SlideShare a Scribd company logo
The Effects of Using IT
Software Copyright
Hacking
Viruses
Employment Patterns
IT in the home
Information from the Internet
Software Copyright
 When a person creates an original piece of work they
are given certain rights that are meant to protect their
work from other people claiming it as their own.
 In the United Kingdom the law that defines copyright is
known as The Copyright Designs and Patents Act 1988
 Upon purchase of a piece of commercial software the
rights of the creator are stated in the licence agreement
that must be agreed to before the software can be
installed. This agreement also tells the purchaser what
can and can't be done with the software.
Network Security
Security on a network can involve more
than just passwords. The following are the
key features of network security that you
should be aware of...
Authentication
Encryption
Firewalls
Physical Security
Authentication
Authentication is the process of confirming
the identification of a user/computer. This
can be done in many ways.
Authentication often consists of a publicly
known username and either
a password
biometric security
Username & Password
The purpose of a username is to identify a
person to the network.
A password is then required to confirm
that the person is the real owner of the
username.
Usernames are may be known to other
people but passwords should not be.
Biometric Security
 Passwords can be discovered by unauthorised people.
Biometric security involves using some measurable
physical feature of a person to confirm their identity.
 The person must first register which involves actually
recording the physical data.
 This is then stored and each time the user logs on the
measured data is compared with the stored data to
check for a match.
 Examples include
 Fingerprint recognition
 Iris scanning
 Retinal scanning
Encryption
 Encryption means converting meaningful data
into a form that cannot be understood by an
unauthorised person
 The process usually involves one or more keys
to encrypt and decrypt the data
 Encryption is usually performed before private
data is transmitted over a network. The
unencrypted data, which is known as cleartext,
is encrypted to form the unreadable cipher text.
At the recieving end if the user has the required
key the cipher text is decrypted into cleartext
again.
Firewalls
A firewall blocks certain types of network
traffic. Works in both directions, preventing
unauthorised traffic from being sent out
onto the network or from being sent to the
computer from the network.
Physical security
Lots of money is spent on layers and
layers of network security. However none
of it is any good if you leave the door to
the server room open and have no
security on the front door.
Viruses
 A computer virus is a computer program that can copy itself and
infect a computer without permission or knowledge of the user.
 Not all viruses are meant to cause damage to infected systems
allthough some are, generally they are just designed to replicate
themselves and in some way call attention to themselves at some
time in some way or another.
 The standard type of question that comes up about viruses is how to
prevent them infecting a computer. The following are the key points
to consider...
 Install anti-virus software
 Keep the anti-virus definitions up-to-date
 Avoid opening email attachments from unknown sources
 Definitely avoid opening executable attachment e.g. files ending
in .exe or .scr, files that can contain macros e.g. .mdb and etc. (it's
a long list!).
Employment Patterns
This sections can be split into two main
themes
Reduced employment due to use of ICT
systems doing jobs people used to do
Increased employment due to new jobs
being created to create and maintain ICT
systems
IT in the home
The tasks people used to spend hours
performing such as washing cloths or
heating the building are now performed by
a variety of computer controlled devices.
This has led to increased leisure time.
However the increased leisure time has
not led to an increased amount of social
interaction or the need to go outdoors.
Information from the Internet
 Reliability
 The Internet has led to easily available
information on almost any subject from sources
like Wikipedia or Google.
 However because anyone can place information
on the WWW it has become more important to
consider the reliabilty of the information.
 With traditional paper based encyclopaedias the
authors work would be checked by other people
before publication but this doesn't always
happen with Internet based information sources.
Undesirable Information
 One of the hottest topics about Internet based
information is censorship.
 Censorship means to remove material that is considered
unnaceptable so that others cannot see it.
 The problem is that different people have different ideas
about what should be censored.
 Schools often censor the information that students can
get from the Internet and this can be done using a proxy
server. Software is also available for parents to prevent
their children from browsing undesirable web sites and to
monitor the sites that they do visit.
Security
 Many people send personal information to others via email or
perform banking over the Internet.
 The problem is that if a criminal knows how, this information being
sent can be read and used for anti-social purposes.
 Banks, in particular, spend lots of money on securing their Internet
based business.
 You should look for the following features on a web page to check it
is secure before sending financial information over the Internet...
 The web page address should begin https
 There should be a pad lock symbol somewhere which you can click
on to see the security information
 Also the following are important
 Avoid using a public computer, Internet Cafe etc., to send banking
information.
 Make sure no one can see what you are typing!

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Arnav Chowdhury
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
Bavijesh Thaliyil
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
Rahul Nayan
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
Awais Haider
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
RitamaJana
 
Name parul
Name parulName parul
Name parul
Parul231
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
Rohit Srivastava
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
zaarahary
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
Milan Kapoor
 
Cyber security
Cyber securityCyber security
Cyber security
TanmoyMaitra
 
Computer security
Computer securityComputer security
Computer security
RoshanMaharjan13
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Hamza
HamzaHamza
Hamza
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
GuardianGabriel
GuardianGabrielGuardianGabriel
GuardianGabriel
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Name parul
Name parulName parul
Name parul
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 

Similar to Effects of using IT

Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
Best Online Paper Writing Service
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
Asim Sourav Rath
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Network security ppt
Network security pptNetwork security ppt
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
MijanurSepai1
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
KellyIsaac3
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
ME1923SoumyaSouravNa
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
Network Security
Network SecurityNetwork Security
Network Security
Beth Hall
 

Similar to Effects of using IT (20)

Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information security
Information securityInformation security
Information security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 

More from Mirza Ćutuk

Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__Mirza Ćutuk
 
Data
DataData
Types of processing
Types of processingTypes of processing
Types of processing
Mirza Ćutuk
 
Computer models and simulations
Computer models and simulationsComputer models and simulations
Computer models and simulations
Mirza Ćutuk
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applications
Mirza Ćutuk
 
LAN Network types
LAN Network typesLAN Network types
LAN Network types
Mirza Ćutuk
 
Hardware and input devices
Hardware and input devicesHardware and input devices
Hardware and input devices
Mirza Ćutuk
 
Expert systems
Expert systems Expert systems
Expert systems
Mirza Ćutuk
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
Mirza Ćutuk
 
Online banking
Online bankingOnline banking
Online banking
Mirza Ćutuk
 

More from Mirza Ćutuk (10)

Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__Anthony giddens sociology_5th_edition__
Anthony giddens sociology_5th_edition__
 
Data
DataData
Data
 
Types of processing
Types of processingTypes of processing
Types of processing
 
Computer models and simulations
Computer models and simulationsComputer models and simulations
Computer models and simulations
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applications
 
LAN Network types
LAN Network typesLAN Network types
LAN Network types
 
Hardware and input devices
Hardware and input devicesHardware and input devices
Hardware and input devices
 
Expert systems
Expert systems Expert systems
Expert systems
 
Backing storage media
Backing storage mediaBacking storage media
Backing storage media
 
Online banking
Online bankingOnline banking
Online banking
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

Effects of using IT

  • 1. The Effects of Using IT Software Copyright Hacking Viruses Employment Patterns IT in the home Information from the Internet
  • 2. Software Copyright  When a person creates an original piece of work they are given certain rights that are meant to protect their work from other people claiming it as their own.  In the United Kingdom the law that defines copyright is known as The Copyright Designs and Patents Act 1988  Upon purchase of a piece of commercial software the rights of the creator are stated in the licence agreement that must be agreed to before the software can be installed. This agreement also tells the purchaser what can and can't be done with the software.
  • 3. Network Security Security on a network can involve more than just passwords. The following are the key features of network security that you should be aware of... Authentication Encryption Firewalls Physical Security
  • 4. Authentication Authentication is the process of confirming the identification of a user/computer. This can be done in many ways. Authentication often consists of a publicly known username and either a password biometric security
  • 5. Username & Password The purpose of a username is to identify a person to the network. A password is then required to confirm that the person is the real owner of the username. Usernames are may be known to other people but passwords should not be.
  • 6. Biometric Security  Passwords can be discovered by unauthorised people. Biometric security involves using some measurable physical feature of a person to confirm their identity.  The person must first register which involves actually recording the physical data.  This is then stored and each time the user logs on the measured data is compared with the stored data to check for a match.  Examples include  Fingerprint recognition  Iris scanning  Retinal scanning
  • 7. Encryption  Encryption means converting meaningful data into a form that cannot be understood by an unauthorised person  The process usually involves one or more keys to encrypt and decrypt the data  Encryption is usually performed before private data is transmitted over a network. The unencrypted data, which is known as cleartext, is encrypted to form the unreadable cipher text. At the recieving end if the user has the required key the cipher text is decrypted into cleartext again.
  • 8.
  • 9. Firewalls A firewall blocks certain types of network traffic. Works in both directions, preventing unauthorised traffic from being sent out onto the network or from being sent to the computer from the network.
  • 10. Physical security Lots of money is spent on layers and layers of network security. However none of it is any good if you leave the door to the server room open and have no security on the front door.
  • 11. Viruses  A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  Not all viruses are meant to cause damage to infected systems allthough some are, generally they are just designed to replicate themselves and in some way call attention to themselves at some time in some way or another.  The standard type of question that comes up about viruses is how to prevent them infecting a computer. The following are the key points to consider...  Install anti-virus software  Keep the anti-virus definitions up-to-date  Avoid opening email attachments from unknown sources  Definitely avoid opening executable attachment e.g. files ending in .exe or .scr, files that can contain macros e.g. .mdb and etc. (it's a long list!).
  • 12. Employment Patterns This sections can be split into two main themes Reduced employment due to use of ICT systems doing jobs people used to do Increased employment due to new jobs being created to create and maintain ICT systems
  • 13. IT in the home The tasks people used to spend hours performing such as washing cloths or heating the building are now performed by a variety of computer controlled devices. This has led to increased leisure time. However the increased leisure time has not led to an increased amount of social interaction or the need to go outdoors.
  • 14. Information from the Internet  Reliability  The Internet has led to easily available information on almost any subject from sources like Wikipedia or Google.  However because anyone can place information on the WWW it has become more important to consider the reliabilty of the information.  With traditional paper based encyclopaedias the authors work would be checked by other people before publication but this doesn't always happen with Internet based information sources.
  • 15. Undesirable Information  One of the hottest topics about Internet based information is censorship.  Censorship means to remove material that is considered unnaceptable so that others cannot see it.  The problem is that different people have different ideas about what should be censored.  Schools often censor the information that students can get from the Internet and this can be done using a proxy server. Software is also available for parents to prevent their children from browsing undesirable web sites and to monitor the sites that they do visit.
  • 16. Security  Many people send personal information to others via email or perform banking over the Internet.  The problem is that if a criminal knows how, this information being sent can be read and used for anti-social purposes.  Banks, in particular, spend lots of money on securing their Internet based business.  You should look for the following features on a web page to check it is secure before sending financial information over the Internet...  The web page address should begin https  There should be a pad lock symbol somewhere which you can click on to see the security information  Also the following are important  Avoid using a public computer, Internet Cafe etc., to send banking information.  Make sure no one can see what you are typing!