You are on page 1of 6

Recap: Introduction to ICT

RECAP: Trends in ICT and Cloud Computing


I. INFORMATION AND COMMUNICATION TECHNOLOGY TRENDS
1. Technological Convergence - This refers to the use of several
technologies to accomplish a task conveniently. For example, you can now
use your smartphone to edit word documents and sync files to your
personal computers.
2. Social Media – This refers to a website, application, or online channel
that enables you to create, discuss, modify, and exchange user-generated
content. It is classified as the following:

3. Mobile Technologies – This refers to the capabilities of mobile phones


similar to the personal computers such as mobile network for internet
connection and various operating systems.
4. Assistive Media – This refers to a nonprofit service designed to help
users with visual and reading impairments. For example, audio recordings
in a database can read web content to a user.
II. CLOUD COMPUTING
What is the cloud?
The cloud is the Internet—more specifically, it's all of the things you can
access remotely over the Internet.
When something is in the cloud, it means it's stored on Internet servers
instead of your computer's hard drive.

It has three components


1. Client computers – clients are the device that the end user interact with
cloud.
2. Distributed Servers – Often servers are in geographically different places,
but server acts as if they are working next to each other.
3. Datacenters – It is collection of servers where application is placed and is
accessed via Internet.

TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general
public. Public cloud may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an
organization. It offers increased security because of its private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of
organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical
activities are performed using private cloud while the non-critical activities
are performed using public cloud

LESSON 2 - ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE

Online safety and privacy


One of the benefits of the Internet is the enhancement of our communication
experiences. E-mail and social media platforms have allowed us to share
information almost immediately. However, the abundance of information available
also has its drawbacks and risks. We must be aware of the information we post
about others and ourselves online, as we tend to underestimate the amount or
importance of information we share. While social media has indeed allowed us to
share mundane details about our day, certain practices are recommended in order
to protect ourselves on the Internet. Thoughtless posting of information can
make our families, friends, and ourselves vulnerable.

Using the Internet should also mean keeping and protecting your privacy. This
includes being careful about what you post online. Take time to read the
website’s privacy policy. Note what information the website gathers about you,
how this data is
intended to be used, what information is shared publicly, and what is secured.

Most websites include data policies, which explain how your information is
used. The data policy states what information the website collects from you,
how it is used and shared, how you can manage your information, and how to
report suspicious activity on your account.
Social networks have allowed us to keep connected with our loved ones and stay
updated about goings-on in their lives. Technology allows us view others’ lives
as well as give others a peek of our own. Because of this, we must be extra
vigilant with what we post on the Internet. Microsoft (2014) provides several
suggestions on protecting yourself on the Internet.

Protecting yourself on the Internet:


1. Do not post anything that you do not want public.
2. Minimize posting information that can identify you or your location.
3. Do not share passwords with other people.
4. Create strong passwords. And avoid using the same password everywhere. If
someone steals this information, they may use this against you.
5. There are plenty of scams on the Internet. Protect yourself from fraudulent
offers, such as fake job advertisements, emails claiming that you won the
lottery, or requests from distant strangers to transfer funds. Be careful with
links, photos and videos that are sent to you, even if they are from people you
know. Clarify with them first before opening the content.
6. How do you know if a website is safe?
Signs of safe websites include having “https” as the
start of the website address and a
lock image beside the website name.
When you see https instead of “http”,
it means the session is secure and
encrypted.
More Tips
 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 Install and update antivirus in your computer.
 Do not give your personal information to anyone
 Think before you click.
 Never post about your future vacation

INTERNET RISK
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by
other person using electronic communication.
Identity Theft
It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.
Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass
individual or group.
Sexting
The act of sending sexually explicit text messages, images, and videos.

INTERNET THREATS
Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to
another program.
2. Trojan Horse – a malicious program that disguised as legitimate
program that user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to hack by recording
every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as
PC and mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a
computer on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online method
for the removal of the virus.

Spam
Also known as junk email or unwanted email send by advertiser or bot. It can
be used to send malware.
Phishing
A cyberattack method using deceptive emails and websites to acquiring
sensitive personal information.
Cybercrime
A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity
thief and others.
Cybercrime Law
A law that deals with all forms of cybercrime ( R.A.10175, Cybercrime
Prevention Act of 2012)
For readings
1. Cybercrime Law in the Philippines | Brief Synopsis | RALB Law
2. https://www.foreclosurephilippines.com/republic-act-10175-cybercrime-
prevention-act-of-2012-full-text/

The Philippines is one of the countries that suffer from cybercrime. That is
why they have put in place laws that will protect all their citizens.

The Philippines consist laws that are to guard against cybersecurity threats.
These include the following:

Data Privacy Act of 2012


Anti-Hacking Law of 2012
Cybercrime Prevention Act of 2012.

The Cybercrime Prevention Act of 2012, for instance. It is the main law against
cybercrime in the Philippines.

This penalizes individuals who are responsible for data theft or destruction.
It also prohibits the production, distribution, or use of computer viruses.

https://youtu.be/ja0zoq_GjzM

You might also like