You are on page 1of 7

2.

Automation
This year, business processes will
continuously become automated with
the use of software.

Hyper-automation is the application of

EMPOWERMENT
advanced technologies to automate
tasks.

TECHNOLOGY It started with a technology called


Robotic Process Automation(RPA).
FINALS LESSONS
⤷ Used in automating
Lesson 4: Latest trends in ICT repetitive tasks or jobs
that will change the future ⤷ Replying to tons of e-mails
and processing
transactions.
1. 5G Network
Example technologies of automation:
2019 - Year when it was first launched
by Globe Telecom and PLDT in the cloud computing, updated robotics, and big data

Philippines.

➔ Latest generation of connectivity This will bring lots of opportunities to IT


after 4G or LTE. Professionals
Vision:

➔ Provide faster internet speeds


with a simpler setup process.
3. Block-chain
➔ Facilitate the use of futuristic ➔ A technology used to record and
technologies (drones, driverless secure transactions through
cars, AI). encryption.
➔ Affordable data plans and ➔ There is no third-party involved
improved coverage. and no entity can take control of
the data.
2

➔ It is the underlying technology


behind cryptocurrency. 5. M-Commerce
➔ Blockchain offers secure ➔ The use of mobile devices for
communication and well-verified different monetary transactions.
data transfer.
It is divided into three categories:

1. Mobile shopping
2. Mobile banking
4. Extended Reality (XR) 3. Mobile payment
➔ Technologies used to create
If you often shop online through apps
more engaging digital
like Lazada or Shopee, then that is
experiences.
already an m-commerce.
This includes:

Virtual Reality (VR) - Brings the


================================
user in a computer-generated world
================================
Augmented Reality (AR) - Brings digital
Lesson 5: Online Threats and
objects onto the real world.
Risks

➔ These technologies can be used Cyberbullying


in training, entertainment, ➢ Refers to the act of embarrassing,
education, marketing, and harassing, or bullying a person
medicine. using the Internet and
➔ Today, XR is largely used in communication technologies.
entertainment (e.g. Oculus Rift, ➢ It can harm the online reputations
Pokemon Go, and Snapchat). of everyone involved (the victim
and also, the bully).

Online bullying should be taken seriously


because it can be emotionally damaging
and even lead to tragic consequences.
3

Cyberstalking can include:

Cyberbullying can include: ➔ Accessing one's account to track


his moves, read messages, or
➔ Ganging up on a player in online
change the password.
gaming and repeatedly harming a
➔ Blackmailing someone through
player's character without any
the Internet and digital platforms.
reason.
➔ Involving the victim's family and
➔ Posting humiliating or hateful
friends.
content about someone
➔ Monitoring one's movements
➔ Sending mean messages through
using cameras and GPS
SMS or chats.
technologies without consent.
➔ Sharing personal information
➔ Sending unwanted texts,
without the person's consent.
messages, or content.
➔ Spreading rumours or gossips
➔ Spreading fake or private
about another person through
information to discredit the victim.
digital platforms
➔ Viewing one's profile repeatedly to
➔ Taking and sharing embarrassing
gather information.
pictures or videos without one's
knowledge and permission.

Hacking
Cyberstalking ➢ The act of gaining access or
controlling one's account or
➢ Refers to the act of stalking and
computer secretly to gain
repeatedly harassing someone
something, make a statement, or
else through the internet or other
challenge oneself.
electronic devices.
➢ It is like traditional stalking but
occurs in the cyber world.
Hacker - Skilled computer programmers
with knowledge of computer security.
4

They break into computers or accounts


to gather, steal, or change Online Grooming
information...sometimes even installing
➢ Happens when someone
dangerous malware.
manipulates, exploits, or abuses a
They usually hack others through spams minor online.
and links that contain malware and
They often try to bribe the victim with
compromise computer security.
gifts or money in exchange of sexual
images or videos.
Inappropriate Contents These are then used by the predators to
➢ Contents like texts, photos, and blackmail them by threatening to post it
videos that are illegal, offensive, online or send it with the victim's family
or inappropriate for some age and friends.
groups.

Examples: Pharming
● Explicit pop-up ad ➢ Way of collecting/stealing
● A video showcasing cartoon personal information that uses
characters in adult situations malicious codes to automatically
● A forum promoting self-harm. redirect/reroute the user to a fake
site.
➢ This personal information can
Internet Scam then be used to commit financial
➢ The act of deceiving a user fraud and identity theft.
through fabricated promises or ➢ It can also happen when a user
stories clicks a link or downloads a file
➢ Typically, to gain money from the with virus or Trojan.
victim.
➢ It comes in many forms; through
online shopping, banking, charity,
social networking, gaming,
gambling, and dating sites.
5

Types of information that should not be


Phishing easily shared online:

➢ The act of sending an email, 1. Birthday


claiming to be an established 2. Complete address
enterprise asking for personal 3. Contact numbers
information. (e.g. confidential 4. Current and previous schools
business information, bank 5. E-mail address
account) 6. Family members' complete
➢ It tricks a user into accessing it names
himself. 7. Personal pictures and videos
➢ Usually, the culprit acts as a bank,
the police, or a branch of the
government.
TIPS TO STAY SAFE
ONLINE
================================
================================
1. Personal Information

Fake pages are usually badly written,


Lesson 6: Online Safety: have misspelled words, or
Safety Measures low-resolution images.

Be careful not to browse them to avoid


Learning how to use the Internet comes possible problems.
with a responsibility so it is important to
Avoid visiting untrusted websites and do
learn how to stay safe online.
not download anything.
6

2. Be familiar with scams 5. Protect your information

Learn about the different types of online Always be careful.


scams and what can be done to avoid
All data in any device should be
them.
backed-up to avoid data theft or data
Read and understand any terms and loss.
conditions before accepting any
Beware of the information being shared
transaction or agreement.
online.

Do not share passwords to anyone


3. Install a Firewall (strangers, acquaintances, or even
friends)
Firewall

- A network device which blocks


certain kinds of network traffic, 6. Shop safely
forming a barrier between a
Do not make important and personal
trusted and an untrusted network.
transactions on websites that are not
- It prevents possible
official, verified, and secure.
cyber-attacks, and attempts to
block the spread of computer
attacks.
Indications that the website is safe:

● With “https”
4. Keep up to date ● A padlock icon beside the URL

Install and update a reliable anti- virus


software on the computer.
7. Use your common sense
Use the latest security patches to make
The best protection when surfing the
regular updates and let the software do
web is using common sense
some scanning once in a while.
THINK BEFORE YOU CLICK
7

8. Use unique password

Avoid using birth date or name as a


password.

Do not use common English words since


they are easy to crack.

9. Watch the Wi-Fi


connectivity

Make sure to have the connection


password-protected to protect the
network.

Make the Wi-Fi at home private by


adding a password and changing it once
in a while.

You might also like