Professional Documents
Culture Documents
ICT is the technology required for information processing, in particularly, the use of
electronic computers, communication devices and software applications to convert,
store, protect, process, transmit and retrieve information from anywhere, anytime.
In the evolution of computers their first generation was characterized by the use of
vacuum tubes. These computers were expensive and bulky. They used machine
language for computing and could solve just one problem at a time.
In the 1960s, transistor based computers replaced vacuum tubes. Transistors made
computers smaller and cheaper. They made computers energy efficient. The use of
transistors marked the second generation of computers. Computers belonging to
this generation used punched cards for input
The use of Integrated circuits ushered in the third generation of computers. Small
transistors placed on silicon chips, called semi conductors. This increased the speed
and efficiency of computers. In 1968, DEC launched the first minicomputer called
the PDP-8.
The fifth generation computers are current and futere development. They are going
to be based on principles of artificial intelligence and natural language recognition.
http://www.buzzle.com/articles/evolution-of-computers.html
Cyber law refers to legal issues related to protecting the internet and online
communication technologies. Many concerns and issues were raised on the integrity
and security of information, legal status of online transactions, privacy and
confidentiality of information, intellectual property right and security of government
data placed on the internet. Examples of cyber law are,
• Digital signature Act 1997
• Computer crimes Act 1997
• Telemedicine Act 1997
• Communication and multimedia Act 1998
A computer crime is defined as any criminal activity that is related to the use of
computers. These activities include computer fraud, copyright infringement,
computer theft and computer attack.
Computer fraud
Copyright infringement
Computer theft
Computer theft is defined as the unauthorized use of another person’s property with
the intention to deny the owner’s rightful possession of that property or its use. For
example, transfer of payment to wrong account.
Computer attack
a) Privacy law
Methods of Authentication
a) Biometric devices
Biometric device is a device that translates personal characteristics into digital code
that is compared with a digital code stored in database. Biometric devices include:-
• Fingerprint recognition
• Facial recognition
• Hand geometry
• Iris scanning
• Retinal scanning
• Voice recognition
• Signature verification
b) Callback system
Callback system refers to the checking system that authenticate the user . The
callback system is commonly used in the bank operation and business transaction.
Methods of Verification
a) User Identification
b) Processed Object
Processed Object refers to something the user has such as identification card,
security token and cell phone.
Select the appropriate security measures to overcome the identified
computer threats (1.3.3.1)
Security threats may come from many forms and security measures can be used to
prevent these threats.
Malicious codes include virus, Trojan horse, logic bomb, trapdoor and backdoor, and
worm. Antivirus and antispyware can be used to protect the computer from these
threats.
The natural disaster may threaten a computer’s hardware and software easily. The
natural and environmental disasters may include flood, fire, earthquakes, storms
and tornados. Computers are also sensitive to their operating environment such as
excessive heat or the inadequacy of power supply. The backup system is needed to
backup all data and application in the computer.
b) Anti-Spyware
c) Cryptography
d) Firewall
e) Data Backup
f) Human Aspects
Human aspects refer to the user and also the intruder of a computer system.
Human aspect can be divided into three:-
Code of Ethics means moral guidelines to refer to when using the computer and
the Internet.
Intellectual Property refers to any product of human intellect that is unique and
has value in a market place. This covers ideas, inventions, unique names, computer
program codes and many more.
Computer Crime is defined as any criminal activities that are related to the use of
computers. This activities include computer fraud, copyrights infringement,
computer theft and computer attack.
Cyber Law refers to legal issues related to protecting the Internet and other online
communication technology.
Example: Copyright Act 1987, Computer Crime Act 1997, Telemedicine Act 1997,
Communication and Multimedia Act 1998
ETHICS LAW
Computer users are free to follow Computer users must follow the
or ignore the code of ethics regulations and law
Computer security means protecting our computer systems and the information
against unwanted access, damage, destruction or modification.
• Hardware security
• Software security / Data security
• Network security
References : CD courseware
Books – Information and Communication Technology (ICT)(2007) ,
Ibrahim Ahmad, Venton Publishing (M) Sdn. Bhd
• Virus –is a computer program that can copy itself[1] and infect a computer.
• Trojan Horse – or Trojan, is malware that appears to perform a desirable
function for the user prior to run or install but instead facilitates unauthorized
access of the user's computer system. A Trojan does not duplicate viruses do.
• Worm – a program that copies itself repeatedly into a computer’s memory or
onto disk drive through a network.
• Trapdoor and Backdoor – In a computer system is a method of by passing
normal authentication, securing remote access to a computer,obtaining
access to plain text, and so on,while attempting to remain undetected.
• Logic Bomb – or time bomb, goes off when a specific condition occurs either
specified time or date.
• and others
Natural Disaster
Computers are also threatened by natural or environmental disaster. Example of
natural and environmental disasters such as flood, fire, earthquake, storms,
tornados, excessive heat and inadequate power supply.
Theft
Theft is the illegal taking of another person’s property without that person’s freely
given consent.
Software theft occurs when someone steal software media , intentionally erases
program or illegally copies are program.
• Education
Teachers, students, researchers and school administrators benefits from the
• Banking
Customers, businessman and bank administrator benefits from the usage of
ICT.
They can make any transactions at anytime they want using the online
services
• Industry
Workers, researchers and administrator benefits from the usage of ICT.
research data.
• E-Commerce
Customers, suppliers and employees benefits from the usage of ICT.
Examples are online purchase products and keep track of their transactions.
Non-computerised Computerised
• banking was done manually by taking • all transactions are done by computers
at anytime and any place
deposits directly
• transactions can only be made during
working hours
Production was slow because depended on Production can be increased through an all day
human labour. operation.
• Advertisement was in the form of word of Distribution, buying, selling and servicing
mouth, billboards and printed flyers. products are done electronically.
• Trading globally was extremely slow, late
and expensive.
allows people to have access to large amounts of data at a very low cost.
opinions, news and discussion groups, mailing list and forums on the
Internet.
• Paperless Envirolnment
Information can be stored and retrieved through the digital medium instead of
paper.
• Borderless Communication
Internet offers fast information retrieval, interactivity, accessibility and versatility.
It has become a borderless sources for services and information.
• Social Problems
People tend to become more individualistic and introvert. Another negative
effect
• Health Problems
Computer users are also exposed to bad posture, eyestrain, physical and mental
stress if they use it for long hours frequently.
• Pornography
Any form of media or material (like books or photographs) that depicts erotic
• Slander
A false and malicious statement or report about someone.
Filtering software is a term for software designed and optimized for controlling
what content is permitted to a reader when it is used to restrict material delivered
over the web.Content-control software determines what content will be available.
Examples for filtering to control access to controversial contents are:
• keyword blocking
. The filter searches for any banned words or objectionable terms. If found, it
will
• site blocking
The software prevents access to any sites on this list ‘denial lists’ regularly
updated
Filters can use both site blocking and word blocking
http://en.wikipedia.org/wiki/content_filter