You are on page 1of 3

Information and Communication Technology (ICT)

Information Technology
- It is the use of any computer, storage, networking and other physical devices,
infrastructure, and processes to create, store, secure, and exchange all forms of
electronic data.
ICT Information Communication Technology
- Deals with the use of different communication technologies such as mobile
phones, telephone, internet, etc. to manage information.
Components of ICT
o Cloud Computing – Describe data centers available to many users over internet.
o Software – A set of instructions, data or programs used to operate computers
and execute specific tasks.
o Hardware – Refers to the physical elements that make up a computer or
electronic system.
o Digital Transaction – Defined as online or automated transactions that take
place between people and organization without use of paper.
o Communication Technology – All equipment and programs that are used to
process and communicate information.
o Digital Data – Data that represents other forms of data using specific language
systems that can be interpreted by various technologies.
o Internet Access – Process of connecting to the internet. Internet access is
subject to data signaling rates.
Uses of ICT
o Education
Learning Management Software uses online classes and Moodle style websites as
ways of utilizing technology in education.
o Business
ICT is a key technology in interdisciplinary measure to reduce costs, improve
processes boost innovation and increase productivity.
o Government
E-Government can be defined as a set of public-sector reforms that make use of ICT.
The four-interaction links of the e-government consists of Government to Citizen
(G2C), Government to Government (G2G) and Government to Employee (G2E).
o Medicine
ICT is being used in the provision of medical care in the sense of Body Scanners,
Patient Monitoring, Organ Transplant and Patient Records.
o Banking and Finance
ICT is used in concepts like internet Banking, Automated Teller Machine, Debit Card
and Credit Cards and Transaction Processing and Recording.
o Transportation
ICT affects transportation directly and indirectly via the GPS Tracker, Citizen Centric
Transport, Data Driven Driving, Social Logistics and Airlines Reservation System.

ICT in the Philippines


Philippines was dubbed as the ICT Hub of Asia. According to 2013 edition of
Measuring the information society by the international communication union, there are
at least 106.8 cellphones per 100 Filipinos in the year 2012.
In Year 2010, according to the data gathered by the annual survey of PH business and
industries, NSO, ICT industry shares 19.3% of total employment.
In year 2016, RA 10844 or “An act creating the department of information and
communications technology” was signed.
Malware (“Malicious Software”)
- A computer program designed to specifically damage or disrupt a system.
Types of Malwares
o Virus – A malicious program designed to replicate itself and transfer from one
computer to another.
o Worms – A program that transfers from one computer to another by any means.
o Trojan – A malicious program that is disguised as useful program but once
downloaded or installed leaves your PC unprotected and allows hacker to get
your information.
o Spyware – A program that runs in the background without you knowing.
o Keylogging/Keylogger – Are used to record the keyboard activity of the user.
o Adware – These are unwanted emails mostly from bots or advertisements.
o Ransomware – The goal of this is to acquire sensitive information like
passwords and credit card details. It is done by sending you link to provide your
information.
Spam
- These are unwanted emails mostly from bots or advertisements.
Phishing
- The goal of this is to acquire sensitive information like passwords and credit card
details. It is done by sending you link to provide your information.
Pharming
- A more complicated way of phishing where it exploits the DNS
Evil Twins
- A wireless network that pretends to offer trustworthy Wi-fi connections to the
internet.
Click Fraud
- Occurs when user or individual or computer program prudently clicks on online
add without any intention of learning more about the advertiser.
Identity Theft
- Theft of personal information to impersonate someone.
Information Leaks
- It is when information is revealed to the public or given to unauthorized user.
May also refer to “Data Breach”.
Hacker
- Someone who accesses a computer by circumventing and breaching its security
system.
Hacking
- It is defined as showing computer expertise in achieving a goal.
Types of Hackers
o Professional Hackers
o Script Kiddies
o Underemployed Adult Hackers
o Ideological Hacker
o Criminal Hackers
o Corporate Hackers
o Disgruntled Employees

You might also like