Lesson 13: The Process of Internet Filtering

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

LESSON 13 : THE PROCESS OF INTERNET FILTERING

1.
2.

Internet filtering
a process that prevent or blocks access to certain materials on the Internet
to prevent children from accessing in appropriate material and to keep
employees productive on the Internet

Controlling access to the Internet


a. keyword blocking
- uses a list of banned words or objectionable terms such as Essex, Dick
Whittington and Penistone
b.
-

site blocking
software company maintains a list of dubious Internet Sites
the software prevents access to any sites on this list
denial list regularly updated
some software provides control over what categories of information you block
who decides what goes on the denial list and what criteria are they using
filters can use both site blocking and word blocking.

c.
-

web rating systems


web sites are rated in terms of nudity, sex, violence and language
rating done either by the web page author or by the independence bureau
browsers set to only accept pages with certain levels of rating
who decides the rating????

LESSON 14 : CYBER LAW

1.
-

2.
-

Cyber Law
refers to any laws relating to protecting the Internet and other online
communication technologies

The Cyber Law Acts in Malaysia


The Malaysian Government has already passed several cyber laws to control
and reduce the Internet abuse
These cyber laws include
a. Digital Signature Act 1997
- an identity verification standard that uses encryption techniques to
protect against e-mail forgery
- the encrypted code consists of the users name and a hash of all the
parts of the message
b. Computer CrimesAct 1997
- give protection against the misuses of computers and computer
criminal activities such as unauthorized use of programmes, illegal
transmission of data or message over computers and hacking and
cracking of computer systems and networks.
c. Telemedicine Act 1997

ensures that only qualified medical practitioners can practice


telemedicine and that their patients right and interests are protected

d. Communications and Multimedia Act 1998


- ensure that information is secure, the network is reliable and the
service is affordable all over Malaysia.
- Also ensures high level of users confidence in the information and
communication technology industry.
3.
-

Other Cyber Laws


Private Data Protection Bill
Electronic government Activities Bill
Electronic Transactions Bill
The Security Protection Bill

LESSON 15 : COMPUTER CRIMES

COMPUTER FRAUD
having an intention to take advantage over or causing
lost to other people, mainly on monetary basis
through the use of computer
include e-mail hoaxes, programme fraud , investment
schemes, sales promotions and claims of expertise on
certain fields.

COPYRIGHT
INFRINGEMENT
a violation of the rights
secured by a copyright.
MP3 format, copy movie

COMPUTER CRIMES
- any criminal activity that is related to
the use of computers

COMPUTER ATTACK
- any activities taken to
disrupt the equipment of
computer systems, change
processing control or corrupt
stored data

COMPUTER THEIFT
the unauthorized use of
another personsproperty
with the intention to deny
the owner the rightful
possession of that properly
of its use

Can be in the forms of :


- physical attack that disrupt the computer facility or its
transmission lines.
- an electronic attack that uses the power of
electromagnetic anergy to overload computer circuitry
- a computer network attack that uses a malicious code
to exploit a weaknes in software, or in the computer
security practices of a computer user.

You might also like