Professional Documents
Culture Documents
TRENDS IN ICT
CONVERGENCE – technological convergence is the synergy of technological advancements
to work on a similar goal or task
SOCIAL MEDIA – a website, application, or online channel that enables web users to create,
co-create, discuss, modify, and exchange user-generated content.
MOBILE TECHNOLOGIES
iOS – used in Apple devices such as the iPhone and iPad
ANDROID – an open source OS (Operating System) developed by Google
BLACKBERRY OS – used in Blackberry devices
WINDOWS PHONE OS – a closed source OS developed my Microsoft
SYMBIAN – the original smartphone OS, used by Nokia devices
WebOS – originally used for smartphones, now used for Smart TVs
WINDOWS MOBILE – developed by Microsoft for smartphones and pocket PCs
ASSISTIVE MEDIA – a nonprofit service designed to help people who have visual and
reading impairments. Database of audio recordings
THE INTERNET OF THINGS – Anything (Any device), Anyone (Anybody), Any
service (Any business), Any Path (Any Network), Any Place (Anywhere), Anytime (Any
content)
INTERNET THREATS
MALWARE – stands for malicious software
Spreads through Free software, Suspicious pop-up ads, Spam email attachments, P2P
sharing files, Malicious websites
TYPES OF MALWARE:
1. VIRUS – a malicious program designed to replicate itself and transfer from one computer
to another either through the Internet and local networks or data storage
2. WORM – a malicious program that transfer from one computer to another by any type of
means. It uses a computer network to spread itself
a. ILOVEYOU worm (Love Bug Worm) by Reonel Ramones and Onel De Guzman
3. TROJAN – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information
a. Rouge Security Software – tricks the user into posing that it is a security software.
It asks the user to pay to improve his/her security but in reality, they are not
protected at all
4. SPYWARE – a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through keylogging
a. Keyloggers – used to record the keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record email, messages,
or any information you type using your keyboard.
i. Hardware keylogger – device attached to keyboard (method 1 of record
typing)
ii. Software keylogger – programs run on computer (method 2 of record
typing)
5. ADWARE – a program designed to send you advertisements, mostly a pop-ups
a. Spam – unwanted email mostly from bots or advertisers. It can be used to end
malware
b. Phishing – acquires sensitive personal information like passwords and credit card
details. This is done by sending you an email that will direct the user to visit a
website
c. Pharming – a more complicated way of phishing where it exploits the DNS
system