You are on page 1of 20

ICT NOTES ICT AND SOCIETY SPM 2009

1.1.1.1 Define ICT

ICT is the technology required for information processing, in particular, the use of electronic computers,
communication devices and software application to convert, store, protect, process, transmit and retrieve
information from anywhere, anytime

Information
• collection of related data
• data that have been processed into a format that is understandable by its intended audience
• collection of facts from which conclusions may be drawn

Communication
• electronic transmission of information that has been encoded digitally (as for storage and
processing by computers)
• transfer of digital data by electronic or electrical means
• transmitting or receiving processed data, sound or other bits of information over telephone wire,
radio, or other electromagnetic means
• movement of data electronically from one point to another over a suitable transmission medium

Technology
• the use of scientific knowledge, experience and resources to create something new in our life
• is vital in communication
• the application of scientific or other organized knowledge--including any tool, technique,
product, process, method, organization or system--to practical tasks

Technology Timeline

3500 BC The Sumerians developed cuneiform writing.

1500 BC The Phoenicians developed the alphabet.

105 BC Tsai Lun of China invented paper.

1454 The first printing began with the creation of printing machine.

1793 The telegraph line was invented.

1876 The first telephone was introduced.

1925 Television was made.

1941 The computer was created.

1958 The photocopier machine was introduced.

1963 The communication satellite was introduced.

1969 The first Internet known as ARPANET was introduced.

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 1
ICT NOTES ICT AND SOCIETY SPM 2009

1.1.1.2 Describe the brief evolution of computers

First Generation (1940-1956)


• computers were huge, slow, expensive and often unreliable
• 1944, MARK 1 was the first large-scale automatic digital computer in the USA which uses
mechanical switches
• 1946, two Americans, Presper Eckert andWillian Mauchly build the ENIAC (Electronic
Numerical Integrator and Computer) which uses vacuum tubes
• 1951, Eckert and Mauchly build the UNIVAC, which could calculate at the rate of 10,000
addition per seconds.

Vacuum Tube UNIVAC MARK 1

Vacuum tube
• electronic tubes that were made of glass and were about the size of light bulbs, used as the
internal computers components
• disadvantages
- generated a great deal of heat causing many problems in temperature regulation and
climate control
- burnt out frequently

Second Generation (1956-1963) - The Transistor Age


• the transistor is created - small devices use to transfer electronic signals across a resister
• famous computer scientists during the second generation era were :
- John Barden
- Walter Houser Brattain
- William Shockly
• transistor were
- smaller than vacuum tubes
- needed no warm up time
- consumed less energy
- generated much less heat
- faster and more reliable

Third Generation (1964-1971) - The Integrated Age

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 2
ICT NOTES ICT AND SOCIETY SPM 2009

• the IBM 370 series were introduced in 1964


• used for business and scientific programs
• computer models introduced were CDC 7600 and B2500
• development of integrated circuit (IC) begins in this era

• Magnetic Core Memory was replaced by a device called microchip


• integrated circuit technology
- reduced the size and cost of computer
- a complete electronic circuit on a small chip of silicone
• silicone chips were manufactured in 1961 at the Silicone Valley
- Reliable
- Cheaper

Fourth Generation (1971-Present)


• the growth of the computer industry developed technologies of computer inventions
• include many types of computer models such as
- IBM
- DELL
- ACER
- Apple Macintosh

• hardware technology such as silicon chip, microprocessor and storage devices were
invented
• microprocessor
- specialized chip which is developed for computer memory and logic
- large-scale integrated circuit which contains thousands of transistors
- transistors capable of performing all of a function of a computer central processing
unit

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 3
ICT NOTES ICT AND SOCIETY SPM 2009

Fifth Generation (1991 & Beyond)


• computers are technologically advanced and are still being development to become more
efficient
• the technology of computer has become more advanced, modern and sophisticated
• emerging microelectronic technologies with high computing speeds and parallel processing
• technology to support
- virtual reality
- intelligent systems
- programs which translate languages
• expert system such as teleconferencing and speech-recognition system also have been invented
in this era
• latest invention in the era of computers are
- super computers
- mainframe computers
- mini computers
- personal computers
- mobile computers

• development of very large-scale integration (VLSI) technology, which can put many more
circuits onto an integrated circuit (chip) than is currently possible, and developments in
computer hardware and software design may produce computers far more powerful than those in
current use
• a computer will be able to communicate in natural spoken language with its user; store vast
knowledge databases; search rapidly through these databases, making intelligent inferences and
drawing logical conclusions; and process images and ‘see’ objects in the way that humans do

1.1.2.1 List the usage of ICT in everyday life

Education
• teaching materials and participate in online forums
• sources of information
• medium to collect and process data

Banking
• transaction can be made anytime and anywhere
• we can access our account by using the online services offered by the bank
• bank administrators can oversee the entire banking activities

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 4
ICT NOTES ICT AND SOCIETY SPM 2009

Industry
• facilitate production planning and control system
• support chain management
• help in the product design
• take over the job that are dangerous to the workers by using robots
• control and oversee the entire operations in the factory

Commerce
• deals with the exchange of goods and services from producer to final consumer
• customers used computers to be connected online with suppliers to purchase products
• suppliers use computers to track of their transaction
• employees use computers to communicate with their customers

1.1.2.2 State the differences between computerized and non-computerised systems.

Computer system
A system typically consist of component connected together in order to facilitate the flow of information,
matter or energy.
A computer system consists of a set of hardware and software which processes data in a meaningful way.

The differences before and after the presence of ICT

Education before ICT Education with ICT

• no computer used to teach student • teacher use computer to teach student

Banking before ICT Banking with ICT

• banking was done manually by • all transactions are done by computers


taking deposits directly
• transaction can be done at anytime and place
• transactions can only be made
• online services, phone banking system, credit
during working hours
cards are available
• takes time to approve any loan
applications

Industry before ICT Industry with ICT

• production was slow because everything was • computers and telecommunications industry
done manually and totally depended on human became very popular and profitable since
labour production can be increased through an all day
operation

Commerce before ICT Commerce with ICT

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 5
ICT NOTES ICT AND SOCIETY SPM 2009

• trading was made using the barter system • E-commerce plays an important role in the
and it was then later developed into currency economic scene
• advertisement was in the form of word of • includes distribution, buying, selling and
mouth, billboards and printed flyers servicing products that are done electronically
• trading globally was extremely slow, late
and expensive
• traders had to find ways to market local
products in the global market

1.1.2.3 State the Impact of ICT on Society

Positive effects Negative effects

Faster communication speed Health problems


- messages sent via e-mail to friends, business partner - exposed with bad posture,
eyestrain, physical and mental
Lower communication cost
stress
- people do not have to pay for any basic services provided by
Social problems
internet
- People tend to become more
Reliable mode of communication
individualistic and introvert
- information can be retrieved from anywhere and anytime
Effective sharing of information
- can share and exchange opinions, news, and information
through discussion groups, mailing list and forums on the
internet
Paperless environment
- information can be stored and retrieved through the digital
medium instead paper
Borderless communication
- information and communication can be borderless

1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and
Cyber Law

Computer Ethics
o a system of moral standards or values used as a guideline for computer users
o moral guidelines that govern the use of computers and information system
o branch of practical philosophy which deals with how computing professionals should make
decisions regarding professional and social conduct

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 6
ICT NOTES ICT AND SOCIETY SPM 2009

Code of Ethics
o a written guideline that helps determine whether a specific computer action is ethical or
unethical
o a set of standards, rules, guidelines, and values that govern and guide ethical business behavior
in a company, profession, or organization of its employees, interactions among the employees,
and interactions between the employees and the general public
o some are social issues but some set out general principles about an organization's beliefs on
matters such as quality, employees or the environment and others set out the procedures to be
used in specific ethical situations

Intellectual property (IP)


o refers to works created by inventors, authors and artists
o a legal field that refers to creations of the mind such as
- musical, literary, and artistic works; inventions
- symbols, names, images, and
- designs used in commerce, including copyrights, trademarks, patents, and related rights
o works which are unique
o holder of one of these abstract properties has certain exclusive rights to the creative work,
commercial symbol, or invention by which it is covered and have value in the market place

Privacy
o in IT refers to data and information privacy
- data refers to a collection of raw unprocessed facts, figures and symbols
- computer is used to process data into information
- data include texts, numbers, sounds, images and video
o the rights of individuals and companies to deny or restrict the collection and use of information
about them
o the ability of an individual or group to seclude them or information about themselves and
thereby reveal them selectively
o boundaries and content of what is considered private differ among cultures and individuals, but
share basic common themes

Computer crime
o criminal activity where a computer or network is the source, tool, target, or place of a crime
o include computer fraud, copyright infringement, computer theft, computer attack, blackmail,
and forgery in which computers or networks are used to facilitate the illicit activity

Cyber Law
o refers to any laws relating to protecting the Internet and other online communication
technologies
o describes the legal issues related to use of inter-networked information technology

1.2.1.2 Differentiate between ethics and law

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 7
ICT NOTES ICT AND SOCIETY SPM 2009

Definition of ethics
o a moral philosophy where a person makes a specific moral choice and sticks to it
o significantly broader than the common conception of analyzing right and wrong
o ethics in computing means moral guidelines to refer to when using the computer and computer
networks

Definition of law
o legal system comprising of rules and principles that govern the affairs of a community and
controlled by a political authority
o differs from one country to another
o computer law refers to all areas in law that requires an understanding of computer technology
such as hardware, software and Internet

Examples of laws of computing in Malaysia are:


i) Malaysian Communication and Multimedia Act
ii) Computer Crime Act 1997
iii) Telemedicine Act 1997

Similarities between ethics and law


i) to guide user from misusing computers
ii) to create a healthy computer society, so that computers are used to contribute to a better life
iii) to prevent any crime

1.2.1.3 The Need for the Intellectual Property Laws

Why need Intellectual Property Laws


financial incentive
- exclusive rights allow owners of intellectual property to reap monopoly profits
- monopoly profits provide a financial incentive for the creation of intellectual property,
and pay associated research and development costs
o economic growth
- legal monopoly granted by IP laws are credited with significant contributions toward
economic growth
- industries which rely on IP protections are estimated to produce 72 percent more value
added per employee than non-IP industries
- patent holders can freely relocate prefer operating in countries with strong IP laws
- economic growth that comes with a stronger IP system

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 8
ICT NOTES ICT AND SOCIETY SPM 2009

1.2.2.1 List ways to protect privacy

(a) Privacy law


• security services to review the security policy
• security management to protect the resources
• security mechanism to implement the required security services
(b) Utility software
• anti-spam program, firewall, anti-spyware and antivirus

1.2.2.2 State authentication and verification methods/technologies.

Authentication
o process where users verify that they are who they say they are
o to ensure the user who attempts to perform functions in a system is in fact the user who is
authorised to do so
o two commonly used authentication methods
1. biometric device - a device that translates personal characteristic into a digital code that
is compared with a digital code stored in the database
2. callback system – the checking system that authenticates the user
o very important in order to safeguard against the authorized access and use

Example of biometrics devices are

Fingerprint scanner Facial recognition Hand geometry scanning Iris scanning

Retinal scanning Voice recognition Signature verification


DNA identification
system

Verification
o act of providing or disproving the correctness of a system with respect to a certain
formal specification
o two methods commonly used in verification
1. user identification – the process of validating the user
2. processed object – something the user has such as identification card, security token,

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 9
ICT NOTES ICT AND SOCIETY SPM 2009

key, badge and cell phone

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 10
ICT NOTES ICT AND SOCIETY SPM 2009

1.2.3.1 List effects of Controversial Contents on Society

PORNOGRAPHY
o considered as negative content
o any form of media or material that depicts erotic behaviour and is intended to cause sexual
excitement
o tends to exploit men, women and children in a distasteful manner
o impact to society
- can lead to criminal acts such as exploitation of women and children
- can lead to sexual addiction or perversion
- can develop low moral value towards other men, women or children
- can erode good religious, cultural and social beliefs and behaviour

SLANDER / DEFAMATION / LIBEL


o legal term for false and malicious statement about someone
o impact to society
- can develop into a society that disregards honesty and truth
- can develop bad habit of spreading untruths and rumours
- can lead to unnecessary argument
- can cause people to have negative attitudes towards another person

1.2.3.2 Describe the process of filtering to control access to controversial contents. {Kartika}

Internet Filtering
o process that prevents or blocks access to certain materials on the Internet
o most commonly used to prevent children from accessing inappropriate material and to keep
employees productive on the Internet

Method of controlling the access


of the controversial contents

Keyword Blocking Site Blocking Web Rating System

Keyword Blocking
o software uses
- a list of banned words or objectionable terms
- a predefined list of keywords that it considers offensive or inappropriate
o as the page is downloading, the filter searches for any of these words
o if found, will block the page completely, stop downloading the page, block the banned words and
even shut down the browser

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 11
ICT NOTES ICT AND SOCIETY SPM 2009

Site Blocking
o software
- maintains a list of “dubious internet sites”
- prevents access to any sites on this list
- “denial list” regularly updated

o provides control over what categories of information that to block


o blocks entire web-sites or some parts of these web-sites based on a blacklist (list of blocked sites)
drawn up by companies
o most software vendors do not allow their users to see the list of blocked sites, they consider it a
secret but you can add new or exclude existing sites from their list
o filters can use both site blocking and word blocking

Web Rating system


o web sites are rated in terms of nudity, sex, violence and language
o Recreational Software Advisory Council (RSACI) is responsible for the rating of the web sites on
the content on the Internet
o ratings done by the web page author or by the independent bureau
o browsers set to only accept pages with certain levels of ratings

1.2.4.1 Explain the need for cyber law

Cyber law definition.


o refers to any laws relating to protecting the Internet and other online communication technologies
o describes the legal issues related to use of inter-networked information technology

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 12
ICT NOTES ICT AND SOCIETY SPM 2009

Security of
Security of
government data
government data

Integrity and security Intellectual property


Integrity and security Intellectual property
of information right
of information right
Cyber
Cyberlawlaw
is is
needed to make
needed to make
sure the…
sure the…

Privacy and
Legal status of online Privacy and
Legal status of online confidentially of
transaction confidentially of
transaction information
information

Need for cyber law.


1. ensure security of government data
2. protect intellectual property rights
3. ensure privacy and confidentially of information
4. legal status of online transactions
5. integrity and security of information

The cyber law acts in Malaysia.


1. Digital Signature Act 1997
o secures electronic communications especially on the Internet
o Digital Signature
- an identity verification standard that uses encryption techniques to protect against e-
mail forgery
- encrypted code consists of the user’s name and a hash of all the parts of the message
- by attaching the digital signature, one can ensure that nobody can eavesdrop,
intercept or temper with transmitted data

2. Computer Crimes Act 1997


o gives protection against the misuses of computers and computer criminal activities such as
unauthorised use of programmes, illegal transmission of data or messages over computers
and hacking and cracking of computer systems and networks

3. Telemedicine Act 1997


o ensures that only qualified medical practitioners can practice telemedicine and that their
patient's rights and interests are protected

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 13
ICT NOTES ICT AND SOCIETY SPM 2009

4. Communications and Multimedia Act 1998


o ensures that information is secure, the network is reliable and the service is affordable all
over Malaysia
o ensures high level of user's confidence in the information and communication technology
industry

1.2.4.2 Explain briefly the computer crimes below:


Fraud, Copyright Infringement, Theft, Attacks

Computer Crime
o any criminal activity that is related to the use of computers
o include computer fraud, copyright infringement, computer theft and computer attack
o encompass unauthorized or illegal activities perpetrated via computer as well as the theft of
computers and other technological hardware

1. Fraud
• having an intention to take advantage over or causing loss to other people, mainly on monetary
basis through the use of computer
• any dishonest misrepresentation of fact intended to induce another to do or refrain from doing
something which causes loss

Fraud will result in obtaining a benefit by:


• altering computer input in an unauthorized way
o requires little technical expertise and is not an uncommon form of theft by employees
altering the data before entry or entering false data, or by entering unauthorized
instructions or using unauthorized processes
• altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions: this is difficult to detect
• altering or deleting stored data
• altering or misusing existing system tools or software packages, or altering or writing code for
fraudulent purposes
o requires real programming skills and is not common
• manipulating banking systems to make unauthorized identity theft with reference to ATM fraud

2. Copyright infringement
• unauthorized use of material that is covered by copyright law, in a manner that violates one of
the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted
work, or to make derivative works
• occurs when a person copies someone else's copyrighted items without permission including
public display of a copy of copyrighted work
• a violation of the rights secured by a copyright
• e.g. the widespread of illegal downloading activities and sharing of recorded music in mp3
format also the unauthorized copying of movies even after the closing down of Napster

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 14
ICT NOTES ICT AND SOCIETY SPM 2009

3. Theft
• unauthorized use of another person’s property with intention to deny the owner the rightful
possession of that property or its use
• examples of computer theft include:
- transfer of payments to the wrong accounts
- tap into data transmission lines on database at no cost
- divert goods to the wrong destination

4. Attacks
• any activities taken to disrupt the equipment of computer systems, change processing control or
corrupt stored data
• e.g. physical attack that disrupt the computer facility or its transmission lines then, an electronic
attack that uses the power of electromagnetic energy
• uses a malicious code to exploit a weakness in software, or in the computer security practices of
a computer user
• programs run by people to gain unauthorized control over a computer

Classification of Computer Attacks


1. Remote Penetration
- programs that go out on the Internet (or network) and gain unauthorized control of a computer

2. Local Penetration
- programs that gain unauthorized access to the computer on which they are run

3. Remote Denial of Service


- programs that go out on the Internet (or network) and shut down another computer or a service
provided by that computer
4. Local Denial of Service
- programs that shut down the computer on which they are run
5. Network Scanners
- programs that map out a network to figure out which computers and services are available to
be exploited
6. Vulnerability Scanners
- programs that scour the Internet looking for computers vulnerable to a particular type of
attack
7. Password Crackers
- programs that discover easy-to-guess passwords in encrypted password files
- computers can now guess passwords so quickly that many seemingly complex passwords
can be guessed
8. Sniffers
- programs that listen to network traffic. Often these programs have features to automatically
extract usernames, passwords, or credit card information

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 15
ICT NOTES ICT AND SOCIETY SPM 2009

1.3.1.1 Define computer security

Computer security
- protecting our computer systems and the information they contain against unwanted access,
damage, destruction or modification
- need to protect our computer from any intruders such as hackers, crackers and script kiddie
- do not want strangers to
o read our e-mail
o use our computer to attack other systems
o send forged e-mail from our computer
o examine personal information stored on our computer such as financial statements

1.3.2.1 Explain briefly the different threats to computer security:


Malicious Code, Hacking, Natural Disaster, Theft

Malicious code
 known as a rogue program
 threat to computing assets by causing undesired effects in the programmer’s part
 effects is caused by an agent (with the intention to cause damaged)
 agent = the writer of the code, or any person who cause its distribution

Kinds Of Malicious Code

a) Virus
- potentially damaging computer program that affects, or infects, a computer negatively by
altering the way the computer works without the user’s knowledge or permission
- virus infects the computer, it can spread throughout and may damage files and system
software, including the operating system
- program that can pass the malicious code to other programs by modifying them
- attaches itself to the program
- can overtake the entire computing system and spread to the other system

b) Trojan horse
- program that hides within or looks like a legitimate program
- certain condition or action usually triggers the Trojan horse
- unlike a virus or worm, a Trojan horse does not replicate itself to other computers
- must be installed by users or intruders before it can affect the system’s assets information
then used for malicious purposes

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 16
ICT NOTES ICT AND SOCIETY SPM 2009

c) Logic bomb
- a malicious code that goes off when a specific condition occurs
- example: the time bomb
- goes off and caused threats at a specified time or date

d) Back door
- program or set of instructions in a program that allow user
to bypass security controls when accessing a program,
computer, or network
- perpetrators gain access to insecure computers, install a
back door or modify an existing program to include a back
door, which allows them to continue to access the computer
remotely without the user’s knowledge
- feature in a program that allows someone to access the
program with special privileges

e) Worm
- program that copies itself repeatedly, for example in memory or on a network, using up
resources and possibly shutting down the computer or network

Hacking
 source of threat to security in computer
 unauthorised access to the computer system by hacker
 hacker = persons who learn about the computer system in detail.
they write program referred to as hacks
 hacker may use modem or cable to hack the targeted computers

Natural Disaster (Natural and environmental threats)


Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also
automobiles. Examples of natural and environmental disasters:
• flood
• fire
• earthquakes, storms and tornados
• excessive heat
• inadequate power supply

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 17
ICT NOTES ICT AND SOCIETY SPM 2009

Theft
2 types of computer theft are:
 computer is used to steal money, goods, information and resources
 stealing of computer especially notebook and PDA s
3 approaches to prevent theft are:
 prevent access by using locks, smartcard, or password
 prevent portability by restricting the hardware from being moved
 detect and guard all exits and record any hardware transported

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

People rely on computers to create, store and manage critical information. It is important that the computer
and the data they store are accessible and available when needed. It is also important that users take
measures to protect their computers and data from lost, damage and misused.
Security measures mean the precautionary measures taken toward possible danger or damage.

There are 6 types of security measures that are:

1. Data backup
- program of file duplication
- backups of data applications are necessary so that they can be recovered in case of an
emergency
- depending on the importance of the information, daily, weekly or biweekly backups
from a hard disk can be performed

2. Cryptography
- process of hiding information by altering the actual information into different representation, for
example, an APA can be written as I? X
- considered a branch of both mathematics and computer science, and is affiliated closely with
information theory, computer security, and engineering
- used in applications present in technologically advanced societies; examples include the security of
ATM cards, computer passwords, and electronic commerce, which all depend on cryptography
- cryptosystems depend on a key such as a password like the numbers or a phrase that can be used to
encrypt or decrypt a message
- traditional type of cryptosystem used on a computer network is called a symmetric secret key system

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 18
ICT NOTES ICT AND SOCIETY SPM 2009

3. Antivirus
- protects a computer against viruses by identifying and removing any computer viruses found in the
computer memory, on storage media or incoming e-mail files
- scans for programs that attempt to modify the boot program, the operating system and other
programs that normally are read from but not modified
- program identifies an infected file, it attempts to remove its virus, worm or Trojan horse
- program cannot remove the infection, it often quarantines the infected file
- quarantine is a separate area of a hard disk that holds the infected file until the infection can be
removed to ensure other files will not become infected
- patents for inventions Utility, design or plant patents that protect inventions and improvements to
existing inventions

4. Anti-spyware
Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information
about the user. The spyware program communicates information to the outside source.
An anti-spyware application program sometime called tracking software or a spybot is used to remove
spyware.
Examples of Anti-spywares programs are:
i) Spybot Search and Destro
ii) Ad-aware
iii) Spyware blaster

5. Firewall
- piece of hardware or software which functions in a networked environment to prevent some
communications forbidden by the security policy
- implement a security policy
- might permit limited access from in or outside the network perimeters or from certain user or for
certain activities

There are three types of firewalls:


i) Screening routers
ii) Proxy gateway
iii) Guard

6. Human aspects of security measures


Human aspects refer to the user and also the intruder of a computer system. It is one of the hardest aspects to
give protection to. The most common problem is the lack of achieving a good information security
procedure.

1.3.3.2 Apply the correct security procedures


Antivirus, Anti-Spyware, Cryptography, Firewall, Data backup, Human aspects

Data Backup
• program of file duplication
• backups of data application are necessary so that they can be recovered in case of an emergency

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 19
ICT NOTES ICT AND SOCIETY SPM 2009

Cryptography
• process of hiding information by altering the actual information into different representation, for
example, an APA can be written as I?X

Antivirus
• antivirus program protects a computer against viruses by identifying and removing any computer
viruses found in the computer memory, on storage media or incoming e-mail files

Anti-Spyware
 spyware
o program placed on a computer without the user’s knowledge
o secretly collects information about the user
 anti-spyware application program sometime called tracking software or a spybot is used to remove
spyware

Firewall
• firewall is a piece of hardware or software which functions in a networked environment to prevent
some communications forbidden by the security policy

Human Aspects
• human aspect refers to the user and also the intruder of a computer syste

compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 20

You might also like