Professional Documents
Culture Documents
1.0 ICT and Society Revised
1.0 ICT and Society Revised
ICT is the technology required for information processing and sharing. In particular,
the use of electronic computers, communication devices and software applications
to convert, store, process, transmit and retrieve information from anywhere,
anytime.
First Generation (1941 – 1956) is characterised by the use of vacuum tubes. These
computers were very large, slow and expensive . They used machine language for
computing and could solve just one problem at a time. Examples: Mark I, ENIAC and
UNIVAC.
Fifth Generation (present & beyond) is based on artificial intelligence (AI). AI is the
branch of computer science concerned with making computers behave like humans.
AI has several applications such as speech recognition, natural language, expert
system, nanotechnology and robotics. AI tasks can be better served by parallel
processing. Examples: IBM Deep Blue, Honda Asimo and Sony Aibo.
1
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
2
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
State the differences between computerised and non-computerised
system (1.1.2.2)
3
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Positive Impacts
• Paperless Environment
Information can be stored and retrieved using digital medium instead of paper.
• Borderless Communication
Communication can be done without geographical and political restriction
Negative Impacts
• Social Problems
Fraud and theft are caused by lack of security and data protection on the
Internet.
Uncontrolled website contents might lead to pornography and slander.
• Health Problems
Using computer for long hours might cause bad posture, eyestrain, physical and
mental stress.
4
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Computer Ethics and Legal Issues (1.2)
Definition (1.2.1)
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy,
Computer Crime and Cyber Law (1.2.1.1)
Privacy is the rights of individuals and companies to deny or restrict the collection
and use of information about them.
Computer Crime is any criminal activities that are related to the use of computers.
5
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Cyber Law refers to legal issue related to protecting the use of computers, and
activities performed and transactions conducted over Internet and other networks.
The example Malaysian Cyber Laws are Copyright Act 1987, Computer Crime Act
1997, Telemedicine Act 1997, Communication and Multimedia Act 1998
6
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Privacy (1.2.2)
a) Privacy law
b) Utilities software
A service program that perform maintenance type task related to the managing of
a computer, its devices and programs. Examples: anti-spam program, firewall, anti-
spyware and antivirus.
Methods of Authentication
Two commonly used authentication methods are biometrics devices and callback
system.
a) Biometric devices
Biometric device is a device that translates personal characteristics into digital code
that is compared with a digital code stored in a database. Biometric devices
include:-
• Fingerprint recognition
• Facial recognition
• Hand geometry
• Iris scanning
• Retinal scanning
• Voice recognition
• Signature verification
b) Callback system
7
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Callback system refers to the checking system that authenticate a user . The
callback system (also written as call-back) occurs when the originator of a call is
immediately called back in a second call as a response for verification. It is
commonly used in the bank operation and business transaction.
Methods of Verification
Two commonly used verification methods are user identification and processed
objects.
a) User Identification
b) Processed/Possessed Object
• Pornography
Any form of media or material (like literature or photographs) that depicts
erotic behaviour and is intended to cause sexual excitement.
• Slander
A false and malicious statement or report about someone.
• keyword blocking
. The filter searches for any banned words or objectionable terms. If found, it
will block the page completely or stop downloading the page
8
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
• site blocking
The software prevents access to any sites on the denial lists which is
regularly updated
9
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Computer Crimes (1.2.4)
Cyber law refers to legal issues related to protecting the internet and online
communication technologies. Many concerns and issues were raised on the integrity
and security of information, legal status of online transactions, privacy and
confidentiality of information, intellectual property right and security of government
data placed on the internet.
A computer crime is defined as any criminal activity that is related to the use of
computers. These activities include computer fraud, copyright infringement,
computer theft and computer attack.
• Computer fraud
Copyright infringement
Computer theft
Computer theft is defined as the unauthorized use of another person’s property with
the intention to deny the owner’s rightful possession of that property or its use.
Computer theft can take the form of:
• the theft of money, for example, the transfer of payments to the wrong
accounts
• the theft of information, for example, by tapping into data transmission lines
or databases at no cost
• the theft of goods by their diversion to the wrong destination
10
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
• the theft of computer time, for example, use of an employers computer
resources for personal work
Computer attack
Definition (1.3.1)
• Hardware security
• Software security / Data security
• Network security
Security Threats(1.3.2)
Four threats to computer security; malicious code, hacking, natural disaster and
theft.
• Malicious code/malware
Is a term used to describe any codes in any part of the software or script that is
intended to cause undesired effect, security breaches or damage to a system..
• Virus –is a computer program that can copy itself[1] and infect a
computer.
• Trojan Horse – or Trojan, is malware that appears to perform a
desirable function for the user prior to run or install but instead facilitates
unauthorized access of the user's computer system. A Trojan does not
duplicate viruses do.
11
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
• Hacking
• Natural Disaster
• Theft
Theft is the illegal taking of another person’s property without that person’s
freely given consent.
There are three types of computer theft; software theft, hardware theft and
information theft
12
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Security measures means the precautionary measures taken toward possible
danger or damage. Techniques enforce to restrict access to data and condition in
which data is obtained.
THREATS MEASURES
• Antivirus
Malicious Code
• Anti-spyware
• Firewall (Hardware/Software)
Hacking
• Cryptography
• Human Aspects
o Security Personnel
Theft
o Training/motivation
a) Antivirus
b) Anti-Spyware
c) Cryptography
13
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
Cryptography is a process of hiding information by altering the actual information
into different representation, for example an APA can be written as *%*.
d) Firewall
e) Data Backup
Data Backup is a system of file duplication. Data backups are necessary so that
they can be accessed in case the original copy is lost or damaged. Depending on
the importance of the information, daily, weekly or biweekly backups from a hard
disk can be performed.
f) Human Aspects
Human aspects refer misuse of hardware and software by the users. The security
procedures to prevent the problem from arising are:
• to ensure that the computers and important data can only be accessed by
authorised personnel by using lock, password and smartcard
14
twitter.com/amiruldaniel Amiruldanielsabri(SMK Sultan Badlishah
Kulim)
http://en.wikipedia.org/wiki/content_filter
Teaching Courseware CD
http://www.wipo.int/about-ip/en/
http://www.leadingvirtually.com/?p=244
http://www.buzzle.com/articles/evolution-of-computers.html
http://www.enchantedmind.com/html/science/artificial_intelligence.html
http://www.elsevier.com/wps/find/bookdescription.cws_home/525541/description#d
escription
http://www.aaai.org/AITopics/pmwiki/pmwiki.php/AITopics/NaturalLanguage
http://www-formal.stanford.edu/jmc/whatisai/node3.html
http://www.techiwarehouse.com/cms/engine.php?page_id=a046ee08
Teaching courseware – lesson 14
References : CD courseware
Books – Information and Communication Technology (ICT)(2007) , Ibrahim
Ahmad, Venton Publishing (M) Sdn. Bhd
Discovering Computers 2007 a Gateway to Information (2007), Shelly Cashman
Vermaat, Shelly Cashmant Series.
15