER
ONLINE
COMMUNICATION TECHNOLOGIES.THE NEEDS OF CYBER LAW ARE

INTEGRITY AND SECURITY INFORMATION


LEGAL STATUS OF ONLINE TRANSACTIONS
PRIVACY AND CONFIDENTIALLY OF INFORMATION
INTELLECTUAL PROPERTY RIGHTS
SECURITY OF GOVERNMENT DATA

KEPERLUAN UNDANG-UNDANG SIBER ADALAH UNTUK MENGAWAL


INTERNET DAN LAIN-LAIN TEKNOLOGI ATAS TALIAN. IA
BERKAITAN

MAKLUMAT KESELAMATAN DAN INTEGRITI


TRANSAKSI ATAS TALIAN YANG SAH
MAKLUMAT PRIVASI DAN SULIT
HAK CIPTA TERPELIHARA
KESELAMATAN DATA KERAJAAN

36

1.2.4.2 Explain briefly the computer crimes below:


COMPUTER FRAUD IS DEFINED AS HAVING AN INTENTION TO
TAKE ADVANTAGE OVER OR CAUSING LOSS TO OTHER PEOPLE,
MAINLY ON MONETARY BASIS THROUGH THE USE OF COMPUTERS.
THERE ARE MANY FORMS OF COMPUTER FRAUD WHICH INCLUDE
E-MAIL HOAXES, PROGRAM FRAUD, INVESTMENT SCHEMES, SALES
PROMOTIONS AND CLAIMS OF EXPERTISE ON CERTAIN FIELDS.

PENIPUAN KOMPUTER merujuk kepada mengambil


perhatian atau kesempatan yang boleh mengakibatkan
kerugian kepada orang lain menerusi penggunaan
komputer. contohnya penipuan email, skim pelaburan,
promosi jualan dsbnya.

37

COPYRIGHT INFRINGEMENT IS DEFINED AS A VIOLATION OF THE


RIGHTS SECURED BY A COPYRIGHT. COPYRIGHT INFRINGEMENT
INVOLVES ILLEGAL COPY OR REPRODUCTION OF COPYRIGHTS
MATERIAL BY THE BLACK MARKET GROUP. THE OPEN COMMERCIAL
SALE OF PIRATED ITEM IS ALSO ILLEGAL.
PELANGGARAN HAKCIPTA merujuk kepada pelanggaran kepada
hakcipta, menyalin semula tanpa kebenaran dan sebagainya.

38

1.2.4.2 Explain briefly the computer crimes below:

COMPUTER THEFT IS DEFINED AS THE UNAUTHORIZED USE OF ANOTHER


PERSONS PROPERTY WITH THE INTENTION TO DENY THE OWNER THE
RIGHTFUL POSSESSION OF THAT PROPERTY OR ITS USE.EXAMPLES OF
COMPUTER THEFT INCLUDE:
TRANSFER OF PAYMENTS TO THE WRONG ACCOUNTS
GET ONLINE MATERIALS WITH NO COST
TAP INTO DATA TRANSMISSION LINES ON DATABASE AT NO COST
DIVERT GOODS TO THE WRONG DESTINATION

PENCURIAN KOMPUTER bermaksud penggunaan tanpa


kebenaran keatas hak milik orang lain dengan nilai
merosak, mengubah, menukar dan sebagainya
pengalihan wang dari akaun orang lain
mendapat barangan atas talian tanpa bayar
mendapat maklumat tanpa bayaran\
mengalihkan penghantaran barangan ke tempat lain

39

1.2.4.2 Explain briefly the computer crimes below:

COMPUTER ATTACK MAY BE DEFINED AS ANY ACTIVITIES TAKEN TO DISRUPT


THE EQUIPMENT OF COMPUTER SYSTEMS, CHANGE PROCESSING CONTROL OR
CORRUPT STORED DATA.
COMPUTER ATTACK CAN BE IN THE FORMS OF:
PHYSICAL ATTACK THAT DISRUPT THE COMPUTER FACILITY OR ITS
TRANSMISSION LINES.
AN ELECTRONIC ATTACK THAT USES THE POWER OF ELECTROMAGNETIC
ENERGY TO OVERLOAD COMPUTER CIRCUITRY.
A COMPUTER NETWORK ATTACK THAT USES A MALICIOUS CODE TO EXPLOIT
A WEAKNESS IN SOFTWARE, OR IN THE COMPUTER SECURITY PRACTICES OF A
COMPUTER USER

40

1.3.1.1 Define Computer security.


COMPUTERS SECURITY MEANS PROTECTING OUR
COMPUTER SYSTEMS AND THE INFORMATION THEY
CONTAINS AGAINST UNWANTED ACCESS, DAMAGE,
DESTRUCTION OR MODIFICATION.

keselamatan komputer bermaksud melindungi sistem


komputer dan maklumat di dalamnya daripada akses
yang tidak dibenarkan, kerosakan dan pengubahan

41

1.MALICIOUS CODE

3. ENVIRONMENTAL DISASTER

2. HACKING

4. THIEF
42

1.3.2.1 Explain briefly the different threats to computer security:

1. MALICIOUS CODE IS ALSO KNOWN AS A ROUGE PROGRAM.


IT IS A TREAT TO COMPUTING ASSETS BY CAUSING
UNDESIRED EFFECTS IN THE PROGRAMMERS PART. THE
EFFECT CAUSE BY AGENT, WITH THE INTENTION TO CAUSE
DAMAGE. THE AGENT FOR MALICIOUS CODE IS THE WRITER OF
THE CODE, OR ANY PERSON WHO CAUSES ITS DISTRIBUTION.
THERE ARE VARIOUS KINDS OF MALICIOUS CODE. THEY
INCLUDE VIRUS, TROJAN HORSE, LOGIC DOOR, TRAPDOOR AND
BACKDOOR, WORM AND MANY OTHERS.

1. KOD HASAD juga dikenali sebagai program pemecah.


ia mengganggu aset komputer dengan menyebabkan
kerosakan. agen kod ini akan mengubah kod yang
terdapat dalam program dan merosakkan komputer
dengan kesannya seperti gangguan kepada perjalanan
program. contohnya trojan horse, logic door, trapdoor
dan backdoor, worm(cecacing) dan banyak lagi

43

44

45

1.3.2.1 Explain briefly the different threats to computer security:

HACKING IS A SOURCE OF THREAT TO SECURITY IN COMPUTER. IT IS


DEFINED AS UNAUTHORIZED ACCESS TO THE COMPUTER SYSTEM BY A
HACKER.
HACKERS ARE PERSONS WHO LEARN ABOUT THE COMPUTER SYSTEM IN
DETAIL. THEY WRITE PROGRAM REFERRED TO AS HACKS. HACKERS MAY
USE A MODEM OR CABLE TO HACK THE TARGETED COMPUTERS.

PENGGODAMAN adalah sumber gangguan kepada


keselamatan dalam komputer. ia boleh diistilahkan
sebagai akses tanpa kebenaran kepada sistem komputer
oleh orang yang dikenali sebagai hacker. hacker adalah
orang yang ada kepandaian tentang sistem komputer.
mereka menulis program komputer berdasarkan
penggunaan modem dan kabel untuk merosakkan
komputer.

46

ENVIRONMENTAL DISASTER. BE IT AT HOME, STORES, OFFICES AND ALSO


AUTOMOBILES. EXAMPLES OF NATURAL AND ENVIRONMENTAL DISASTERS:
FLOOD, FIRE, EARTHQUAKES, STORMS AND TORNADOS, EXCESSIVE HEAT,
NADEQUATE POWER SUPPLY
BENCANA ALAM adalah juga satu cara yang merosakkan komputer. contohnya
banjir, tanah runtuh, gempa bumi dan sebagainya.

47

48

1.3.3.1 Select the appropriate security measures to overcome the


identified computer threats.

Data

Backup :
Cryptography
Anti virus
Anti spyware
Firewall
Human Aspects

49

50

51

52

53

screening routers- ringkas, hanya melihat alamat dan jenis protocol.


proxy gateway- rumit, melihat keseluruhan teks
guard-lebih rumit, juga melihat keseluruhan teks
54

55

56

1.4.1

Impact of ICT on Society

57

1.4..1.1 Impact of ICT on Society


POSITIVE IMPACT

FASTER COMMUNICATION SPEED. WITH THE INTERNET, NEWS OR MESSAGE


ARE SEND VIA E-MAIL TO ANYONE EFFICIENTLY. WITH THE CAPABILITY OF
BROADBAND AND SPEED OF CONNECTION ON THE INTERNET, ANY
INFORMATION CAN BE TRAVEL FASTER.

LOWER COMMUNICATION COST. WITH THE INTERNET, WE DO NOT HAVE TO


PAY ANY BASIC SERVICES PROVIDED BY IN THE INTERNET. FURTHERMORE, THE
COST OF THE CONNECTION TO THE INTERNET IS RELATIVELY CHEAP.

IPEOPLE CAN SHARE OPINION FROM INFORMATION THROUGH DISCUSSION


GROUP AND FORUMS THROUGH INTERNET.

INFORMATION CAN BE STORED AND RETRIEVED THROUGH THE DIGITAL


MEDIUM INSTEAD OF PAPER. (PAPERLESS ENVIRONMENT)

INFORMATION AND COMMUNICATION CAN BE BORDERLESS THROUGH


INTERNET.
BY USING INTERNET, PEOPLE ALL AROUND THE WORLD CAN BE CONNECTED
THROUGH EACH OTHER.
IMPAK POSITIF

KELAJUAN KOMUNIKASI YANG CEPAT MELALUI INERNET, BERITA ATAU


MESEJ MENERUSI EMAIL AKAN LEBIH CEPAT DAN PANTAS.

KOS KOMUNIKSI YANG RENDAH DENGAN INTERNET, KITA TIDAK PERLU


MEMBUAT PEMBAYARAN ASAS PERKHIDMATAN.

MANUSIA BOLEH BERKONGSI MAKLUMAT MELALUI FORUM INTERNET

PENYIMPAN MAKLUMAT BOLEH DIBUAT DAN TANPA KERTAS

DUNIA TANPA SEMPADAN DENGAN INTERNET , MANUSIA BOLEH


BERHUBUNG DENGAN SEMUA ORANG DI DUNIA DENGAN MUDAH

58

NEGATIVE IMPACT

Borderless information at time can be negative because


it courage people to access pornography and violence
website. It can cause low moral values. It also can
created problems such as gambling, information theft
and fraud.

Computers can harms users if they use for long hours


frequently
KESAN NEGATIF

MAKLUMAT TANPA SEMPADAN KADANGKALA ADALAH


NEGATIF CONTOHNYA MENGGALAKKAN PORNOGRAFI DAN
KEGANASAN

KOMPUTER MENGGANGGU KESIHATAN JIKA DIGUNAKAN


TERLALU LAMA.

59

Choose ONE of the following topics:


Copyright and Piracy from Moral and
Legal Standpoints.
Lack of Security and its Effects on
Industry/Economy/ Government.
Malaysian Cyber Law, Electronic
Government Law.
Phishing
Virus (Trojan Horse, Salami Attack)
Hacking
Security Measures (Biometrics,
Authentication
60

DIGITAL SIGNATURE ACT 1997


TELEMEDICINE ACT 1997
COMPUTER CRIME ACT 1997
COMMUNICATION AND MULTIMEDIA

ACT 19989

61

You might also like