SlideShare a Scribd company logo
1 of 36
Topic 1.1 -
Introduction to Information and
   Communication Technology
1.1.1.1 Define ICT

   ICT IS THE TECHNOLOGY REQUIRED FOR
    INFORMATION PROCESSING, IN PARTICULAR, THE
    USE ELECTRONICS COMPUTERS, COMMUNICATION
    DEVICES AND APPLICATION SOFTWARE TO
    CONVERT, STORE, PROTECT, PROCESS, TRANSMIT
    AND RETRIEVE INFORMATION FROM ANYWHERE,
    ANYTIME.
   ICT ADALAH TKNOLOGI BERKAITAN PEMPROSESAN
    MAKLUMAT , DALAM KATA LAINNYA ADALAH
    BERKENAAN PENGGUNAAN KOMPUTER, PERANTI
    KOMUNIKASI DAN APLIKASI PERISIAN UNTUK
    MENUKAR , MENGAWASI, MEMPEROSES,
    MENGHUBUNG DAN MENGHASILKAN MAKLUMAT BILA-
    BILA DAN DI MANA SAHAJA
1.1.1.2 Describe the brief evolution of
         computers
FIRST GENERATION COMPUTERS(1940-1956)
 VACUUM TUBES WAS INTRODUCES, IS AN ELECTRONIC
  TUBE MADE OF GLASS USED AS COMPUTER COMPONENTS
  TO STORE AND PROCESS DATA.
 ENIAC IS FIRST GENERATION COMPUTER THAT CONTAINS
  WEIGHTS OF 30 TONS, 18000 VACUUM TUBES, 30-50 FOOT
  SPACE AND 16000 WATTS OF POWER.
GENERASI PERTAMA (940-1956)
 TIUB VAKUM DIPRKENALKAN. MERUPAKAN ALAT
  ELEKTRONIK DIPERBUAT DARIPADA KACA DAN DIGUNAKAN
  SEBAGAI KOMPONEN KOMPUTER UNTUK MENYIMPAN
  MEMPOSES DATA
 GENERASI KOMPUTER PERTAMA (ENIAC) MEMPUNYAI
  BERAT 30 TAN, 18000 TIUB VAKUM, LUAS 30 KE 50 KAKI DAN
  MENGGUNAKAN KUASA 16000 WATTS.
SECOND GENERATION COMPUTERS(1956-1963)
 TRANSISTORS REPLACE VACUUM TUBES IN THIS GENERATION.
  TRANSISTORS ARE SMALL DEVICES THAT TRANSFER
  ELECTRONIC SIGNAL ACROSS RESISTOR.
 TRANSISTOR DO NOT PRODUCED LOTS OF HEATS AND USE
  LESS POWER ALSO FASTER, CHEAPER AND SMALLER THAN
  VACUUM TUBES.
GENERASI KEDUA KOMPUTER (1956-1963)
  ◦ TRANSISTOR MENGGANTIKAN TIUB VAKUM DIMANA IA
    PERANTI LEBIH KECIL YANG MENUKAR SIGNAL ELEKTRONIK
    MERENTASI PERINTANG
  ◦ TRANSISTOR TIDAK MENGHASILKAN HABA YANG
    BANYAK(TIDAK PANAS) DAN KURANG MENGGUNAKAN KUASA,
    MURAH DAN KECIL BERBANDING TIUB VAKUM.
THIRD GENERATION COMPUTERS(1964-1971)
 INTEGRATED CIRCUITS (IU) REPLACED TRANSISTOR.
 AN IU IS A COMPLETE ELECTRONIC CIRCUIT ON A SMALL
  CHIP MADE OF SILICONE.
 IU WAS RELIABLE, COMPACT AND CHEAPER THAN
  TRANSISTORS
GENERASI KETIGA KOMPUTER(1964-1971)
  ◦ SIRKIT INTEGRASI MENGGANTIKAN TRANSISTOR
  ◦ IA MERUPAKAN SIRKIT ELEKTRONIK YANG LENGKAP
    DIATAS CIP YANG KECIL DIPERBUAT DARIPAD SILIKON
  ◦ IA SANGAT SESUAI, KECIL DAN MURAH BERBANDING
    TRANSISTOR
FOURTH GENERATION COMPUTERS(1971-PRESENT)
 MICROPROCESSOR WAS INTRODUCED, FROM THOUSAND OF
  INTEGRATED CIRCUITS CHANGE ONTO SINGLE SILICONE CHIP.
 THE INTEL 4004 CHIP DEVELOPED IN 1971, LOCATED ALL THE
  COMPONENTS OF THE COMPUTER FROM THE CENTRAL
  PROCESSING UNITS AND MEMORY TO INPUT/OUTPUT CONTROLS ON
  A SINGLE CHIP.
 COMPUTER IS 100 TIMES SMALLER THAN ENIAC COMPUTER IN FIRST
  GENERATION.
GENERASI KEEMPAT KOMPUTER (1971-AKAN DATANG )
  ◦ MENGGUNAKAN MIKROPEMPROSESAN, DARIPADA BERIBU SIRKIT
    INTEGRASI BERTUKAR KEPADA CIP SILIKON YANG TUNGGAL
  ◦ CIP INTEL 4004 DIBANGUNKAN PADA 1971, DIMANA TERLETAKNYA
    SEMUA KOMPONEN KOMPUTER DARIPADA UNIT PEMEPROSESAN
    PUST DAN MEMORI UNTUK PENGAWALAN INPUT OUTPUT DIATA
    CIP TUNGGAL.
FIFTH GENERATION COMPUTER(PRESENT –BEYOND)
 FIFTH GENERATION COMPUTING DEVICES BASED ON
  ARTIFICIAL INTELLIGENCE ARE STILL IN DEVELOPMENT
  THOUGH THERE ARE SOME APPLICATIONS SUCH AS
  VOICE RECOGNITION THAT ARE BEING USED TODAY.
GENERASI KELIMA KOMPUTER (AKAN DATANG –
MASA DEPAN)
  ◦ BERDASARKAN KEPDA KEPINTARAN BUATAN DIMANA
    TELAH DIBINA DAN DIPERTINGKATKAN
    PEMBANGUNANNYA SEPERTI FACE VERIFICATION
    (PENGENALAN MELALUI WAJAH) YANG MANA TELAH
    MULA DIGUNAKAN KINI.
1.1.2.1 LIST THE USAGE OF ICT IN EVERYDAY
    LIFE.
   EDUCATION      (PELAJARAN)
   BANKING        (PERBANKAN)
   INDUSTRY       (INDUSTRI)
   E-COMMERCE (E-PERDAGANGAN)
1.1.2.2 State the differences between computerized and non-computerized systems.
COMPUTERIZED
       ALL BANKING ACTIVITIES ARE DONE BY USING COMPUTER SYSTEM
       TRANSACTION CAN BE DONE ANYWHERE AND ANYTIME
       IT TAKES SHORTEN TIME FOR ANY BANKING PROCESS
       MORE PRODUCTIVE.
MENGGUNAKAN KOMPUTER
       SEMUA AKTIVIT PERBANKAN MENGGUNAKAN SISTEM KOMPUTER
       T RANSAKSI BOLEH DILAKUKAN BILA-BILA DAN DI M ANA SAHAJA
       MENGAMBIL MASA YANG SEDIKIT MELAKUKAN PROSES PERBANKAN
       LEBIH PRODUKTIF/CEKAP
NON-COMPUTERIZED
       ALL BANKING ACTIVITIES WERE DONE MANUALLY
       TRANSACTION CAN ONLY BE MADE DURING WORKING HOURS.
       IT TAKES LONG TIME FOR ANY BANKING PROCESS
       LESS PRODUCTIVE
TIDAK MENGGUNAKAN KOMPUTER
       SEMUA AKTIVITI BANK DIJALANKAN SECARA MANUAL
       T RANSAKSI DIJALANKAN DALAM WAKTU KERJA SAHAJA
       MENGAMBIL PROSES LAMA MENJALANKAN KERJA
       KURANG PRODUKTIF/KURANG CEKAP
1.1.2..1 State the impact of ICT on society.
POSITIVE IMPACTS
       FASTER COMMUNICATION SPEED
       LOWER COMMUNICATION COST
       CAN SHARE OPINIONS AND INFORMATION
       PAPERLESS ENVIRONMENT
       INFORMATION AND COMMUNICATION BORDERLESS THROUGH INTERNET.
KESAN POSITIF
       KOMUNIKASI CEPAT
       KOS KOMUNIKASI RENDAH
       PERKONGSIAN MAKLUMAT
       PERSEKITARAN TIADA KERTAS
       DUNIA TANPA SEMPADAN (INTERNET)

NEGATIVE IMPACTS
    CAN BE NEGATIVE BECAUSE IT COURAGE PEOPLE TO ACCESS PORNOGRAPHY AND
     VIOLENCE WEB SITES.
    CAN HARM USES FOR LONG HOURS USED
KESAN NEGATIF
    PENYALAHGUNAAN KOMPUTER (PORNOGRAFI DAN KEGANASAN)
    KESAN BURUK JIKA DIGUINAKAN TERLALU LAMA
Topic 1.2 -
Computer Ethics and Legal Issues
1.2.1.1 DEFINE COMPUTER ETHICS, CODE OF ETHICS, INTELLECTUAL PROPERTY,
   PRIVACY, COMPUTER CRIME AND CYBER LAW.
1. COMPUTER ETHICS IS A SYSTEM OF MORAL STANDARDS OR VALUES USED AS A
   GUIDELINE FOR COMPUTER USERS ETHICAL.
    ETIKA KOMPUTER ADALAH SISTEM BERKAITAN STANDARD MORAL ATAU NILAI
   YANG DIGUNAKAN EBAGAI PANDUAN BAGI PENGGUNA KOMPUTER
2. CODE OF ETHICS IS GUIDELINES IN ICT THAT HELP DETERMINE WHETHER A
   SPECIFIC COMPUTER ACTION IS ETHICAL OR UNETHICAL.
    KOD ETIKA ADALAH PANDUAN BAGI MEMASTIKAN SAMADA PERLAKUAN
   MENGGUNAKAN KOMPUTER ITU BERETIKA ATAU TIDAK
3. INTELLECTUAL PROPERTY REFERS TO WORKS CREATED BY INVENTORS,
   AUTHORS AND ARTISTS.
    HAK MILIK INTELETUAL MERUJUK KEPADA KERJA YANG DIBUAT OLEH PENCIPTA
   SEPERTI ARTIS , PEMBUAT PROGRAM DAN SEBAGAINYA.
4. PRIVACY REFERS TO THE RIGHT OF INDIVIDUALS AND COMPANIES TO DENY OR
   RESTRICT AND COLLECTION AND USED OF INFORMATION ABOUT THEM.
   PRIVASI MRUJUK KEPADA HAK MILIK INDUK ATAU SYARIKAT
5. COMPUTER CRIME IS ANY ILLEGAL ACTS INVOLVING COMPUTERS.
   JENAYAH KOMPURER PERLAKUAN TIDAK BAIK MEMBABITKAN KOMPUTER
6. CYBER LAW REFERS TO ANY LAWS RELATING TO PROTECTING THE INTERNET
   AND OTHER ONLINE COMMUNICATION TECHNOLOGIES
   UNDANG-UNDANG SIBER MERUJUK KEPADA UNDANG-UNDANG BAGI MELINDUNGI
   KEPENTINGAN BDERKAITAN INTERNET DAN TEKNOLOGI KOMUNIKASI
1.2.1.2 Differentiate between ethics and law.
Law                                    Ethics
AS A RULE TO CONTROL COMPUTER USERS.   AS A GUIDELINE TO COMPUTER USERS
PERATURAN MENGAWAL PENGGUNA PC         PANDUAN UNTUK PEN GGNA KOMPUTER
TO PREVENT MISUSE OF COMPUTERS         ETHICAL BEHAVIOR IS JUDGED BY MORAL
MENGELAKKAN PENYALAHGUNAAN PC          STANDARDS. KELAKUAN DIHAKIMI OLEH
                                       STANDARD MORAL
COMPUTER USERS MUST FOLLOW THE         COMPUTER USERS ARE FREE TO FOLLOW
REGULATIONS AND LAW. PENGGUNA PC       OR IGNORE THE CODE OF ETHICS. BEBAS
MESTI MEMATUHINYA                      UNTUK MENGIKUT ETIKA ATAU TIDAK
PUNISHMENTS ADA HUKUMAN                NO PUNISHMENT FOR ANYONE WHO
                                       VIOLATES ETHICS. TIADA HUKUMAN UNTUK
                                       MEREKA YANG MELANGGARNYA
DEPEND ON COUNTRY AND STATE WHERE      UNIVERSAL, CAN BE APPLIED ANYWHERE,
THE CRIME IS COMMITTED BERGANTUNG      ALL OVER THE WORLD SEMUA TEMPAT DI
KEPADA NEGARA YANG TERBABIT            DUNIA
NOT OBEYING LAWS ARE CALLED CRIME      NOT FOLLOWING ETHICS ARE CALLED
TIDAK MEMATUHI AKAN DIGELAR            IMMORAL TIDAK MEMATUHINYA DIGELAR
PENJENAYAH                             TIDAK BERMORAL
1.2.1.3 State the need for intellectual property laws
AS BUSINESSES CONTINUE TO EXPAND GLOBALLY, BUSINESS OWNERS MUST
  REALIZE THE IMPORTANCE OF GETTING PROFESSIONAL ADVICE ON HOW TO
  ESTABLISH AND SAFEGUARD THEIR INTELLECTUAL PROPERTY RIGHTS. THESE
  INCLUDE :
o   TRADEMARKS FOR BRAND IDENTITY
o   COPYRIGHTS FOR MATERIALS
o   PATENTS FOR INVENTIONS
o   DESIGN FOR PRODUCT APPEARANCE
PERNIAGAAN BERKEMBANG SECARA GLOBAL DIMANA PEMILIK MESTI SEDAR
  KEPENTINGAN MENDAPATKAN KHIDMAT NASIHAT BAGAIMANA MENJAGA HAK MILIK
  MEREKA. INI MERANGKUMI
    o IDENTITI PRODUK
    o HAKCIPTA
    o PATEN
    o REKABENTUK
1.2.2.1 List ways to protect privacy.
PRIVACY CAN BE PROTECTED BY:
(A) PRIVACY LAW
THE PRIVACY LAWS IN MALAYSIA EMPHASISES ON THE FOLLOWING:
   - SECURITY SERVICES TO REVIEW THE SECURITY POLICY
   - SECURITY MANAGEMENT TO PROTECT THE RESOURCES
   - SECURITY MECHANISM TO IMPLEMENT THE REQUIRED SECURITY
     SERVICES
   - SECURITY OBJECTS, THE IMPORTANT ENTITIES WITHIN THE
     SYSTEM ENVIRONMENT
(A) UNDANG-UNDANG PRIVASI
UNDANG-UNDANG PRIVASI DI MALAYSIA BERKAITAN DENGAN
- SERVIS KESELAMATAN UNTUK MEMAPARKAN POLISI KESELAMATAN
- PENGURUSAN KESELAMATAN UNTUK MENGAWAL SUMBER
- MEKANISMA KESELAMATAN BAGI MENGIMPLEMENTSI KEPERLUAN
  PERKHIDMATAN KESELAMATAN
- OBJEK KESELAMATAN, ENTITI PENTING BERKAITAN PERSEKITARAN
  KESELAMATAN
1.2.2.1 List ways to protect privacy.
PRIVACY CAN BE PROTECTED BY:
(B) UTILITIES SOFTWARE
   - INSTALL ANTI-SPAM PROGRAM, FIREWALL, ANTI-SPYWARE AND
      ANTIVIRUS
    - PURCHASE GOODS WITH CASH RATHER THAN CREDIT CARD
    - CLEAR YOUR HISTORY FILE WHEN YOU ARE FINISHED BROWSING
    - FILL IN ONLY NECESSARY INFORMATION ON WARRANTY AND
      REGISTRATION FORM.
(B) PERISIAN UTILITI
- MENGINSTALL PROGRAM ANTI SPAM, DINDING API, ANTI PERISIK DAN
  ANTIVIRUS
- MEMBELI BARANGAN SECARA TUNAI
- MENGHILANGKAN SEJARAH CARIAN INTERNET APABILA SELESAI
  MELAYARI INTERNET
- HANYA MENGISI PERKARA YANG PERLU DALAM BORANG INTERNET
1.2.2.2 State authentication and verification methods/ technologies.

AUTHENTICATION IS A PROCESS WHERE USERS VERIFY THEIR IDENTITY.
  AUTHENTICATION DEALS WITH THE PROBLEM OF DETERMINING WHETHER A USER
  SHOULD BE ALLOWED ACCESS TO A PARTICULAR SYSTEM.
PEMBUKTIAN MERUPAKAN PROSES DI MANA PENGGUNA MENGESAHKAN BUKTI IDENTITI
  SAMADA PENGGUNA ITU DIBENARKAN ATAU TIDAK MENGAKSES SESUATU SISTEM

METHODS OF AUTHENTICATION
THERE ARE TWO COMMONLY USED AUTHENTICATION METHODS, WHICH ARE BIOMETRIC
   DEVICE AND CALLBACK SYSTEM.
LANGKAH DALAM PEMBUKTIAN
ADA 2 CARA YANG BIASA IAITU PERANTI BIOMETRIK DAN SISTEM PANGGIL SEMULA
A. BIOMETRIC DEVICE/ PERANTI BIOMETRIK IS A DEVICE THAT TRANSLATES
   PERSONAL CHARACTERISTICS INTO A DIGITAL CODE THAT IS COMPARED WITH A DIGITAL
   CODE STORED IN THE DATABASE.
ADALAH PERANTI YANG MENUKAR KARAKTOR PERIBADI KEPADA KOD DIGITAL YANG BOLEH
   MEMBANDINGKAN DENGAN KOD DIGITAL YANG DISIMPAN DALAM PANGKALAN DATA
B. CALLBACK SYSTEM/SISTEM PANGGIL SEMULA REFERS TO THE CHECKING SYSTEM
   THAT AUTHENTICATES THE USER
MERUJUK KEPADA SISTEM YANG MENYEMAK PEMBKTIAN OLEH PENGGUNA
1.2.2.2 State authentication and verification methods/ technologies.

METHODS OF VERIFICATION
THERE ARE TWO METHODS COMMONLY USED IN VERIFICATION,
  WHICH ARE USER IDENTIFICATION AND PROCESSED OBJECT.
LANGKAH DALAM PENGESAHAN
2 KAEDAH BIASA DALAM PENGESAHAN ADALAH MENGENALPASTI
  IDENTITI DAN OBJEK PEMPROSESAN
A. USER IDENTIFICATION/PENGENALPASTI IDENTITI REFERS TO THE
  PROCESS OF VALIDATING THE USER.
MERUJUK KEPADA PROSES YANG DIJALANKAN PRNGGUNA BAGI
  PENGESAHAN
B. PROCESSED OBJECT/ OBJEK PEMPROSESAN REFERS TO
  SOMETHING THE USER HAS SUCH AS IDENTIFICATION CARD,
  SECURITY TOKEN AND CELL PHONE.
MERUJUK KEPADA PENGGUNA YANG MEMPUNYAI OBJEK SEPERTI
  KAD PENGENALAN, TOKEN KESELAMATAN DAN TELEFON.
1.2.3.1 a)List effects of controversial contents of pornography on society
PORNOGRAPHY
   CAN LEAD TO CRIMINAL ACTS SUCH AS EXPLOITATION OF WOMEN AND CHILDREN
   CAN LEAD TO SEXUAL ADDICTION OR PERVERSION
   CAN DEVELOP LOW MORAL VALUE TOWARDS OTHER MEN, WOMEN OR CHILDREN
   CAN ERODE GOOD RELIGIOUS, CULTURAL AND SOCIAL BELIEFS AND BEHAVIOR
PORNOGRAFI
    ◦ BOLEH MENGGALAKKAN PERLAKUAN JENAYAH SEPERTI EKSPLOITASI WANITA DAN
       KANAK-KANAK
    ◦ BOLEH MENJURUS KEPADA PERLAKUAN SEKS
    ◦ BOLEH MEMBANGUNAKAN NILAI MORAL YANG RENDAH TERHADAP LELAKI DAN WANITA
       NAHUPUN KANAK-KANAK

SLANDER
  CAN DEVELOP INTO A SOCIETY THAT DISREGARDS HONESTY AND TRUTH
  CAN DEVELOP BAD HABIT OF SPREADING UNTRUTHS AND RUMORS
  CAN LEAD TO UNNECESSARY ARGUMENT
  CAN CAUSE PEOPLE TO HAVE NEGATIVE ATTITUDES TOWARDS ANOTHER PERSON
FITNAH
  BOLEH MEMBANGUNKAN MASYARAKAT YANG TIDAK JUJUR
  BOLEH MEMBANGUNKAN TABIAT BURUK SEPRTI MENYEBARKAN KHABAR ANGIN
  MEMBAWA KEPADA PERTELINGKAHAN YANG TIDAK PERLU
  BOLEH MENYEBABKAN PERLAKUAN NEGATIF ANTARA SAU SAMA LAIN ATAU MASYARAKAT
   KESELURUHANNYA
1.2.3.2 Describe the process of filtering to control access to controversial contents
THE METHOD OF CHOICE TO LIMIT ACCESS ON THE INTERNET IS TO FILTER EITHER BY
A. KEYWORD BLOCKING. THE METHOD USES A LIST OF BANNED WORD OR OBJECTS
        TERMS SUCH AS XXX, SEX, AND NUDE. AS THE PAGE IS DOWNLOADING, THE
        FILTER SEARCHES FOR ANY OF THESE WORDS. IF FOUND, IT WILL BLOCKED THE
        PAGE COMPLETELY. STOP DOWNLOADING THE PAGE, BLOCK THE BANNED WORDS
        AND EVEN SHUT DOWN THE BROWSER.
B. SITE BLOCKING. THE METHOD USE SOFTWARE TO LIST THE WEBSITES THAT WILL BE
        BLOCKED BY USING SOFTWARE. THE SOFTWARE PREVENTS USERS FROM BEING
        ACCESS THE WEB SITES ON LIST.
C. WEB RATING SYSTEM. WEB SITES ARE RATING IN TERMS OF NUDITY, SEX, VIOLENCE
        AND LANGUAGE. THE WEB SITES RATE CAN BE DONE BY SETTING THE BROWSER
        TO ONLY ACCEPT PAGE WITH CERTAIN LEVEL OF RATINGS.

LANGKAH PENAPISAN DALAM MELAYARI INTERNET ADALAH
A. PENGHALANG KATAKUNCI
      KATAKUNCI YANG BERKAITAN DENGAN PERKARA-PERKARA BURUK DISIMPAN
       DALAM PANGKALAN DATA.PENGGUNA YANG MENAIP ATAU MENEKAN PERKATAAN
       TERSEBUT AKAN DIHALANG DARI MENGAKSES LAMAN BERKAITAN PERKARA
       TERSEBUT
B. PENGHALANG TAPAK
      SATU PERISIAN BERFUNGSI UNTUK MENGENALPASTI LAMAN-LAMAN YANG TIDAK
       PATUT ATAU BOLEH DILAYARI.
C. SISTEM RATING WEB
      MERUPAKAN SISTEM YANG MENGENALPASTI LAMAN-LAMAN YANG TIDAK BAIK
       YANG SELAU DILAYARI. SISTEM AKAN MENGHALANG PENGGUNA DARIPADA
       MELAYARI LAMAN-LAMAN WEB TERSEBUT.
1.2.4.1 Explain the need for cyber law
THE NEED FOR CYBER LAW IS TO PROTECT THE INTERNET AND OTHER ONLINE
COMMUNICATION TECHNOLOGIES.THE NEEDS OF CYBER LAW ARE

     INTEGRITY AND SECURITY INFORMATION
     LEGAL STATUS OF ONLINE TRANSACTIONS
     PRIVACY AND CONFIDENTIALLY OF INFORMATION
     INTELLECTUAL PROPERTY RIGHTS
     SECURITY OF GOVERNMENT DATA

KEPERLUAN UNDANG-UNDANG SIBER ADALAH UNTUK MENGAWAL INTERNET
DAN LAIN-LAIN TEKNOLOGI ATAS TALIAN. IA BERKAITAN
      MAKLUMAT KESELAMATAN DAN INTEGRITI
      TRANSAKSI ATAS TALIAN YANG SAH
      MAKLUMAT PRIVASI DAN SULIT
      HAK CIPTA TERPELIHARA
      KESELAMATAN DATA KERAJAAN
1.2.4.2 Explain briefly the computer crimes below:
 COMPUTER FRAUD IS DEFINED AS HAVING AN INTENTION TO TAKE
   ADVANTAGE OVER OR CAUSING LOSS TO OTHER PEOPLE, MAINLY ON
   MONETARY BASIS THROUGH THE USE OF COMPUTERS.
 THERE ARE MANY FORMS OF COMPUTER FRAUD WHICH INCLUDE E-
   MAIL HOAXES, PROGRAM FRAUD, INVESTMENT SCHEMES, SALES
   PROMOTIONS AND CLAIMS OF EXPERTISE ON CERTAIN FIELDS.
 PENIPUAN KOMPUTER MERUJUK KEPADA MENGAMBIL PERHATIAN
   ATAU KESEMPATAN YANG BOLEH MENGAKIBATKAN KERUGIAN KEPADA
   ORANG LAIN MENERUSI PENGGUNAAN KOMPUTER. CONTOHNYA
   PENIPUAN EMAIL, SKIM PELABURAN, PROMOSI JUALAN DSBNYA.
 COPYRIGHT INFRINGEMENT IS DEFINED AS A VIOLATION OF THE
   RIGHTS SECURED BY A COPYRIGHT. COPYRIGHT INFRINGEMENT
   INVOLVES ILLEGAL COPY OR REPRODUCTION OF COPYRIGHTS
   MATERIAL BY THE BLACK MARKET GROUP. THE OPEN COMMERCIAL
   SALE OF PIRATED ITEM IS ALSO ILLEGAL.
 PELANGGARAN HAKCIPTA MERUJUK KEPADA PELANGGARAN
   KEPADA HAKCIPTA, MENYALIN SEMULA TANPA KEBENARAN DAN
   SEBAGAINYA.
1.2.4.2 Explain briefly the computer crimes below:
 COMPUTER THEFT IS DEFINED AS THE UNAUTHORIZED USE OF ANOTHER
   PERSON’S PROPERTY WITH THE INTENTION TO DENY THE OWNER THE
   RIGHTFUL POSSESSION OF THAT PROPERTY OR ITS USE.EXAMPLES OF
   COMPUTER THEFT INCLUDE:
 TRANSFER OF PAYMENTS TO THE WRONG ACCOUNTS
 GET ONLINE MATERIALS WITH NO COST
 TAP INTO DATA TRANSMISSION LINES ON DATABASE AT NO COST
 DIVERT GOODS TO THE WRONG DESTINATION


   PENCURIAN KOMPUTER BERMAKSUD PENGGUNAAN TANPA KEBENARAN
    KEATAS HAK MILIK ORANG LAIN DENGAN NILAI MEROSAK, MENGUBAH,
    MENUKAR DAN SEBAGAINYA
    ◦ PENGALIHAN WANG DARI AKAUN ORANG LAIN
    ◦ MENDAPAT BARANAN ATAS TALIAN TANPA BAYAR
    ◦ MENDAPAT MAKLUMAT TAMNPA BAYARAN
    ◦ MENGALIHKAN PENGHANTARAN BARANGAN KE TEMPAT LAIN
1.2.4.2 Explain briefly the computer crimes below:
 COMPUTER ATTACK MAY BE DEFINED AS ANY ACTIVITIES TAKEN TO DISRUPT
   THE EQUIPMENT OF COMPUTER SYSTEMS, CHANGE PROCESSING CONTROL OR
   CORRUPT STORED DATA.
 COMPUTER ATTACK CAN BE IN THE FORMS OF:
 PHYSICAL ATTACK THAT DISRUPT THE COMPUTER FACILITY OR ITS
   TRANSMISSION LINES.
 AN ELECTRONIC ATTACK THAT USES THE POWER OF ELECTROMAGNETIC
   ENERGY TO OVERLOAD COMPUTER CIRCUITRY.
 A COMPUTER NETWORK ATTACK THAT USES A MALICIOUS CODE TO    EXPLOIT A
   WEAKNESS IN SOFTWARE, OR IN THE COMPUTER SECURITY PRACTICES OF A
   COMPUTER USER
 SERANGAN KOMPUTER DIDEFINISIKAN SEBAGAI AKTIVITI MENGGANGU
   PERALATAN KOMPUTER , MENGUBAH KAWALAN DAN MEROSAKKAN DATA YANG
   DISIMPAN. SERANGAN KOMPUTER BOLEH DALAM BENTUK
    ◦ SRANGAN FIZIKAL YANG MEROSAKKAN PERALATAN DAN TALIAN PENGHANTARAN
    ◦ SERANGAN ELEKTRONOK DI MANA BOLEH MENYEBABKAN KEROSAKAN ATAS PERALATAN
      AKIBAT LEBIHAN KUASA.
   SERANGAN RANGKAIAN KOMPUTER DENGAN MENGGUNAKAN KOD SERANGAN
    BAGI MENGEKSPLOIT KELEMAHAN PERISIAN DSBNYA
   1.3.1 Definition
1.3.1.1 Define Computer security.
 COMPUTERS SECURITY MEANS

  PROTECTING OUR COMPUTER SYSTEMS
  AND THE INFORMATION THEY CONTAINS
  AGAINST UNWANTED ACCESS, DAMAGE,
  DESTRUCTION OR MODIFICATION.
 KESELAMATAN KOMPUTER BERMAKSUD

  MELINDUNGI SISTEM KOMPUTER DAN
  MAKLUMAT DI DALAMNYA DARIPADA
  AKSES YANG TIDAK DIBENARKAN,
  KEROSAKAN DAN PENGUBAHAN
1.3.2.1 Explain briefly the different threats to computer security:
 MALICIOUS CODE IS ALSO KNOWN AS A ROUGE PROGRAM. IT IS A
  TREAT TO COMPUTING ASSETS BY CAUSING UNDESIRED EFFECTS IN
  THE PROGRAMMER’S PART. THE EFFECT CAUSE BY AGENT, WITH
  THE INTENTION TO CAUSE DAMAGE. THE AGENT FOR MALICIOUS
  CODE IS THE WRITER OF THE CODE, OR ANY PERSON WHO CAUSES
  ITS DISTRIBUTION. THERE ARE VARIOUS KINDS OF MALICIOUS CODE.
  THEY INCLUDE VIRUS, TROJAN HORSE, LOGIC DOOR, TRAPDOOR
  AND BACKDOOR, WORM AND MANY OTHERS.
 KOD MALICIOUS JUGA DIKENALI SEBAGAI PROGRAM PEMECAH. IA
  MENGGANGU ASET KOMPUTER DENGAN MENYEBABKAN
  KEROSAKAN. AGEN KOD INI AKAN MENGUBAH KOD YANG TERDAPAT
  DALAM PROGRAM DAN MEROSAKKAN KOMPUTER DENGAN
  KESANNYA SEPERTI GANGGUAN KEPADA PERJALANAN PROGRAM.
  CONTOHNYA TROJAN HORSE, LOGIC DOOR, TRAPDOOR DAN
  BACKDOOR, WORM(CECACING) DAN BANYAK LAGI
1.3.2.1 Explain briefly the different threats to computer security:
 HACKING IS A SOURCE OF THREAT TO SECURITY IN COMPUTER. IT IS
   DEFINED AS UNAUTHORIZED ACCESS TO THE COMPUTER SYSTEM BY A
   HACKER.
 HACKERS ARE PERSONS WHO LEARN ABOUT THE COMPUTER SYSTEM IN
   DETAIL. THEY WRITE PROGRAM REFERRED TO AS HACKS. HACKERS MAY
   USE A MODEM OR CABLE TO HACK THE TARGETED COMPUTERS.
 HACKING ADALAH SUMBER GANGGUAN KEPADA KESELAMATAN DALAM
   KOMPUTER. IA BOLEH DIISTILAHKAN SEBAGAI AKSES TANPA KEBENARAN
   KEPADA SISTEM KOMPUTER OLEH ORANG YANG DIKENALI SEBAGAI
   HACKER. HACKER ADALAH ORANG YANG ADA KEPANDAIAN TENTANG
   SISTEM KOMPUTER. MEREKA MENULIS PROGRAM KOMPUTER
   BERDASARKAN PENGGUNAAN MODEM DAN KABEL UNTUK MEROSAKKAN
   KOMPUTER.
 ENVIRONMENTAL DISASTER . BE IT AT HOME, STORES, OFFICES AND
   ALSO AUTOMOBILES. EXAMPLES OF NATURAL AND ENVIRONMENTAL
   DISASTERS:
 FLOOD
 FIRE
 EARTHQUAKES, STORMS AND TORNADOS
 EXCESSIVE HEAT
 INADEQUATE POWER SUPPLY
 BENCANA ALAM ADALAH JUGA SATU CARA YANG MEROSAKKAN
   KOMPUTER. CONTOHNYA BANJIR, TANAH RUNTUH, GEMPA BUMI DAN
   SEBAGAINYA.
1.3.3.1 Select the appropriate security measures to overcome the identified
   computer threats.
 Data Backup :
 Cryptography
 Anti virus
 Anti spyware
 Firewall
 Human Aspects
1.3.3.2 Apply the correct security procedures.
DATA BACKUP :
 SALINAN FAIL ATAU PROGRAM DALAM BENTUK CD ATAU DVD, DISKET ATAU CAKERA
   KERAS
CRYPTOGRAPHY
 PROSES MENYEMBUNYIKAN MAKLUMAT DENGAN MENGUBAH MAKLUMAT DALAM
   BENTUK YANG LAIN TETAPI DIFAHAMI OLEH EMPUNYANYA.
ANTI VIRUS
 MENGGUNAKAN PERISIAN ANTI VIRUS. CONTOH KASPERSKY, AVD, PANDA DAN
   SEBAGAINYA
ANTI SPYWARE
 PERISIAN YANG MELINDUNGI KOMPUTER DARIPADA PERISIKAN LUAR MELAUI ATAS
   TALIAN DIMANA SPYWARE AKAN MENCURI MAKLUMAT PENTING PENGGUNA SEPERTI
   NO PIN BANK DAN SEBAGAINYA.
FIREWALL
 MELINDUNGI KOMPUTER BERDASARKAN POLISI KESELAMATAN. BOLEH BERBENTUK
   PERKAKASAN ATAU PERISIAN. 3 JENISIAITU
 SCREENING ROUTERS- RINGKAS, HANYA MELIHAT ALAMAT DAN JENIS PROTOCOL.
 PROXY GATEWAY- RUMIT, MLIHAT KESELURUHAN TEKS
 GUARD-LEBIH RUMIT, JUGA MELIHAT KESELURUHAN TEKS

HUMAN ASPECTS
 MERUJUK KEPADA PENGGUNA DAN JUGA PENGGANGU DALAM SISTEM KOMPUTER.
   1.4.1 Impact of ICT on Society
1.4..1.1 Impact of ICT on Society

POSITIVE IMPACT
       FASTER COMMUNICATION SPEED . WITH THE INTERNET, NEWS OR MESSAGE ARE
        SEND VIA E-MAIL TO ANYONE EFFICIENTLY. WITH THE CAPABILITY OF BROADBAND AND
        SPEED OF CONNECTION ON THE INTERNET, ANY INFORMATION CAN BE TRAVEL FASTER.
       LOWER COMMUNICATION COST . WITH THE INTERNET, WE DO NOT HAVE TO PAY ANY
        BASIC SERVICES PROVIDED BY IN THE INTERNET. FURTHERMORE, THE COST OF THE
        CONNECTION TO THE INTERNET IS RELATIVELY CHEAP.
       IPEOPLE CAN SHARE OPINION FROM INFORMATION THROUGH DISCUSSION
        GROUP AND FORUMS THROUGH INTERNET.
       INFORMATION CAN BE STORED AND RETRIEVED THROUGH THE DIGITAL MEDIUM
        INSTEAD OF PAPER. (PAPERLESS ENVIRONMENT)
       INFORMATION AND COMMUNICATION CAN BE BORDERLESS THROUGH
        INTERNET.
        BY USING INTERNET, PEOPLE ALL AROUND THE WORLD CAN BE CONNECTED THROUGH
        EACH OTHER.

IMPAK POSITIF
      KELAJUAN KOMUNIKASI YANG CEPAT – MELALUI INERNET, BERITA ATAU MESEJ
       MENERUSI EMAIL AKAN LEBIH CEPAT DAN PANTAS.
      KOS KOMUNIKSI YANG RENDAH – DENGAN INTERNET, KITA TIDAK PERLU MEMBUAT
       PEMBAYARAN ASAS PERKHIDMATAN.
      MANUSIA BOLEH BERKONGSI MAKLUMAT – MELALUI FORUM INTERNET
      PENYIMPAN MAKLUMAT BOLEH DIBUAT DAN TANPA KERTAS
      DUNIA TANPA SEMPADAN – DENGAN INTERNET , MANUSIA BOLEH BERHUBUNG
       DENGAN SEMUA ORANG DI DUNIA DENGAN MUDAH
NEGATIVE IMPACT
    Borderless information at time can be negative because it
     courage people to access pornography and violence
     website. It can cause low moral values. It also can created
     problems such as gambling, information theft and fraud.
    Computers can harms users if they use for long hours
     frequently

KESAN NEGATIF
    MAKLUMAT TANPA SEMPADAN KADANGKALA ADALAH
     NEGATIF – CONTOHNYA MENGGALAKKAN PORNOGRAFI DAN
     KEGANASAN
    KOMPUTER MENGGANGGU KESIHATAN JIKA DIGUNAKAN
     TERLALU LAMA.
Choose ONE of the following topics:
  Copyright and Piracy from Moral and Legal
   Standpoints.
  Lack of Security and its Effects on
   Industry/Economy/ Government.
  Malaysian Cyber Law, Electronic Government
   Law.
  Phishing
  Virus (Trojan Horse, Salami Attack)
  Hacking
  Security Measures (Biometrics, Authentication
 DIGITAL SIGNATURE ACT 1997
 TELEMEDICINE ACT 1997

 COMPUTER CRIME ACT 1997

 COMMUNICATION AND MULTIMEDIA ACT

  19989

More Related Content

What's hot

Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 
information technology
information technology information technology
information technology rukhsarqazi1
 
introduction of ict
introduction of ictintroduction of ict
introduction of ictCma Mohd
 
Information technology
Information technologyInformation technology
Information technologyEnes Bolfidan
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technologyZarifasifkhan
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technologyHaider Ali Malik
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyFaraz Ahmed
 
information technology
information technologyinformation technology
information technologykrithikha2001
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
ICT Presentation - Std 10th C
ICT Presentation - Std 10th CICT Presentation - Std 10th C
ICT Presentation - Std 10th CKrupesh Shah
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaWikki Verma
 
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATIONIMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATIONAbdur Rakib
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyBeing Aabis
 

What's hot (20)

Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 
information technology
information technology information technology
information technology
 
introduction of ict
introduction of ictintroduction of ict
introduction of ict
 
Information technology
Information technologyInformation technology
Information technology
 
Presentation on Information technology
Presentation on Information technologyPresentation on Information technology
Presentation on Information technology
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
Use of ICT in daily life
Use of ICT in daily lifeUse of ICT in daily life
Use of ICT in daily life
 
1.1 introduction toict
1.1 introduction toict1.1 introduction toict
1.1 introduction toict
 
The ultimate ict tools for rural african communities 2
The ultimate ict tools for rural african communities 2The ultimate ict tools for rural african communities 2
The ultimate ict tools for rural african communities 2
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication Technology
 
information technology
information technologyinformation technology
information technology
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
I
II
I
 
Ict tools
Ict tools Ict tools
Ict tools
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
ICT Presentation - Std 10th C
ICT Presentation - Std 10th CICT Presentation - Std 10th C
ICT Presentation - Std 10th C
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki Verma
 
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATIONIMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 

Similar to La1 powerpoint

La1 powerpoint-1
La1 powerpoint-1La1 powerpoint-1
La1 powerpoint-1suefee
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptx630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptxssuser8ca25e
 
Home Automation using Arduino IOT Cloud
Home Automation using Arduino IOT CloudHome Automation using Arduino IOT Cloud
Home Automation using Arduino IOT CloudIRJET Journal
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]richard786
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppIRJET Journal
 
A Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection SystemA Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection SystemIJERA Editor
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harshaHARSHA DURUGOJI
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 

Similar to La1 powerpoint (20)

La1 powerpoint
La1 powerpointLa1 powerpoint
La1 powerpoint
 
La1 powerpoint-1
La1 powerpoint-1La1 powerpoint-1
La1 powerpoint-1
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptx630755195-Chapter-1-PPT-1-pptx.pptx
630755195-Chapter-1-PPT-1-pptx.pptx
 
Home Automation using Arduino IOT Cloud
Home Automation using Arduino IOT CloudHome Automation using Arduino IOT Cloud
Home Automation using Arduino IOT Cloud
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]Foundation course –_ii_[autosaved]
Foundation course –_ii_[autosaved]
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
 
A Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection SystemA Microcontroller Based Intrusion Detection System
A Microcontroller Based Intrusion Detection System
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
iot.pptx
iot.pptxiot.pptx
iot.pptx
 
azeem final iot report.docx
azeem final iot report.docxazeem final iot report.docx
azeem final iot report.docx
 
CSA
CSACSA
CSA
 

La1 powerpoint

  • 1. Topic 1.1 - Introduction to Information and Communication Technology
  • 2. 1.1.1.1 Define ICT  ICT IS THE TECHNOLOGY REQUIRED FOR INFORMATION PROCESSING, IN PARTICULAR, THE USE ELECTRONICS COMPUTERS, COMMUNICATION DEVICES AND APPLICATION SOFTWARE TO CONVERT, STORE, PROTECT, PROCESS, TRANSMIT AND RETRIEVE INFORMATION FROM ANYWHERE, ANYTIME.  ICT ADALAH TKNOLOGI BERKAITAN PEMPROSESAN MAKLUMAT , DALAM KATA LAINNYA ADALAH BERKENAAN PENGGUNAAN KOMPUTER, PERANTI KOMUNIKASI DAN APLIKASI PERISIAN UNTUK MENUKAR , MENGAWASI, MEMPEROSES, MENGHUBUNG DAN MENGHASILKAN MAKLUMAT BILA- BILA DAN DI MANA SAHAJA
  • 3. 1.1.1.2 Describe the brief evolution of computers FIRST GENERATION COMPUTERS(1940-1956)  VACUUM TUBES WAS INTRODUCES, IS AN ELECTRONIC TUBE MADE OF GLASS USED AS COMPUTER COMPONENTS TO STORE AND PROCESS DATA.  ENIAC IS FIRST GENERATION COMPUTER THAT CONTAINS WEIGHTS OF 30 TONS, 18000 VACUUM TUBES, 30-50 FOOT SPACE AND 16000 WATTS OF POWER. GENERASI PERTAMA (940-1956)  TIUB VAKUM DIPRKENALKAN. MERUPAKAN ALAT ELEKTRONIK DIPERBUAT DARIPADA KACA DAN DIGUNAKAN SEBAGAI KOMPONEN KOMPUTER UNTUK MENYIMPAN MEMPOSES DATA  GENERASI KOMPUTER PERTAMA (ENIAC) MEMPUNYAI BERAT 30 TAN, 18000 TIUB VAKUM, LUAS 30 KE 50 KAKI DAN MENGGUNAKAN KUASA 16000 WATTS.
  • 4. SECOND GENERATION COMPUTERS(1956-1963)  TRANSISTORS REPLACE VACUUM TUBES IN THIS GENERATION. TRANSISTORS ARE SMALL DEVICES THAT TRANSFER ELECTRONIC SIGNAL ACROSS RESISTOR.  TRANSISTOR DO NOT PRODUCED LOTS OF HEATS AND USE LESS POWER ALSO FASTER, CHEAPER AND SMALLER THAN VACUUM TUBES. GENERASI KEDUA KOMPUTER (1956-1963) ◦ TRANSISTOR MENGGANTIKAN TIUB VAKUM DIMANA IA PERANTI LEBIH KECIL YANG MENUKAR SIGNAL ELEKTRONIK MERENTASI PERINTANG ◦ TRANSISTOR TIDAK MENGHASILKAN HABA YANG BANYAK(TIDAK PANAS) DAN KURANG MENGGUNAKAN KUASA, MURAH DAN KECIL BERBANDING TIUB VAKUM.
  • 5. THIRD GENERATION COMPUTERS(1964-1971)  INTEGRATED CIRCUITS (IU) REPLACED TRANSISTOR.  AN IU IS A COMPLETE ELECTRONIC CIRCUIT ON A SMALL CHIP MADE OF SILICONE.  IU WAS RELIABLE, COMPACT AND CHEAPER THAN TRANSISTORS GENERASI KETIGA KOMPUTER(1964-1971) ◦ SIRKIT INTEGRASI MENGGANTIKAN TRANSISTOR ◦ IA MERUPAKAN SIRKIT ELEKTRONIK YANG LENGKAP DIATAS CIP YANG KECIL DIPERBUAT DARIPAD SILIKON ◦ IA SANGAT SESUAI, KECIL DAN MURAH BERBANDING TRANSISTOR
  • 6. FOURTH GENERATION COMPUTERS(1971-PRESENT)  MICROPROCESSOR WAS INTRODUCED, FROM THOUSAND OF INTEGRATED CIRCUITS CHANGE ONTO SINGLE SILICONE CHIP.  THE INTEL 4004 CHIP DEVELOPED IN 1971, LOCATED ALL THE COMPONENTS OF THE COMPUTER FROM THE CENTRAL PROCESSING UNITS AND MEMORY TO INPUT/OUTPUT CONTROLS ON A SINGLE CHIP.  COMPUTER IS 100 TIMES SMALLER THAN ENIAC COMPUTER IN FIRST GENERATION. GENERASI KEEMPAT KOMPUTER (1971-AKAN DATANG ) ◦ MENGGUNAKAN MIKROPEMPROSESAN, DARIPADA BERIBU SIRKIT INTEGRASI BERTUKAR KEPADA CIP SILIKON YANG TUNGGAL ◦ CIP INTEL 4004 DIBANGUNKAN PADA 1971, DIMANA TERLETAKNYA SEMUA KOMPONEN KOMPUTER DARIPADA UNIT PEMEPROSESAN PUST DAN MEMORI UNTUK PENGAWALAN INPUT OUTPUT DIATA CIP TUNGGAL.
  • 7. FIFTH GENERATION COMPUTER(PRESENT –BEYOND)  FIFTH GENERATION COMPUTING DEVICES BASED ON ARTIFICIAL INTELLIGENCE ARE STILL IN DEVELOPMENT THOUGH THERE ARE SOME APPLICATIONS SUCH AS VOICE RECOGNITION THAT ARE BEING USED TODAY. GENERASI KELIMA KOMPUTER (AKAN DATANG – MASA DEPAN) ◦ BERDASARKAN KEPDA KEPINTARAN BUATAN DIMANA TELAH DIBINA DAN DIPERTINGKATKAN PEMBANGUNANNYA SEPERTI FACE VERIFICATION (PENGENALAN MELALUI WAJAH) YANG MANA TELAH MULA DIGUNAKAN KINI.
  • 8. 1.1.2.1 LIST THE USAGE OF ICT IN EVERYDAY LIFE.  EDUCATION (PELAJARAN)  BANKING (PERBANKAN)  INDUSTRY (INDUSTRI)  E-COMMERCE (E-PERDAGANGAN)
  • 9. 1.1.2.2 State the differences between computerized and non-computerized systems. COMPUTERIZED  ALL BANKING ACTIVITIES ARE DONE BY USING COMPUTER SYSTEM  TRANSACTION CAN BE DONE ANYWHERE AND ANYTIME  IT TAKES SHORTEN TIME FOR ANY BANKING PROCESS  MORE PRODUCTIVE. MENGGUNAKAN KOMPUTER  SEMUA AKTIVIT PERBANKAN MENGGUNAKAN SISTEM KOMPUTER  T RANSAKSI BOLEH DILAKUKAN BILA-BILA DAN DI M ANA SAHAJA  MENGAMBIL MASA YANG SEDIKIT MELAKUKAN PROSES PERBANKAN  LEBIH PRODUKTIF/CEKAP NON-COMPUTERIZED  ALL BANKING ACTIVITIES WERE DONE MANUALLY  TRANSACTION CAN ONLY BE MADE DURING WORKING HOURS.  IT TAKES LONG TIME FOR ANY BANKING PROCESS  LESS PRODUCTIVE TIDAK MENGGUNAKAN KOMPUTER  SEMUA AKTIVITI BANK DIJALANKAN SECARA MANUAL  T RANSAKSI DIJALANKAN DALAM WAKTU KERJA SAHAJA  MENGAMBIL PROSES LAMA MENJALANKAN KERJA  KURANG PRODUKTIF/KURANG CEKAP
  • 10. 1.1.2..1 State the impact of ICT on society. POSITIVE IMPACTS  FASTER COMMUNICATION SPEED  LOWER COMMUNICATION COST  CAN SHARE OPINIONS AND INFORMATION  PAPERLESS ENVIRONMENT  INFORMATION AND COMMUNICATION BORDERLESS THROUGH INTERNET. KESAN POSITIF  KOMUNIKASI CEPAT  KOS KOMUNIKASI RENDAH  PERKONGSIAN MAKLUMAT  PERSEKITARAN TIADA KERTAS  DUNIA TANPA SEMPADAN (INTERNET) NEGATIVE IMPACTS  CAN BE NEGATIVE BECAUSE IT COURAGE PEOPLE TO ACCESS PORNOGRAPHY AND VIOLENCE WEB SITES.  CAN HARM USES FOR LONG HOURS USED KESAN NEGATIF  PENYALAHGUNAAN KOMPUTER (PORNOGRAFI DAN KEGANASAN)  KESAN BURUK JIKA DIGUINAKAN TERLALU LAMA
  • 11. Topic 1.2 - Computer Ethics and Legal Issues
  • 12. 1.2.1.1 DEFINE COMPUTER ETHICS, CODE OF ETHICS, INTELLECTUAL PROPERTY, PRIVACY, COMPUTER CRIME AND CYBER LAW. 1. COMPUTER ETHICS IS A SYSTEM OF MORAL STANDARDS OR VALUES USED AS A GUIDELINE FOR COMPUTER USERS ETHICAL. ETIKA KOMPUTER ADALAH SISTEM BERKAITAN STANDARD MORAL ATAU NILAI YANG DIGUNAKAN EBAGAI PANDUAN BAGI PENGGUNA KOMPUTER 2. CODE OF ETHICS IS GUIDELINES IN ICT THAT HELP DETERMINE WHETHER A SPECIFIC COMPUTER ACTION IS ETHICAL OR UNETHICAL. KOD ETIKA ADALAH PANDUAN BAGI MEMASTIKAN SAMADA PERLAKUAN MENGGUNAKAN KOMPUTER ITU BERETIKA ATAU TIDAK 3. INTELLECTUAL PROPERTY REFERS TO WORKS CREATED BY INVENTORS, AUTHORS AND ARTISTS. HAK MILIK INTELETUAL MERUJUK KEPADA KERJA YANG DIBUAT OLEH PENCIPTA SEPERTI ARTIS , PEMBUAT PROGRAM DAN SEBAGAINYA. 4. PRIVACY REFERS TO THE RIGHT OF INDIVIDUALS AND COMPANIES TO DENY OR RESTRICT AND COLLECTION AND USED OF INFORMATION ABOUT THEM. PRIVASI MRUJUK KEPADA HAK MILIK INDUK ATAU SYARIKAT 5. COMPUTER CRIME IS ANY ILLEGAL ACTS INVOLVING COMPUTERS. JENAYAH KOMPURER PERLAKUAN TIDAK BAIK MEMBABITKAN KOMPUTER 6. CYBER LAW REFERS TO ANY LAWS RELATING TO PROTECTING THE INTERNET AND OTHER ONLINE COMMUNICATION TECHNOLOGIES UNDANG-UNDANG SIBER MERUJUK KEPADA UNDANG-UNDANG BAGI MELINDUNGI KEPENTINGAN BDERKAITAN INTERNET DAN TEKNOLOGI KOMUNIKASI
  • 13. 1.2.1.2 Differentiate between ethics and law. Law Ethics AS A RULE TO CONTROL COMPUTER USERS. AS A GUIDELINE TO COMPUTER USERS PERATURAN MENGAWAL PENGGUNA PC PANDUAN UNTUK PEN GGNA KOMPUTER TO PREVENT MISUSE OF COMPUTERS ETHICAL BEHAVIOR IS JUDGED BY MORAL MENGELAKKAN PENYALAHGUNAAN PC STANDARDS. KELAKUAN DIHAKIMI OLEH STANDARD MORAL COMPUTER USERS MUST FOLLOW THE COMPUTER USERS ARE FREE TO FOLLOW REGULATIONS AND LAW. PENGGUNA PC OR IGNORE THE CODE OF ETHICS. BEBAS MESTI MEMATUHINYA UNTUK MENGIKUT ETIKA ATAU TIDAK PUNISHMENTS ADA HUKUMAN NO PUNISHMENT FOR ANYONE WHO VIOLATES ETHICS. TIADA HUKUMAN UNTUK MEREKA YANG MELANGGARNYA DEPEND ON COUNTRY AND STATE WHERE UNIVERSAL, CAN BE APPLIED ANYWHERE, THE CRIME IS COMMITTED BERGANTUNG ALL OVER THE WORLD SEMUA TEMPAT DI KEPADA NEGARA YANG TERBABIT DUNIA NOT OBEYING LAWS ARE CALLED CRIME NOT FOLLOWING ETHICS ARE CALLED TIDAK MEMATUHI AKAN DIGELAR IMMORAL TIDAK MEMATUHINYA DIGELAR PENJENAYAH TIDAK BERMORAL
  • 14. 1.2.1.3 State the need for intellectual property laws AS BUSINESSES CONTINUE TO EXPAND GLOBALLY, BUSINESS OWNERS MUST REALIZE THE IMPORTANCE OF GETTING PROFESSIONAL ADVICE ON HOW TO ESTABLISH AND SAFEGUARD THEIR INTELLECTUAL PROPERTY RIGHTS. THESE INCLUDE : o TRADEMARKS FOR BRAND IDENTITY o COPYRIGHTS FOR MATERIALS o PATENTS FOR INVENTIONS o DESIGN FOR PRODUCT APPEARANCE PERNIAGAAN BERKEMBANG SECARA GLOBAL DIMANA PEMILIK MESTI SEDAR KEPENTINGAN MENDAPATKAN KHIDMAT NASIHAT BAGAIMANA MENJAGA HAK MILIK MEREKA. INI MERANGKUMI o IDENTITI PRODUK o HAKCIPTA o PATEN o REKABENTUK
  • 15. 1.2.2.1 List ways to protect privacy. PRIVACY CAN BE PROTECTED BY: (A) PRIVACY LAW THE PRIVACY LAWS IN MALAYSIA EMPHASISES ON THE FOLLOWING: - SECURITY SERVICES TO REVIEW THE SECURITY POLICY - SECURITY MANAGEMENT TO PROTECT THE RESOURCES - SECURITY MECHANISM TO IMPLEMENT THE REQUIRED SECURITY SERVICES - SECURITY OBJECTS, THE IMPORTANT ENTITIES WITHIN THE SYSTEM ENVIRONMENT (A) UNDANG-UNDANG PRIVASI UNDANG-UNDANG PRIVASI DI MALAYSIA BERKAITAN DENGAN - SERVIS KESELAMATAN UNTUK MEMAPARKAN POLISI KESELAMATAN - PENGURUSAN KESELAMATAN UNTUK MENGAWAL SUMBER - MEKANISMA KESELAMATAN BAGI MENGIMPLEMENTSI KEPERLUAN PERKHIDMATAN KESELAMATAN - OBJEK KESELAMATAN, ENTITI PENTING BERKAITAN PERSEKITARAN KESELAMATAN
  • 16. 1.2.2.1 List ways to protect privacy. PRIVACY CAN BE PROTECTED BY: (B) UTILITIES SOFTWARE - INSTALL ANTI-SPAM PROGRAM, FIREWALL, ANTI-SPYWARE AND ANTIVIRUS - PURCHASE GOODS WITH CASH RATHER THAN CREDIT CARD - CLEAR YOUR HISTORY FILE WHEN YOU ARE FINISHED BROWSING - FILL IN ONLY NECESSARY INFORMATION ON WARRANTY AND REGISTRATION FORM. (B) PERISIAN UTILITI - MENGINSTALL PROGRAM ANTI SPAM, DINDING API, ANTI PERISIK DAN ANTIVIRUS - MEMBELI BARANGAN SECARA TUNAI - MENGHILANGKAN SEJARAH CARIAN INTERNET APABILA SELESAI MELAYARI INTERNET - HANYA MENGISI PERKARA YANG PERLU DALAM BORANG INTERNET
  • 17. 1.2.2.2 State authentication and verification methods/ technologies. AUTHENTICATION IS A PROCESS WHERE USERS VERIFY THEIR IDENTITY. AUTHENTICATION DEALS WITH THE PROBLEM OF DETERMINING WHETHER A USER SHOULD BE ALLOWED ACCESS TO A PARTICULAR SYSTEM. PEMBUKTIAN MERUPAKAN PROSES DI MANA PENGGUNA MENGESAHKAN BUKTI IDENTITI SAMADA PENGGUNA ITU DIBENARKAN ATAU TIDAK MENGAKSES SESUATU SISTEM METHODS OF AUTHENTICATION THERE ARE TWO COMMONLY USED AUTHENTICATION METHODS, WHICH ARE BIOMETRIC DEVICE AND CALLBACK SYSTEM. LANGKAH DALAM PEMBUKTIAN ADA 2 CARA YANG BIASA IAITU PERANTI BIOMETRIK DAN SISTEM PANGGIL SEMULA A. BIOMETRIC DEVICE/ PERANTI BIOMETRIK IS A DEVICE THAT TRANSLATES PERSONAL CHARACTERISTICS INTO A DIGITAL CODE THAT IS COMPARED WITH A DIGITAL CODE STORED IN THE DATABASE. ADALAH PERANTI YANG MENUKAR KARAKTOR PERIBADI KEPADA KOD DIGITAL YANG BOLEH MEMBANDINGKAN DENGAN KOD DIGITAL YANG DISIMPAN DALAM PANGKALAN DATA B. CALLBACK SYSTEM/SISTEM PANGGIL SEMULA REFERS TO THE CHECKING SYSTEM THAT AUTHENTICATES THE USER MERUJUK KEPADA SISTEM YANG MENYEMAK PEMBKTIAN OLEH PENGGUNA
  • 18. 1.2.2.2 State authentication and verification methods/ technologies. METHODS OF VERIFICATION THERE ARE TWO METHODS COMMONLY USED IN VERIFICATION, WHICH ARE USER IDENTIFICATION AND PROCESSED OBJECT. LANGKAH DALAM PENGESAHAN 2 KAEDAH BIASA DALAM PENGESAHAN ADALAH MENGENALPASTI IDENTITI DAN OBJEK PEMPROSESAN A. USER IDENTIFICATION/PENGENALPASTI IDENTITI REFERS TO THE PROCESS OF VALIDATING THE USER. MERUJUK KEPADA PROSES YANG DIJALANKAN PRNGGUNA BAGI PENGESAHAN B. PROCESSED OBJECT/ OBJEK PEMPROSESAN REFERS TO SOMETHING THE USER HAS SUCH AS IDENTIFICATION CARD, SECURITY TOKEN AND CELL PHONE. MERUJUK KEPADA PENGGUNA YANG MEMPUNYAI OBJEK SEPERTI KAD PENGENALAN, TOKEN KESELAMATAN DAN TELEFON.
  • 19. 1.2.3.1 a)List effects of controversial contents of pornography on society PORNOGRAPHY  CAN LEAD TO CRIMINAL ACTS SUCH AS EXPLOITATION OF WOMEN AND CHILDREN  CAN LEAD TO SEXUAL ADDICTION OR PERVERSION  CAN DEVELOP LOW MORAL VALUE TOWARDS OTHER MEN, WOMEN OR CHILDREN  CAN ERODE GOOD RELIGIOUS, CULTURAL AND SOCIAL BELIEFS AND BEHAVIOR PORNOGRAFI ◦ BOLEH MENGGALAKKAN PERLAKUAN JENAYAH SEPERTI EKSPLOITASI WANITA DAN KANAK-KANAK ◦ BOLEH MENJURUS KEPADA PERLAKUAN SEKS ◦ BOLEH MEMBANGUNAKAN NILAI MORAL YANG RENDAH TERHADAP LELAKI DAN WANITA NAHUPUN KANAK-KANAK SLANDER  CAN DEVELOP INTO A SOCIETY THAT DISREGARDS HONESTY AND TRUTH  CAN DEVELOP BAD HABIT OF SPREADING UNTRUTHS AND RUMORS  CAN LEAD TO UNNECESSARY ARGUMENT  CAN CAUSE PEOPLE TO HAVE NEGATIVE ATTITUDES TOWARDS ANOTHER PERSON FITNAH  BOLEH MEMBANGUNKAN MASYARAKAT YANG TIDAK JUJUR  BOLEH MEMBANGUNKAN TABIAT BURUK SEPRTI MENYEBARKAN KHABAR ANGIN  MEMBAWA KEPADA PERTELINGKAHAN YANG TIDAK PERLU  BOLEH MENYEBABKAN PERLAKUAN NEGATIF ANTARA SAU SAMA LAIN ATAU MASYARAKAT KESELURUHANNYA
  • 20. 1.2.3.2 Describe the process of filtering to control access to controversial contents THE METHOD OF CHOICE TO LIMIT ACCESS ON THE INTERNET IS TO FILTER EITHER BY A. KEYWORD BLOCKING. THE METHOD USES A LIST OF BANNED WORD OR OBJECTS TERMS SUCH AS XXX, SEX, AND NUDE. AS THE PAGE IS DOWNLOADING, THE FILTER SEARCHES FOR ANY OF THESE WORDS. IF FOUND, IT WILL BLOCKED THE PAGE COMPLETELY. STOP DOWNLOADING THE PAGE, BLOCK THE BANNED WORDS AND EVEN SHUT DOWN THE BROWSER. B. SITE BLOCKING. THE METHOD USE SOFTWARE TO LIST THE WEBSITES THAT WILL BE BLOCKED BY USING SOFTWARE. THE SOFTWARE PREVENTS USERS FROM BEING ACCESS THE WEB SITES ON LIST. C. WEB RATING SYSTEM. WEB SITES ARE RATING IN TERMS OF NUDITY, SEX, VIOLENCE AND LANGUAGE. THE WEB SITES RATE CAN BE DONE BY SETTING THE BROWSER TO ONLY ACCEPT PAGE WITH CERTAIN LEVEL OF RATINGS. LANGKAH PENAPISAN DALAM MELAYARI INTERNET ADALAH A. PENGHALANG KATAKUNCI  KATAKUNCI YANG BERKAITAN DENGAN PERKARA-PERKARA BURUK DISIMPAN DALAM PANGKALAN DATA.PENGGUNA YANG MENAIP ATAU MENEKAN PERKATAAN TERSEBUT AKAN DIHALANG DARI MENGAKSES LAMAN BERKAITAN PERKARA TERSEBUT B. PENGHALANG TAPAK  SATU PERISIAN BERFUNGSI UNTUK MENGENALPASTI LAMAN-LAMAN YANG TIDAK PATUT ATAU BOLEH DILAYARI. C. SISTEM RATING WEB  MERUPAKAN SISTEM YANG MENGENALPASTI LAMAN-LAMAN YANG TIDAK BAIK YANG SELAU DILAYARI. SISTEM AKAN MENGHALANG PENGGUNA DARIPADA MELAYARI LAMAN-LAMAN WEB TERSEBUT.
  • 21. 1.2.4.1 Explain the need for cyber law THE NEED FOR CYBER LAW IS TO PROTECT THE INTERNET AND OTHER ONLINE COMMUNICATION TECHNOLOGIES.THE NEEDS OF CYBER LAW ARE  INTEGRITY AND SECURITY INFORMATION  LEGAL STATUS OF ONLINE TRANSACTIONS  PRIVACY AND CONFIDENTIALLY OF INFORMATION  INTELLECTUAL PROPERTY RIGHTS  SECURITY OF GOVERNMENT DATA KEPERLUAN UNDANG-UNDANG SIBER ADALAH UNTUK MENGAWAL INTERNET DAN LAIN-LAIN TEKNOLOGI ATAS TALIAN. IA BERKAITAN  MAKLUMAT KESELAMATAN DAN INTEGRITI  TRANSAKSI ATAS TALIAN YANG SAH  MAKLUMAT PRIVASI DAN SULIT  HAK CIPTA TERPELIHARA  KESELAMATAN DATA KERAJAAN
  • 22. 1.2.4.2 Explain briefly the computer crimes below:  COMPUTER FRAUD IS DEFINED AS HAVING AN INTENTION TO TAKE ADVANTAGE OVER OR CAUSING LOSS TO OTHER PEOPLE, MAINLY ON MONETARY BASIS THROUGH THE USE OF COMPUTERS.  THERE ARE MANY FORMS OF COMPUTER FRAUD WHICH INCLUDE E- MAIL HOAXES, PROGRAM FRAUD, INVESTMENT SCHEMES, SALES PROMOTIONS AND CLAIMS OF EXPERTISE ON CERTAIN FIELDS.  PENIPUAN KOMPUTER MERUJUK KEPADA MENGAMBIL PERHATIAN ATAU KESEMPATAN YANG BOLEH MENGAKIBATKAN KERUGIAN KEPADA ORANG LAIN MENERUSI PENGGUNAAN KOMPUTER. CONTOHNYA PENIPUAN EMAIL, SKIM PELABURAN, PROMOSI JUALAN DSBNYA.  COPYRIGHT INFRINGEMENT IS DEFINED AS A VIOLATION OF THE RIGHTS SECURED BY A COPYRIGHT. COPYRIGHT INFRINGEMENT INVOLVES ILLEGAL COPY OR REPRODUCTION OF COPYRIGHTS MATERIAL BY THE BLACK MARKET GROUP. THE OPEN COMMERCIAL SALE OF PIRATED ITEM IS ALSO ILLEGAL.  PELANGGARAN HAKCIPTA MERUJUK KEPADA PELANGGARAN KEPADA HAKCIPTA, MENYALIN SEMULA TANPA KEBENARAN DAN SEBAGAINYA.
  • 23. 1.2.4.2 Explain briefly the computer crimes below:  COMPUTER THEFT IS DEFINED AS THE UNAUTHORIZED USE OF ANOTHER PERSON’S PROPERTY WITH THE INTENTION TO DENY THE OWNER THE RIGHTFUL POSSESSION OF THAT PROPERTY OR ITS USE.EXAMPLES OF COMPUTER THEFT INCLUDE:  TRANSFER OF PAYMENTS TO THE WRONG ACCOUNTS  GET ONLINE MATERIALS WITH NO COST  TAP INTO DATA TRANSMISSION LINES ON DATABASE AT NO COST  DIVERT GOODS TO THE WRONG DESTINATION  PENCURIAN KOMPUTER BERMAKSUD PENGGUNAAN TANPA KEBENARAN KEATAS HAK MILIK ORANG LAIN DENGAN NILAI MEROSAK, MENGUBAH, MENUKAR DAN SEBAGAINYA ◦ PENGALIHAN WANG DARI AKAUN ORANG LAIN ◦ MENDAPAT BARANAN ATAS TALIAN TANPA BAYAR ◦ MENDAPAT MAKLUMAT TAMNPA BAYARAN ◦ MENGALIHKAN PENGHANTARAN BARANGAN KE TEMPAT LAIN
  • 24. 1.2.4.2 Explain briefly the computer crimes below:  COMPUTER ATTACK MAY BE DEFINED AS ANY ACTIVITIES TAKEN TO DISRUPT THE EQUIPMENT OF COMPUTER SYSTEMS, CHANGE PROCESSING CONTROL OR CORRUPT STORED DATA.  COMPUTER ATTACK CAN BE IN THE FORMS OF:  PHYSICAL ATTACK THAT DISRUPT THE COMPUTER FACILITY OR ITS TRANSMISSION LINES.  AN ELECTRONIC ATTACK THAT USES THE POWER OF ELECTROMAGNETIC ENERGY TO OVERLOAD COMPUTER CIRCUITRY.  A COMPUTER NETWORK ATTACK THAT USES A MALICIOUS CODE TO EXPLOIT A WEAKNESS IN SOFTWARE, OR IN THE COMPUTER SECURITY PRACTICES OF A COMPUTER USER  SERANGAN KOMPUTER DIDEFINISIKAN SEBAGAI AKTIVITI MENGGANGU PERALATAN KOMPUTER , MENGUBAH KAWALAN DAN MEROSAKKAN DATA YANG DISIMPAN. SERANGAN KOMPUTER BOLEH DALAM BENTUK ◦ SRANGAN FIZIKAL YANG MEROSAKKAN PERALATAN DAN TALIAN PENGHANTARAN ◦ SERANGAN ELEKTRONOK DI MANA BOLEH MENYEBABKAN KEROSAKAN ATAS PERALATAN AKIBAT LEBIHAN KUASA.  SERANGAN RANGKAIAN KOMPUTER DENGAN MENGGUNAKAN KOD SERANGAN BAGI MENGEKSPLOIT KELEMAHAN PERISIAN DSBNYA
  • 25. 1.3.1 Definition
  • 26. 1.3.1.1 Define Computer security.  COMPUTERS SECURITY MEANS PROTECTING OUR COMPUTER SYSTEMS AND THE INFORMATION THEY CONTAINS AGAINST UNWANTED ACCESS, DAMAGE, DESTRUCTION OR MODIFICATION.  KESELAMATAN KOMPUTER BERMAKSUD MELINDUNGI SISTEM KOMPUTER DAN MAKLUMAT DI DALAMNYA DARIPADA AKSES YANG TIDAK DIBENARKAN, KEROSAKAN DAN PENGUBAHAN
  • 27. 1.3.2.1 Explain briefly the different threats to computer security:  MALICIOUS CODE IS ALSO KNOWN AS A ROUGE PROGRAM. IT IS A TREAT TO COMPUTING ASSETS BY CAUSING UNDESIRED EFFECTS IN THE PROGRAMMER’S PART. THE EFFECT CAUSE BY AGENT, WITH THE INTENTION TO CAUSE DAMAGE. THE AGENT FOR MALICIOUS CODE IS THE WRITER OF THE CODE, OR ANY PERSON WHO CAUSES ITS DISTRIBUTION. THERE ARE VARIOUS KINDS OF MALICIOUS CODE. THEY INCLUDE VIRUS, TROJAN HORSE, LOGIC DOOR, TRAPDOOR AND BACKDOOR, WORM AND MANY OTHERS.  KOD MALICIOUS JUGA DIKENALI SEBAGAI PROGRAM PEMECAH. IA MENGGANGU ASET KOMPUTER DENGAN MENYEBABKAN KEROSAKAN. AGEN KOD INI AKAN MENGUBAH KOD YANG TERDAPAT DALAM PROGRAM DAN MEROSAKKAN KOMPUTER DENGAN KESANNYA SEPERTI GANGGUAN KEPADA PERJALANAN PROGRAM. CONTOHNYA TROJAN HORSE, LOGIC DOOR, TRAPDOOR DAN BACKDOOR, WORM(CECACING) DAN BANYAK LAGI
  • 28. 1.3.2.1 Explain briefly the different threats to computer security:  HACKING IS A SOURCE OF THREAT TO SECURITY IN COMPUTER. IT IS DEFINED AS UNAUTHORIZED ACCESS TO THE COMPUTER SYSTEM BY A HACKER.  HACKERS ARE PERSONS WHO LEARN ABOUT THE COMPUTER SYSTEM IN DETAIL. THEY WRITE PROGRAM REFERRED TO AS HACKS. HACKERS MAY USE A MODEM OR CABLE TO HACK THE TARGETED COMPUTERS.  HACKING ADALAH SUMBER GANGGUAN KEPADA KESELAMATAN DALAM KOMPUTER. IA BOLEH DIISTILAHKAN SEBAGAI AKSES TANPA KEBENARAN KEPADA SISTEM KOMPUTER OLEH ORANG YANG DIKENALI SEBAGAI HACKER. HACKER ADALAH ORANG YANG ADA KEPANDAIAN TENTANG SISTEM KOMPUTER. MEREKA MENULIS PROGRAM KOMPUTER BERDASARKAN PENGGUNAAN MODEM DAN KABEL UNTUK MEROSAKKAN KOMPUTER.  ENVIRONMENTAL DISASTER . BE IT AT HOME, STORES, OFFICES AND ALSO AUTOMOBILES. EXAMPLES OF NATURAL AND ENVIRONMENTAL DISASTERS:  FLOOD  FIRE  EARTHQUAKES, STORMS AND TORNADOS  EXCESSIVE HEAT  INADEQUATE POWER SUPPLY  BENCANA ALAM ADALAH JUGA SATU CARA YANG MEROSAKKAN KOMPUTER. CONTOHNYA BANJIR, TANAH RUNTUH, GEMPA BUMI DAN SEBAGAINYA.
  • 29. 1.3.3.1 Select the appropriate security measures to overcome the identified computer threats.  Data Backup :  Cryptography  Anti virus  Anti spyware  Firewall  Human Aspects
  • 30. 1.3.3.2 Apply the correct security procedures. DATA BACKUP :  SALINAN FAIL ATAU PROGRAM DALAM BENTUK CD ATAU DVD, DISKET ATAU CAKERA KERAS CRYPTOGRAPHY  PROSES MENYEMBUNYIKAN MAKLUMAT DENGAN MENGUBAH MAKLUMAT DALAM BENTUK YANG LAIN TETAPI DIFAHAMI OLEH EMPUNYANYA. ANTI VIRUS  MENGGUNAKAN PERISIAN ANTI VIRUS. CONTOH KASPERSKY, AVD, PANDA DAN SEBAGAINYA ANTI SPYWARE  PERISIAN YANG MELINDUNGI KOMPUTER DARIPADA PERISIKAN LUAR MELAUI ATAS TALIAN DIMANA SPYWARE AKAN MENCURI MAKLUMAT PENTING PENGGUNA SEPERTI NO PIN BANK DAN SEBAGAINYA. FIREWALL  MELINDUNGI KOMPUTER BERDASARKAN POLISI KESELAMATAN. BOLEH BERBENTUK PERKAKASAN ATAU PERISIAN. 3 JENISIAITU  SCREENING ROUTERS- RINGKAS, HANYA MELIHAT ALAMAT DAN JENIS PROTOCOL.  PROXY GATEWAY- RUMIT, MLIHAT KESELURUHAN TEKS  GUARD-LEBIH RUMIT, JUGA MELIHAT KESELURUHAN TEKS HUMAN ASPECTS  MERUJUK KEPADA PENGGUNA DAN JUGA PENGGANGU DALAM SISTEM KOMPUTER.
  • 31.
  • 32. 1.4.1 Impact of ICT on Society
  • 33. 1.4..1.1 Impact of ICT on Society POSITIVE IMPACT  FASTER COMMUNICATION SPEED . WITH THE INTERNET, NEWS OR MESSAGE ARE SEND VIA E-MAIL TO ANYONE EFFICIENTLY. WITH THE CAPABILITY OF BROADBAND AND SPEED OF CONNECTION ON THE INTERNET, ANY INFORMATION CAN BE TRAVEL FASTER.  LOWER COMMUNICATION COST . WITH THE INTERNET, WE DO NOT HAVE TO PAY ANY BASIC SERVICES PROVIDED BY IN THE INTERNET. FURTHERMORE, THE COST OF THE CONNECTION TO THE INTERNET IS RELATIVELY CHEAP.  IPEOPLE CAN SHARE OPINION FROM INFORMATION THROUGH DISCUSSION GROUP AND FORUMS THROUGH INTERNET.  INFORMATION CAN BE STORED AND RETRIEVED THROUGH THE DIGITAL MEDIUM INSTEAD OF PAPER. (PAPERLESS ENVIRONMENT)  INFORMATION AND COMMUNICATION CAN BE BORDERLESS THROUGH INTERNET. BY USING INTERNET, PEOPLE ALL AROUND THE WORLD CAN BE CONNECTED THROUGH EACH OTHER. IMPAK POSITIF  KELAJUAN KOMUNIKASI YANG CEPAT – MELALUI INERNET, BERITA ATAU MESEJ MENERUSI EMAIL AKAN LEBIH CEPAT DAN PANTAS.  KOS KOMUNIKSI YANG RENDAH – DENGAN INTERNET, KITA TIDAK PERLU MEMBUAT PEMBAYARAN ASAS PERKHIDMATAN.  MANUSIA BOLEH BERKONGSI MAKLUMAT – MELALUI FORUM INTERNET  PENYIMPAN MAKLUMAT BOLEH DIBUAT DAN TANPA KERTAS  DUNIA TANPA SEMPADAN – DENGAN INTERNET , MANUSIA BOLEH BERHUBUNG DENGAN SEMUA ORANG DI DUNIA DENGAN MUDAH
  • 34. NEGATIVE IMPACT  Borderless information at time can be negative because it courage people to access pornography and violence website. It can cause low moral values. It also can created problems such as gambling, information theft and fraud.  Computers can harms users if they use for long hours frequently KESAN NEGATIF  MAKLUMAT TANPA SEMPADAN KADANGKALA ADALAH NEGATIF – CONTOHNYA MENGGALAKKAN PORNOGRAFI DAN KEGANASAN  KOMPUTER MENGGANGGU KESIHATAN JIKA DIGUNAKAN TERLALU LAMA.
  • 35. Choose ONE of the following topics:  Copyright and Piracy from Moral and Legal Standpoints.  Lack of Security and its Effects on Industry/Economy/ Government.  Malaysian Cyber Law, Electronic Government Law.  Phishing  Virus (Trojan Horse, Salami Attack)  Hacking  Security Measures (Biometrics, Authentication
  • 36.  DIGITAL SIGNATURE ACT 1997  TELEMEDICINE ACT 1997  COMPUTER CRIME ACT 1997  COMMUNICATION AND MULTIMEDIA ACT 19989