You are on page 1of 55

Kursus Hadir Wajib

(First Year Seminar)


Pelajar Tahun Satu

By Pusat Teknologi Maklumat & Komunikasi


(PTMK)
Course Content
❑ Chapter 1 - Definition and Concept of ❑ Chapter 4 – ICT Services in UMP
Computer Ethics & Policy ▪ Introduction of ICT Services
▪ Definition : Computer Ethics ▪ Types of ICT Services
▪ UMP ICT Policy Background ▪ Computer Lab/BK/DK
▪ List of UMP ICT Policy ▪ Audio Visual Equipment
▪ Ethical issues in UMP ICT Environment ▪ Standard Operating procedure for AV
❑ Chapter 2 – Network Ethics Equipment
▪ Network Topology & Concept ▪ Do & Don’t for AV Facilities
▪ Definition : Computer Network ▪ Security : CCTV
▪ UMP Network Policy ▪ Security : Card Access
▪ UMP Students Responsibility ▪ ICT Complaint Management System
▪ Activities : Scenarios 1,2,3 ▪ ICT Equipment Booking
❑ Chapter 3 – Application System ❑ Chapter 5 – Prudent/Practical Usage
▪ Definition : Information/Application ▪ The Challenges
System ▪ Data Survey (10 Jan – 14 Jan 2012)
▪ What is an Information/Application ▪ Data Survey : The Latest
System ? ▪ Website Category
▪ System Development Life Cycle (SDLC) ▪ UMP Internet Bandwidth
▪ Programming Language ▪ Application Flow Details
▪ Database ▪ Porn Access Details
▪ Application System in UMP ▪ Do’s & Don’ts in ICT Usage
▪ System Application Abuse
• Ethics – the discipline dealing with good
and bad or right and wrong or with moral
duty and obligation
Webster’s 3rd International
Unabridged Dictionary of the English
Language

• Ethics – is a part of philosophy, not science


John Horgan (Nov 1998)
• Computer Ethics – is a part of
practical philosophy which deals
with how computing professionals
should make decision regarding
professional and social conduct.
Bynum, Terrell Ward “A very short History of
Computer Ethics”, Southern Connecticut
State University. Achieved from the original
on 18 Apr 2008. Retrieved 5 January 2011.
• Universiti Malaysia Pahang (UMP) is highly
dependent on the smooth functioning of ICT to
achieve the vision.
• The smooth ICT functions and services can
be determined if there is a clear policy in place
in line with the UMP Strategic Plan.
• Therefore, it is very important to develop a
UMP ICT Security Policy which guides the
implementation of ICT facilities, ICT services
and ICT operations in UMP besides
addressing ethical issues in the use of ICT.
– Approved in UMP ICT Council Meeting
(JPICT) No. 1/2015 on September 22, 2015.

– A document and guide to the UMP users in


making decisions related to ICT planning,
security and development in UMP.

– This policy also explains to all internal and


external UMP users on their responsibilities
and their roles in protecting the UMP ICT
assets.
Chap Topic Descriptions
1 Policy Development & Review General explanations include the importance of the policy development and reviewing
the contents.
2 ICT Security Infrastructure Organization Describes the general aspects of organizational management and ICT security
organization in UMP.
3 Human Resources Security Describes the responsibilities of staff/student before, during and after
employment/studies in regards of ICT.
4 Asset Managemnet Explains the responsibility of giving optimum protection for all ICT assets and
inventories in UMP.
5 Access Control Explains the importance of controlling the access control from the unauthorized users.

6 Cryptography Describes the effective way of cryptography to protect the confidentiality, authenticity
and integrity of information.
7 Physical and Environmental Security Explains the importance of controlling the physical access from the unauthorized users
that can cause theft and damage.
8 Operations Security Clarifies that operation of information processing facilities need to be in proper and
safe way.

9 Communication Security Clarifies the rules and guidelines to protect the information in UMPNet Network.

10 Procurement, Development and Maintenance of Clarifies the rules and guidelines for the development and maintenance of the
University Application Systems university application system.

11 Relationships with Suppliers Includes procedures ensuring the services given has proper security aligned with the
agreement contract.
12 Information Security Incident Management Includes procedures to be followed by the UMP ICT assets users to ensure
incident is handled effectively and minimize security incidents.
13 Aspects of the Information Security Service Describes the importance of availability and continual services and operations
Continuity Management to delivered the users.

14 Compliance Describes the importance of increasing the ICT Security level to prevent the
violation of ICT Security Policy, criminal and civil law, and regulatory or
• Ethical issues in Social Network
– Statistic of Internet usage in UMP

• Ethical issues in using ICT facilities


– Statistic of ICT Complaint

• Ethical issues in using UMP Application


System
– Example of Application System Abuse

• Ethical issues in ICT security


– Network ethics
• “Computer Ethics – A Global Perspective” Giannis
Stamatellos, 2007, Jones & Bartlett Publishers
International, UK.

• The Cambrige Handbook Of Information and


Computer Ethics, 2010, Edited by Luciono Floridi,
Cambrige Universiti Press , UK.
• https://www.youtube.com/watch?v=L1i
8RiqHakU

Click Link to play video


A computer network or data network is
a telecommunications network that
allows computers to exchange data. In
computer networks, networked computing
devices (network nodes) pass data to each
other along data connections.

The connections (network links) between


nodes are established using either cable
media or wireless media. The best-known
computer network is the Internet.

(http://en.wikipedia.org/wiki/Computer_network)
• Pusat Teknologi Maklumat & Komunikasi (PTMK) is
responsible to control and maintain all network &
telecommunication devices in UMP campus.

• Network & telecommunication devices are owned


by UMP

• UMP students and staffs are eligible to use UMP


network services
However, PTMK will revoke network services to students and
staffs who violate UMP ICT Policy for these reasons :

Network
services used
for commercial

Allow other
person which is
Disturb any
not a UMP
user to access
Students or
the network
Staffs to use
services
UMP network
services

Receive and Try to access


distribute confidential
subversive or information
confidential using UMP
information to network
social media services
To understand
and obey UMP
ICT policy

To keep safe
personal information
from un-authorized
party.

To ensure all
information in E-
Community apps is
correct

Do not attempt
unauthorized classified
information using UMP
network services
To report any
suspicious activities
that threats ICT
network security
Subject Registration week is an event where students need to register
subject for incoming semester via Open Registration in the Student e-comm.

During registration, Helpdesk received reports from group of students staying


in same residential area who can’t access network to complete the
registration. Investigation done by Technical Team and found Student A used a
software that block other users from connecting to the network. This will only
allow him to gain the network bandwidth to complete the registration.

Discussion :
1) Did the Student A do anything wrong?
2) Who were hurt by Student A course of action?
3) In your opinion, should this allowed?
3) What should PTMK do to overcome this?
UMP provide internet connectivity which dedicated to students and staffs 24 x
7. Staffs and students are enjoying the bandwidth to ensure their works,
assignments and learning activities done by the clock. However, Student B
use the internet bandwidth for his own personal interest like downloading
movies and music, video streaming and other bandwidth hogging stuffs .

Helpdesk received reports from other students who were complaining internet
was slow for their academic activities. PTMK Technical Team investigate this
and found a IP address which belong to Student B which was penetrated the
bandwidth beyond the limit.

Discussion :
1) Did the Student B conduct an ethical way to surf the net?
2) Are there better ways for Student B to accomplished his personal
interests?
3) If you act as PTMK; do you have any recommendation to prevent
this recurring?
UMP Gambang provide single node network at student residential area for
internet and intranet connection. To ensure this facility to be enjoyed by
students, they are allowed to bring their own network devices like switches.
However, students are prohibited from installing router-based devices. During
early semester, Student C bought a new device from Low Yatt and install it at
KK1.

Helpdesk received a report from certain segment users at KK1 who were
connected to the network but inaccessible to the webpages. Investigation
found that Student C was enabled her network device as a router and
distributing IP address which different from the official one.

Discussion :
1) Did the Student C do the wrong action?
2) Who will be harmed if UMP prohibit students from installing
switches?
3) What other course of action could Student C have taken to
ensure this not happened?
https://www.youtube.com/watch?v=t4JVAWopyqs

Please Link to play video


Project
Planning

Requirement
Maintenance Analysis &
Design

Testing Implementation
C : One of the most
widely used
programming
languages of all
time,and C compilers
are available for the Java : Web Browser -
C# : A very popular majority of available Opera Mini, Google
language for computer architectures Maps, Gmail
designing large and operating systems.
distributed services

C++ : For high


performance applications Objective-C : (Apple
including entertainment iOS - iPhones, iPads,
software, video games, iPods)
device drivers, embedded
software, and scientific
computing – Photoshop &
ImageReady, Illustrator
and Adobe Premier
Database Functionality
Oracle Database - Used is in all application system
such as e-Community Staff &
Student, IMS Academics, IMS
Student, IMS Financial, IMS
Administration and other main
application in university.
- High stability and can handle a
huge data.
KIEMS
FINANCIAL SYSTEM
(Oracle Forms & Reports)

KIEMS
ACADEMIC MANAGEMENT SYSTEM
(Oracle Forms & Reports)
E-
COMMUNITY KIEMS
STAFF/ STUDENT SYSTEM Database
PELAJAR (Oracle Forms & Reports) (Oracle)
(Java)
KIEMS
HUMAN RESOURCE SYSTEM
(Oracle Forms & Reports)

OTHERS..
E-LEARNING, CENFED, TRAFFIC MONITORING ETC..
• Provide comprehensive services and facilities for
creating ICT-based environment

• Provide information about services that are related


to technical and ICT

• ICT Services are provided to support teaching &


learning in UMP

• Students are responsible to fully utilized the ICT


facilities and services with ethics.
Contents

Audio Visual

Security
- CCTV
Computer -Card Access
Lab/BKDK

ICT
SERVICES

ICT Complaint
ICT Equipment Management System
Booking System
• Labs are fully equipped with:

Audio
Visual

LAB

Computers Internet
Teaching & Learning

Events (Manpower)
• MINDS (Minggu Induksi Siswa)

Others
• Video Conference
• Web Conference
4.) Do and Don’t in Physical System
(cont.)

Switch off the


AV equipment
after every
usage
Make sure the
AV equipment in
the class / lab is
being utilized
appropriately
Do not steal any
of the provided
AV equipment in
the class / lab
• UMP campus is equipped with 24-hour CCTV
monitoring system (outdoor & indoor) inclusive with
the recording function.

• The implementation of the CCTV system is to ensure


the campus is safe from any misconduct, theft,
intrusion and etc.

• The recording will be used by the Security Department


to investigate on any cases occurred.
• ICT safety precautions :
– Physical Security Control
• Display student matric card in UMP
• To access library and labs
Please click to play video
Snapshot from
the Complaint
Report (Sept’13)

Statistics for
overall complaint
in 2012
Please click to play video
Ethical Case Study
• Case A
Mr Gan was hit by a ransomware attack.
• 5000 files got locked by CryptoWall, an encryption
malware so powerful it is almost impossible to
recover the information.
• Mr Gan contacted the attacker through the
ransomware’s communication feature. As all
ransomware creators, he was told to either pay to
get his files back or lose them forever. Despite
backing up his files 6 months ago, He decided that
losing half a year’s worth of photos, documents and
other files was too much, and so decided to pay the
ransom.
• Question: What should Mr Gan do?
Some challenges of ICT usage among students are :

➢ Collaboration Tools usage such as facebook,


email, twitter and blog during lecture / class for
personal purpose will affect learning
productivity and quality.

➢ Access to pornography video, films, games or


others which is not related to learning process.
UMP Gambang UMP Pekan

• Internet speed – total • Internet speed – total


2.2 GB 800 MB
• ISP- TIME Internet • ISP- Time NET Internet
Provider 200 MB Provider
• MYREN (Malaysia • Internet Shaping using
Research Network) – 2 Internet bandwidth
GB Management Hardware
• Internet Shaping using
Internet bandwidth
Management Hardware
-Using your E-community username and password to get
authenticate.
-To prevent an unauthorize user from using our UMPnet services.
-Forensic purpose
https://www.youtube.com/watch?v=hqezbib5qpQ

Please link to play video

You might also like