This document provides an overview of information and communication technology (ICT) and discusses its usage, impacts, and related ethical and legal issues.
[1] ICT refers to technologies that are used to store, process, transmit and retrieve information electronically. Examples of its everyday usage include education, banking, industry, and e-commerce.
[2] Both positive and negative impacts of ICT on society are discussed. Positively, it enables faster communication, lower costs, and borderless sharing of information. Negatively, it can encourage access to inappropriate content and prolonged computer use can harm health.
[3] Ethical and legal issues surrounding ICT like privacy, intellectual property, computer crimes
It provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. Introduced by Pramod Mahajan, Minister of
Communications and Information Technology.
This slide will discuss about history of hacking, the purpose and effect of hacking, the steps that can be used to help prevent hacking from occurring. Also being discussed are hacktivism, or political hacking in Malaysia and solution taken and the law implemented in Malaysia.Malaysia and Solution implemented
It provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. Introduced by Pramod Mahajan, Minister of
Communications and Information Technology.
This slide will discuss about history of hacking, the purpose and effect of hacking, the steps that can be used to help prevent hacking from occurring. Also being discussed are hacktivism, or political hacking in Malaysia and solution taken and the law implemented in Malaysia.Malaysia and Solution implemented
Technology is negative only in the hands of people who do not realize that they are one and the same process as the universe.
tips to avoid cyber crime:
Ignore the unwanted messages or e-mails
Protect your e-identity (electronic identity)
Never store your own details on any mobile device (Secure mobile devices)
If in doubt, block
Ignore pop-ups
Only shop online on secure sites
Different site, different passwords (don’t use same key for all locks)
Lock down your FB account
Always make sure that login pages use SSL and that the login pages starts with https://
Introduction to Cyber Wrongs, Conventional Crimes and Torts Through Computers,
Crimes and Torts Committed on a Computer Network and Relating to Electronic
Mail, Crimes Relating to Data Alteration/Destruction, Issues of Jurisdiction and
Applicable Law in Cyberspace, Enforcement Issues in Cyberspace, Online Dispute
Resolution, cyber stalking; cyber pornography; forgery and fraud; crime related to
IPRs; Cyber terrorism; computer vandalism
Technology is negative only in the hands of people who do not realize that they are one and the same process as the universe.
tips to avoid cyber crime:
Ignore the unwanted messages or e-mails
Protect your e-identity (electronic identity)
Never store your own details on any mobile device (Secure mobile devices)
If in doubt, block
Ignore pop-ups
Only shop online on secure sites
Different site, different passwords (don’t use same key for all locks)
Lock down your FB account
Always make sure that login pages use SSL and that the login pages starts with https://
Introduction to Cyber Wrongs, Conventional Crimes and Torts Through Computers,
Crimes and Torts Committed on a Computer Network and Relating to Electronic
Mail, Crimes Relating to Data Alteration/Destruction, Issues of Jurisdiction and
Applicable Law in Cyberspace, Enforcement Issues in Cyberspace, Online Dispute
Resolution, cyber stalking; cyber pornography; forgery and fraud; crime related to
IPRs; Cyber terrorism; computer vandalism
Personal Data Protection Act - Employee Data PrivacylegalPadmin
Speech by Pn Adlin Abdul Majid, Advocate & Solicitor from Lee Hishamuddin, given in Labour Law Seminar held by Legal Plus Sdn. Bhd (www.legalplus.com.my) on Apr 9, 2015
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
The presentation of 'Management Information System' subject of TEIT under 'University of Pune' INDIA. Author and Teacher: Tushar B Kute
http://www.tusharkute.com
tbkute@gmail.com
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
Cyber-crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cyber-crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. DEFINITION OF ICT
ICT is the technology required for
information processing, in
particular, the use electronics
computers, communication
devices and application software
convert, store, protect, process,
transmit and retrieve information
from anywhere, anytime.
3. THE USAGE OF ICT IN
EVERYDAY LIFE
Education
Students use computer to research for teaching materials,
participate in online forum and online conferences
Banking
Customers can make any transaction at 24 hours service
centre
Industry
To help in product design by using CAD (Computer Aided
Design)
E-commerce
To make buying and selling activities faster and more
efficient through internet.
4. DIFFERENCES BETWEEN COMPUTERISED &
NON-COMPUTERISED SYSTEM
COMPUTERIZED NON-COMPUTERIZED
All banking activities are All banking activities were
done by using computer done manually
system
Transaction can be done Transaction can only be
anywhere and anytime made during working
hours
It takes shorten time for It takes long time for any
any banking process banking process
More productive Less productive
5. THE POSITIVE IMPACT OF ICT ON
SOCIETY
Faster communication speed
Lower communication cost
People can share opinions and information through
discussion groups and forums through Internet
Paperless environment – information can be stored
and retrieved through the digital medium instead of
paper.
Information can communication can be borderless
through Internet
6. THE NEGATIVE IMPACT OF ICT ON
SOCIETY
Borderless information at time can be negative
because courage people to access pornography
and violence web sites.
Computers can harm users if they use for long
hours frequently.
7. 2.0 COMPUTER ETHICS AND LEGAL
ISSUES
Computer Ethics
Is a system of moral standards or moral
values used as a guideline for computer
users.
Code of Ethics
Is a guidelines in ICT that help determine
whether a specific computer action is
ethical or unethical
Intellectual Property
Is work created by inventors, authors and
artists.
8. Privacy
Refers to the right of individuals and
companies to deny or restrict the
collection and use of information about
them
Computer crime
Is any illegal acts involving computers
Cyber Law
Is any laws relating to protect the Internet
and other online communication
technologies
9. DIFFERENCES BETWEEN ETHICS AND
LAW
Ethics Law
As a guideline to computer As a rule to control
users computer users
Computer users are free Computer user must follow
to follow or ignore the code the regulations and law
of ethics
Universal, can be applied Depend on country and
anywhere, all over the state where the crime is
world committed
To produce ethical To prevent misuse of
computer users computers
No following ethics are No obeying laws are call
called immoral crime
10. INTELLECTUAL PROPERTY LAWS
Intellectual Property laws cover ideas, inventions,
literary creations, unique names, business modals,
industrial processes, computer program codes and
many more.
Four types of Intellectual Property are:
Patents for inventions
Trademarks for brand identity
Design for product appearance
Copyright for materials
12. CONTROVERSIAL CONTENTS AND
CONTROL
Pornography
Pornography is any form of media or material
that show erotic behavior and intended to cause
sexual excitement. The effects of pornography
on society are:
Can lead to criminal acts such as exploitation
of women.
Can lead sexual addiction
can develop lower moral values towards other
people
Can erode good religious, cultural, behaviors
and beliefs
13. Slander
Slander is a false spoken statement about
someone, intended to damage his or her
reputation. The effects of slander on society are:
Can develop society that disregards on
honesty and truth
Can lead to bad habits of spreading rumors
and untruth
Can cause people to have negative attitudes
towards another person
14. TOPICS THAT WE WILL LEARN
FOR TODAY
The process of filtering
Cyber law
15. THE PROCESS OF FILTERING
To control access to controversial contents.
The method of choice to limit access on the Internet
is to filter either by:
Keyword blocking
Site blocking
Web rating system
16. KEYWORD BLOCKING
This method uses a list of banned word or object
terms such as xxx, sex and nude. As the page is
downloading, the filter searches for any these
words. If found, it will blocked the page completely,
stop downloading the page, block the banned
words and even shut down the browser.
17. SITE BLOCKING
This method use software to list the web sites that
will be blocked by using software. The software
also prevents user from being access the web site
on list.
18. WEB RATING SYSTEM
Web sites are rating in terms of nudity, sex,
violence and language. The web sites rates can be
done by setting the browser to only accept pages
with certain level of ratings.
19. CYBER LAW
Cyber law is any laws relating to protect the Internet
and other online communication technologies.
Examples of cyber abuse on the users:
Sending a computer virus via e-mail
Harassment through e-mail
Hacking into your school’s database to change your
examination result
Why we need cyber law:
Cyber law are made to force people to be good
To give protection against the misuse of computers and
computer criminal activities
20. Malaysian Cyber Law
Computer Crime Act 1997
Copyright (Amendment) Bill 1997
Digital Signature Act 1997
Telemedicine Bill 1997
Communication and Multimedia Act 1998
Digital Signature Regulations 1998
22. COMPUTER FRAUD
Computer fraud is the crime of obtaining money by
deceiving (to trick) people through the use of
computers. There are many forms of computer
frauds which include
E-mail hoaxes (hoax – an attempt to make people
believe something that is not true)
Program fraud
Investment scheme
Sales promotions
Claim of expertise on certain fields
23. COPYRIGHT INFRINGEMENT
Copyright infringement is defined as a violation (an
action to break the law) of the rights secured by a
copyright. Copyright is the legal right to be the only
producer or seller of a book, song and film.
Infringement of copyright occurs when you break
the copyright law such as copying movie, software
or CD’s illegally – selling pirate software.
Piracy is the crime of illegally copying and selling
books, tapes, videos, computer programs.
24. COMPUTER THEFT
Computer theft is defined as the unauthorized used
of another person’s property. Example of computer
theft are
Transfer of payment to the wrong accounts
Get online material with no cost
Tap(memasuki) into data transmission line
25. COMPUTER ATTACKS
Computer attack is defined as any activities taken
to disrupt the equipments computer systems,
change processing controls and corrupt data.
Computer attack can be in the forms of:
Physical attack
An electronic attack
A computer network attck
26. COMPUTER SECURITY
Computer security means protecting our computer
system and the information they contain against
unwanted access, damage, destruction or
modification.
Computer security:
Computer threats
Security measures
28. MALICIOUS CODE
Malicious code is a computer program that perform
unauthorised processes on a computer or network.
There are various kinds of malicious code.
Virus
Worm
Logic bomb : Malicious code that goes off when
a specific condition occurs. Example: time bomb.
Trapdoor and backdoor : A feature in a program
that allows someone to access the program with
special privileges.
Trojan horse: program that performs a useful
task while the same time carry out some secret
destructive act.
29. DIFFERENCES BETWEEN WORM &
VIRUS
WORM VIRUS
Operates through the Spreads through any
network medium
Spread copies of itself Spread copies of itself
as a stand alone as a program that
program attaches to other
program
30. A COMPUTER INFECTED BY A VIRUS,
WORM OR TROJAN HORSE OFTEN HAS
ONE OR MORE OF THE FOLLOWING
SYMPTOMS:
Screen displays unusual message or image
Music or unusual sound plays randomly
Available memory is less than expected
Existing programs and files disappear
Files become corrupted
31. HACKING
Hacking refer to unauthorized access to the
computer system by a hacker.
A hacker is a person who accesses a computer or
network illegally.
A cracker also is someone who accesses a
computer or network illegally but has no intent of
destroying data, stealing information, or other
malicious action.
Both hacker and cracker have advanced computer
and network skills.
32. NATURE THREATS
Computer are also threatened by natural or
environmental disaster. Be it at home, stores,
offices and also automobiles.
Examples of natural and environmental disasters
are flood, fire, earthquakes, storms, tornados,
excessive heat and inadequate power.
33. THEFT
Two type of theft
(a) Computer is used to steal money, goods,
information and resources.
(b) Stealing of computers especially notebook and
PDA.
Three approaches to prevent theft:
(a) Prevent access by using locks, smart card or
password.
(b) Prevent portability by restricting the hardware
from being moved.
(c) Detect and guard all exits and record any
hardware.
34. SECURITY MEASURES
Security measures are measures taken as a
precaution against theft or espionage or sabotage
or possible danger or failure. Usually we use
antivirus, cryptography, firewall and data backup to
protect sensitive information.
Security procedures:
Anti-virus
Anti-spyware
Firewall
Backup
Cryptography
35. ANTI-VIRUS
Anti-virus is utility program that we use to protect a
computer against viruses by identifying and
removing computer viruses found in the computer
memory, computer storage or incoming e-mails
files.
Examples: Norton antivirus, AVG, Kaspersky,
Bitdefender and Nod32.
36. ANTI-SPYWARE
Anti-spyware is a utility program that we use to
protect the computers from spyware.
Spyware is software or computer program that is
designed secretly record and report an individual’s
activities on the Internet. Spyware usually enters
your system through the Internet, sometimes when
you open e-mail or download software especially
shareware and freeware.
Examples : Spybot Search and Destroy, Ad-aware
and Spyware Blaster.
37. FIREWALL
Firewall is a piece of hardware or software which
functions in a networked environment to prevent
some communications forbidden by security policy.
We use firewall to prevent hacking
38. BACKUP
Backup is utility program that makes a copy of all
files or selected files that have been saved onto a
disk.
Backup data is important when original data is
corrupted.
39. CRYPTOGRAPHY
Cryptography is a process of transforming plaintext
into ciphertext then back again.
Encryption is a process of converting plaintext into
ciphertext.
Decryption is the process of converting ciphertext
into plaintext.
We use cryptography to secure the information and
prevent hacking or unauthorized access.
Cipher = secret language
Plaintext encrypt Ciphertext
Plaintext decrypt Ciphertext
40. HUMAN ASPECT
Refer to the user and also the intruder of a
computer system. Human aspect security is the
hardest aspects to give protection to. The most
common problem of human aspect security is the
lack of achieving a good information security
procedure.