This document discusses introduction to information and communication technology (ICT). It begins by defining ICT and its evolution from early writing systems to modern computers and networking. It then examines the usage of ICT in different aspects of everyday life such as education, banking, industry and e-commerce. The differences between computerized and non-computerized systems are highlighted. The impacts of ICT on society and issues around computer ethics, laws, crime and security are also summarized.
The impact of information technology on society, explores how technology has affected areas of business, law enforcement and even the home. Created for CAPE information technology unit 2 by S. Bloomfield
Information and Communication Technologies (ICTs)
is a broader term for Information Technology (IT), which refers to all communication technologies, including the internet, wireless networks, cell phones, computers, software, middleware, video-conferencing, social networking, and other media applications and services
The impact of information technology on society, explores how technology has affected areas of business, law enforcement and even the home. Created for CAPE information technology unit 2 by S. Bloomfield
Information and Communication Technologies (ICTs)
is a broader term for Information Technology (IT), which refers to all communication technologies, including the internet, wireless networks, cell phones, computers, software, middleware, video-conferencing, social networking, and other media applications and services
Information Technologies are systems of hardware and/or software that capture, process, exchange, store and/or present information using electrical, magnetic and/or electromagnetic energy.
IT or information Technologies are playing wide role in daily life
Information and communication technology:a class presentationSelim Reza Bappy
its a powerpoint presentation of the student of hon's 2nd year (2012-13)of the department of Information Science and Library Management of the University of dhaka. It will be helpfull for the junior.
History and Introduction to Information and Communication TechnologyFaraz Ahmed
Information
Communication
Technology
TECHNOLOGY TIMELINE
EVOLUTION OF COMPUTERS
COMPUTER GENERATIONS
FIRST GENERATION
SECOND GENERATION
Third generation
Fourth Generation
NEW ERA COMPUTER
USAGE OF ICT IN DAILY LIFE
EDUCATION
BANKING
INDUSTRY
E-Commerce
COMPUTERISED AND NON- - COMPUTERISED
SYSTEMS
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
Information Technologies are systems of hardware and/or software that capture, process, exchange, store and/or present information using electrical, magnetic and/or electromagnetic energy.
IT or information Technologies are playing wide role in daily life
Information and communication technology:a class presentationSelim Reza Bappy
its a powerpoint presentation of the student of hon's 2nd year (2012-13)of the department of Information Science and Library Management of the University of dhaka. It will be helpfull for the junior.
History and Introduction to Information and Communication TechnologyFaraz Ahmed
Information
Communication
Technology
TECHNOLOGY TIMELINE
EVOLUTION OF COMPUTERS
COMPUTER GENERATIONS
FIRST GENERATION
SECOND GENERATION
Third generation
Fourth Generation
NEW ERA COMPUTER
USAGE OF ICT IN DAILY LIFE
EDUCATION
BANKING
INDUSTRY
E-Commerce
COMPUTERISED AND NON- - COMPUTERISED
SYSTEMS
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
SEE MORE, INCLUDING A FREE TRIAL, AT: www.PivotTable-Pro.com
This video introduces you to Microsoft Excel 2013 and its program window.
Free Excel Training Course: http://www.SpreadsheetTrainer.com
Contents:
***Introduction - What is Microsoft Excel?***
***The Excel Program Window***
Program Window - Border & Title
How to Maximise the Excel Window
How to Minimise the Excel Window
How to Close the Excel Window
***The Excel Ribbon***
How to Hide & Show the Ribbon
What is the Excel Ribbon?
What are Groups?
What are Command Buttons?
What are Smart Tags?
What are Dialog Boxes?
What is the File tab & Backstage Menu?
The Excel Ribbon Shrinks When you Resize the Window
***Other Program Window Elements***
What is the Quick Access Toolbar?
What is the Name Box?
What is the Formula Bar?
How to Resize the Formula Bar
What is the Status bar?
Where are the View shortcuts?
How to use the Scroll Bars
What is the Spreadsheet Area?
What is the Mini Toolbar?
SEE MORE, INCLUDING A FREE TRIAL, AT: www.PivotTable-Pro.com
This presentation demonstrates how AutoCorrect works as you enter text and formulas, and shows how you can add or remove AutoCorrect rules.
Contents:
***Using AutoCorrect***
How AutoCorrect Works
Undoing AutoCorrect Changes
How AutoCorrect Changes Capitalizations
***AutoCorrect Settings***
Turning AutoCorrect Rules On or Off
Entering Custom AutoCorrect Rules
Setting Exceptions to Capitalization Rules
Topics Covered:
=================================================
Origins and growth of e-commerce
Potential limitations on growth of B2C e-commerce
Visions, assessing, predictions & major themes of e-commerce
Major academic discipline contributing to e-commerce research
Case Study: Napster Rocked. But was it Legal?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
Where Is Information Technology Headed? This topic is briefly explained by Mikial Singh Nijjar. Mikial Singh Nijjar is a magnificent and skilled IT manager in Oakland, California.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
1 ICT in Society
1. INTRODUCTION TO ICT
• ICT
• EVOLUTION OF COMPUTER
• USAGE OF ICT IN EVERYDAY LIFE
• DIFFERENCES BETWEEN COMPUTERIZED AND NON-
COMPUTERISED SYSTEM
• IMPACT OF ICT ON SOCIETY
• COMPUTER ETHICS AND LEGAL ISSUES
• CONTROVERSIAL CONTENTS AND CONTROL
• COMPUTER CRIME
• COMPUTER SECURITY
• SECURITY MEASURE
2. ICT
• Information refer to the knowledge obtained from
reading, investigation, study or research.
• Communication ia an act of transmitting message. It
is a process whereby information is exchanged
between individuals using symbols, signs or verbal
interactions.
• Technology is the use of scientific
knowledge,experience and resources to create
processes and products that fulfill human needs.
• ICT is the technology required for information
processing, in particular the use electronic computers,
communication devices and application software to
convert, store, protect, process, transmit and retreive
information from anywhere, anytime.
3. EVOLUTION OF COMPUTERS
1. 3500 BC : The Summerians develop cuneiform writing
2. In 1500 BC : The Phoenicians develop the alphabet
3. In 105 BC : Tsai lun of china invented paper
4. In 1454 : Creation of a printing machine
5. In 1793 : Telegraph line was invented
6. In 1876 : Telephone was introduce
7. In 1925 : Television was introduce
8. In 1941 : Computer was created
9. In 1958 : Photocopier machine was introduced
10. In 1963 : The communication satellite was introduced
11. In 1969 : The first internet known as ARPANET was
introduced
4. GENERATION OF COMPUTERS
First generation 1940-1956 - VACUUM TUBE
• used vacuum tube
• electronic tube made by glass used as computer components to
store and process data
• ENIAC is first generation computer that contains of weights of 30
tons,18000 vacuum tubes, 30-50 foot space and 16000 watts of
power
Second generation computers(1956-1963) - TRANSISTOR
• Transistors replace vacuum tubes. Transistors are small devices
that transfer electronic signal across resistor.
• Transistor do not produced lots of heats and use less power also
faster, cheaper and smaller than vacuum tubes.
5. GENERATION OF COMPUTERS
Third generation computers(1964-1971) - INTERGRATED
CIRCUIT
• Integrated circuits (IC) replaced transistor.
• An IC is a complete electronic circuit on a small chip made of
silicone.
• IC was reliable, compact and cheaper than transistors.
Fourth generation computers(1971-present) -
MICROPROSESSOR
• Microprocessor was introduced, from thousand of integrated
circuits change onto single silicone chip.
• The Intel 4004 chip developed in 1971, located all the components
of the computer from the central processing units and memory to
input/output controls on a single chip.
• Computer is 100 times smaller than ENIAC computer in first
generation.
6. GENERATION OF COMPUTERS
Fifth generation computer(present – beyond)
• Based on artificial intelligence are still in development though
there are some applications such as voice recognition that are
being used today
7. USAGE OF ICT IN EVERYDAY LIFE
A. Education
• Teachers use computers to research for teaching materials,
participate in online forums and online conferences.
• Students use the computers as a reference tool and browse the
Internet.
• Researchers use computers to collect and process data.
• School administrators use computers for administrative
purposes to make sure that the entire operation runs smoothly.
8. USAGE OF ICT IN EVERYDAY LIFE
B. Banking
• Electronic Banking Services:
Automated Teller Machine (ATM),Cheque Deposit,Electronic
Fund Tranfer, Direct Deposit, Pay by phone system, Personal
computer / internet banking.
• Customers can make any transactions at the 24 hour service
centres or via online.
• Businessmen using the online services , access company
accounts for loan applications, business transactions and
update their cash flow at any time.
• Bank administrators can oversee the entire banking activities
such as reconciliations, inter-branch transactions (IBT),
telegraphic transfer and others by referring to the banking
system.
9. USAGE OF ICT IN EVERYDAY LIFE
C. Industry
• Computers are used to facilitate production planning and
control systems
• Computers help Workers operate machines.
• Computers help Researchers to analyse and collect research
data for future reference.
• Administrators use computers to oversee and control the
entire operations in the factory.
10. USAGE OF ICT IN EVERYDAY LIFE
D. E-Commerce
• makes buying and selling activities easier, more efficient and
faster.
• Customers use computers online with suppliers to purchase
products.
• Suppliers keep track of their transactions. All products are bar
coded and can be read by the computer scanner to help in
determining prices and managing inventory.
• Employees use computers and telephones to communicate with
their customers for any enquiries.
11. DIFFERENCES BETWEEN COMPUTERISED
AND NON-COMPUTERISED SYSTEM
BEFORE ICT AFTER ICT
BANKING Banking was done manually by Transactions are done by
taking deposits directly. computers.
Transactions can only be made Transaction can be done at
during working hours. anytime and place.
Takes time to approve any loanFast : online services, phone
applications. banking system, credit cards
are available.
INDUSTRY Production was slow because Production fast : can be
done manually and depended on increased through an all day
human labour operation
E- Trading using the barter system Distribution, buying, selling
COMMERCE and currency. and servicing products that
Advertisement was in the form of are done electronically.
word of mouth, billboards and
printed flyers.
Trading extremely slow, late and
expensive.
EDUCATION Teachers use chalk and talk for Teachers use computers to
teaching, forums and conferences research for teaching
materials, participate in
online forums and online
conferences
12. IMPACT OF ICT ON SOCIETY
POSITIVE IMPACTS
• Faster communication speed.
• Lower communication cost.
• Can share opinions and information.
• Paperless environment.
• Information and communication borderless through internet.
NEGATIVE IMPACTS
• Can be negative because it courage people to access pornography
and violence web sites.
• Can harm uses for long hours used.
14. Computer ethics
• is a system of moral standards or values used as a guideline
for computer users.
Code of ethics
• is guidelines in ICT that help determine whether a specific
computer action is ethical or unethical.
Intellectual Property
• refers to works created by inventors, authors and artists.
Privacy
• refers to the right of individuals and companies to deny or
restrict and collection and used of information about them.
Computer Crime
• is any illegal acts involving computers.
Cyber law
• refers to any laws relating to protecting the Internet and other
online communication technologies
15. DIFFERENCES BETWEEN ETHICS AND LAW
Ethics Law
As a guideline to computer As a rule to control computer
users users.
Ethical behavior is judged by To prevent misuse of computers.
moral standards.
Computer users are free to Computer users must follow the
follow or ignore the code of regulations and law.
ethics.
No punishment for anyone who Penalties , Imprisonments and
violates ethics. other PUNISHMENTS.
Universal, can be applied Depend on country and state
anywhere, where the crime is committed.
all over the world.
Not following ethics are called Not obeying laws are called
immoral crime.
16. THE NEED FOR INTELECTUAL
PROPERTY LAWS
• Copyrights for materials
• Trademarks for brand identity
• Patents for inventions
• Design for product appearance
17. WAYS TO PROTECT PRIVACY
Privacy can be protected by:
A. PRIVACY LAW
• The privacy laws in Malaysia :
Security Services to review the security policy
Security Management to protect the resources
Security Mechanism to implement the required security
services
Security Objects, the important entities within the system
environment
B. UTILITIES SOFTWARE
• Install anti-spam program, firewall, anti-spyware and
antivirus
• Purchase goods with cash rather than credit card
• Clear your history file when you are finished browsing
• Fill in only necessary information on warranty and
registration form.
18. AUTHENTICATION AND VERIFICATION
METHODS/ TECHNOLOGY
Authentication is a process where users verify their identity.
Authentication deals with the problem of determining whether a
user should be allowed access to a particular system.
METHODS OF AUTHENTICATION
• Biometric device is a device that translates personal
characteristics into a digital code that is compared with a
digital code stored in the database.
• Callback system refers to the checking system that
authenticates the user
• Verification is the act of proving or disproving the
correctness of a system with respect to a certain formal
specification
19. AUTHENTICATION AND VERIFICATION
METHODS/ TECHNOLOGY
METHODS OF VERIFICATION
• 2 methods :
• User identification refers to the process of validating the
user.
• Processed object refers to something the user has such as
identification card, security token and cell phone
21. CONTROVERSIAL CONTENTS OF
PHONOGRAPHY ON SOCIETY
Pornography:
Any form of media or material (books,video,photos) that show
erotic behavior and intended to cause sexual excitement.
• can lead to criminal acts such as exploitation of women and
children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or
children
• can erode good religious, cultural and social beliefs and
behavior
22. CONTROVERSIAL CONTENTS OF
PHONOGRAPHY ON SOCIETY
Slander :
Is a false spoken statement about someone, intended to damage his
reputation.
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumors
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another
person
23. THE PROCESS OF FILTERING TO CONTROL
ACCESS TO CONTROVERSIAL CONTENTS
Internet Filtering
• Keyword blocking.
Uses a list of banned word or objects terms such as xxx, sex,
and nude. The filter searches, If found, it will blocked.
• Site blocking.
Use software to list the websites that will be blocked by
using software. The software prevents users from being access
the web sites on list.
• Web rating system.
Web sites are rating in terms of nudity, sex, violence and
language. Can be done by setting the browser to only
accept page with certain level of ratings.
25. CYBER LAW
refers to any laws relating to protecting the Internet and other
online communication technologies.
• Examples of Malaysian cyber laws :
Digital Signature Act 1997
• A digital signature or digital signature scheme is a
mathematical scheme for demonstrating the
authenticity of a digital message or document.
• A valid digital signature gives a recipient reason to
believe that the message was created by a known
sender such that they cannot deny sending it
(authentication and non-repudiation) and that the
message was not altered in transit (integrity).
• Digital signatures are commonly used for software
distribution, financial transactions, and in other cases
where it is important to detect forgery or tampering.
26. CYBER LAW
Computer Crimes Act 1997.
Telemedicine Act 1997
Communications and Multimedia Act 1998.
Private Data Protection Bill
Electronic Government Activities Bill
Electronic Transactions Bill
The needs of cyber law are:
Integrity and security Information
Legal status of online transactions
Privacy and confidentially of information
Intellectual property rights
Security of government Data
27. COMPUTER CRIME
Computer fraud
• defined as having an intention to take advantage over or
causing loss to other people through the use of computers.
• Eg: e-mail hoaxes, program fraud, investment schemes, sales
promotions and claims of expertise on certain fields.
Copyright infringement :
• defined as a violation of the rights secured by a copyright.
• Eg: illegal copy or reproduction of copyrights material by the
black market group.
Computer theft :
• defined as the unauthorized use of another person’s
property with the intention to deny the owner the rightful
possession of that property or its use.
• Examples:
• transfer of payments to the wrong accounts
• get online materials with no cost
28. COMPUTER CRIME
Computer theft :
• defined as the unauthorized use of another person’s
property with the intention to deny the owner the rightful
possession of that property or its use.
• Examples:
transfer of payments to the wrong accounts
get online materials with no cost
tap into data transmission lines on database at no cost
divert goods to the wrong destination
29. COMPUTER CRIME
Computer attack :
• defined as any activities taken to disrupt the equipment of
computer systems, change processing control or corrupt
stored data.
• Eg:
• Physical attack that disrupt the computer facility or its
transmission lines.
• An electronic attack that uses the power of electromagnetic
energy to overload computer circuitry.
• a computer network attack that uses a malicious code to
exploit a weakness in software, or in the computer security
practices of a computer user
31. Computers security means
• protecting our computer systems and the information
• they contains against unwanted access, damage,
• destruction or modification.
Types of computer Security
• Hardware security
• Software security/data security
• Network security
32. THE DIFFERENT THREATS TO
COMPUTER SECURITY
Malicious code known as a rouge program.
• It is a treat to computing assets by causing undesired
effects in the programmer’s part. The effect cause by agent,
with the intention to cause damage.
• The agent for malicious code is the writer of the code, or any
person who causes its distribution. There are various kinds of
malicious code.
• They include virus, Trojan horse, logic door, trapdoor and
backdoor, worm and many others.
Hacking is a source of threat to security in computer. It is
defined as unauthorized access to the computer system by a
hacker.
• Hackers are persons who learn about the computer system in
detail. They write program referred to as hacks. Hackers may
use a modem or cable to hack the targeted computers.
33. THE DIFFERENT THREATS TO
COMPUTER SECURITY
Natural Disaster mean Computers are threatened by natural
or environmental disaster. Be it at home, stores, offices and also
automobiles.
• Examples of natural and environmental disasters:
Flood, Fire, Earthquakes, storms and tornados, Excessive
Heat, Inadequate Power Supply
Computer theft is unauthorized use of another person’s property
with the intention to deny the owner.
• Two types of Computer theft:
Computer is used to steal money, goods, information
and resources.
Stealing of computer, especially notebook and PDAs
35. THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
1. ANTIVIRUS
• An antivirus program protects a computer against viruses
• Examples: virus, worm or Trojan horse.
2. HUMAN ASPECTS
• Refer to the user and also the intruder of a computer
system.
• Example: Most common problem is the lack of achieving a
good information security procedure.
3. DATA BACKUP
• Data Backup is a program of file duplication.
• Importance information can be backups daily, weekly or
biweekly from a hard disk.
4. FIREWALL
• Hardware or software which functions in a networked
environment to prevent some communications forbidden by
the security policy.
36. THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
4. FIREWALL
• Hardware or software which functions in a networked
environment to prevent some communications forbidden by
the security policy.
• 3 types :
PROXY
SCREENING ROUTERS GUARD
GATEWAY
Simplest Somewhat Most complex
complex
See only add & service See full text of See full text of
protocol type communication communication
Screen based on Screen based on Screens based on
connection rules behaviour interpretion of
proxies message content
37. THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
5. CRYPTOGRAPHY
• Is a process of hiding information by altering the actual
information into different representation.
• Example, an APA can be written as I? X.
• PLAINTEXT > Encryption > CIPHERTEXT > Decryption >
PLAINTEXT
38. THE APPROPRIATE SECURITY MEASURES TO
OVERCOME THE IDENTIFIED COMPUTER
THREATS
6. ANTI-SPYWARE
• Is a program placed on a computer without the user’s
knowledge. It secretly collects information about the user.
• Examples popular anti-spyware programs :
• Spybot Search and Destroy
• Ad-aware
• Spyware Blaster
Security Threats Security Measures
MALICIOUS CODE ANTIVIRUS AND ANTI-SPYWARE
HACKING FIREWALL
NATURAL DISASTER DATA BACKUP
THEFT HUMAN ASPECTS
HACKING FIREWALL
39. APPLY THE CORRECT SECURITY PROSEDURES
• Antivirus • Firewall
• Anti-spyware • Data backup
• Cryptography • Human aspects
SECURITY THREATS SECURITY MEASURES
MALICIOUS CODE ANTIVIRUS AND ANTI-SPYWARE
HACKING FIREWALL
NATURAL DISASTER DATA BACKUP
THEFT HUMAN ASPECTS
HACKING FIREWALL
40. RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
Security threats may come from in many forms.
• Example: when someone is invading your account information
from a trusted bank, this act is considered as a security threat.
Security measures can be used to prevent this invader from
getting the account information.
• Example: the bank can use a firewall to prevent unauthorised
access to its database.
MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI-
SPYWARE
• Security threats include virus, Trojan horse, logic bomb,
trapdoor and backdoor, and worm.
• Antivirus and anti-spyware can be used to protect the computer
from the threats by:
• limiting connectivity
• allowing only authorised media for loading data and software
41. RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
MALICIOUS CODE THREATS VS. ANTIVIRUS AND ANTI-
SPYWARE
• Security threats include virus, Trojan horse, logic bomb,
trapdoor and backdoor, and worm.
• Antivirus and anti-spyware can be used to protect the computer
from the threats by:
limiting connectivity
allowing only authorised media for loading data and software
enforcing mandatory access controls
blocking the virus from the computer program
42. RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
HACKING VS. FIREWALL
• Hacking is an unauthorised access to the computer system done
by a hacker. We can use firewall or cryptography to prevent the
hacker from accessing our computers.
• A firewall permits limited access to unauthorised users or any
activities from the network environment. Cryptography is a
process of hiding information by changing the actual
information into different representation, for example, an APA
can be written as 7&*.
43. RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
NATURAL DISASTER VS. DATA BACKUP
• The natural and environmental disasters may include: flood, fire,
earthquakes, storms , tornados
• Natural disasters may threaten a computer’s hardware and
software easily. Computers are also sensitive to their operating
environment such as excessive heat or the inadequacy of power
supply.
• The backup system is needed to backup all data and applications
in the computer. With the backup system, data can be recovered
in case of an emergency.
44. RELATIONSHIP BETWEEN SECURITY
THREAT AND SECURITY MEASURE
THEFT VS. HUMAN ASPECTS
• Computer theft can be of two kinds:
• can be used to steal money, goods, information and computer
resources
• the actual stealing of computers, especially notebooks and PDAs
• Measures that can be taken to prevent theft:
prevent access by using locks, smart-card or password
prevent portability by restricting the hardware from being
moved
detect and guard all exits and record any hardware
transported