Professional Documents
Culture Documents
ICT is the technology required for information processing, in particular, the use of electronic computers,
communication devices and software application to convert, store, protect, process, transmit and retrieve
information from anywhere, anytime
Information
• collection of related data
• data that have been processed into a format that is understandable by its intended audience
• collection of facts from which conclusions may be drawn
Communication
• electronic transmission of information that has been encoded digitally (as for storage and
processing by computers)
• transfer of digital data by electronic or electrical means
• transmitting or receiving processed data, sound or other bits of information over telephone wire,
radio, or other electromagnetic means
• movement of data electronically from one point to another over a suitable transmission medium
Technology
• the use of scientific knowledge, experience and resources to create something new in our life
• is vital in communication
• the application of scientific or other organized knowledge--including any tool, technique,
product, process, method, organization or system--to practical tasks
Technology Timeline
1454 The first printing began with the creation of printing machine.
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 1
ICT NOTES ICT AND SOCIETY SPM 2009
Vacuum tube
• electronic tubes that were made of glass and were about the size of light bulbs, used as the
internal computers components
• disadvantages
- generated a great deal of heat causing many problems in temperature regulation and
climate control
- burnt out frequently
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 2
ICT NOTES ICT AND SOCIETY SPM 2009
• hardware technology such as silicon chip, microprocessor and storage devices were
invented
• microprocessor
- specialized chip which is developed for computer memory and logic
- large-scale integrated circuit which contains thousands of transistors
- transistors capable of performing all of a function of a computer central processing
unit
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 3
ICT NOTES ICT AND SOCIETY SPM 2009
• development of very large-scale integration (VLSI) technology, which can put many more
circuits onto an integrated circuit (chip) than is currently possible, and developments in
computer hardware and software design may produce computers far more powerful than those in
current use
• a computer will be able to communicate in natural spoken language with its user; store vast
knowledge databases; search rapidly through these databases, making intelligent inferences and
drawing logical conclusions; and process images and ‘see’ objects in the way that humans do
Education
• teaching materials and participate in online forums
• sources of information
• medium to collect and process data
Banking
• transaction can be made anytime and anywhere
• we can access our account by using the online services offered by the bank
• bank administrators can oversee the entire banking activities
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 4
ICT NOTES ICT AND SOCIETY SPM 2009
Industry
• facilitate production planning and control system
• support chain management
• help in the product design
• take over the job that are dangerous to the workers by using robots
• control and oversee the entire operations in the factory
Commerce
• deals with the exchange of goods and services from producer to final consumer
• customers used computers to be connected online with suppliers to purchase products
• suppliers use computers to track of their transaction
• employees use computers to communicate with their customers
Computer system
A system typically consist of component connected together in order to facilitate the flow of information,
matter or energy.
A computer system consists of a set of hardware and software which processes data in a meaningful way.
• production was slow because everything was • computers and telecommunications industry
done manually and totally depended on human became very popular and profitable since
labour production can be increased through an all day
operation
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 5
ICT NOTES ICT AND SOCIETY SPM 2009
• trading was made using the barter system • E-commerce plays an important role in the
and it was then later developed into currency economic scene
• advertisement was in the form of word of • includes distribution, buying, selling and
mouth, billboards and printed flyers servicing products that are done electronically
• trading globally was extremely slow, late
and expensive
• traders had to find ways to market local
products in the global market
1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and
Cyber Law
Computer Ethics
o a system of moral standards or values used as a guideline for computer users
o moral guidelines that govern the use of computers and information system
o branch of practical philosophy which deals with how computing professionals should make
decisions regarding professional and social conduct
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 6
ICT NOTES ICT AND SOCIETY SPM 2009
Code of Ethics
o a written guideline that helps determine whether a specific computer action is ethical or
unethical
o a set of standards, rules, guidelines, and values that govern and guide ethical business behavior
in a company, profession, or organization of its employees, interactions among the employees,
and interactions between the employees and the general public
o some are social issues but some set out general principles about an organization's beliefs on
matters such as quality, employees or the environment and others set out the procedures to be
used in specific ethical situations
Privacy
o in IT refers to data and information privacy
- data refers to a collection of raw unprocessed facts, figures and symbols
- computer is used to process data into information
- data include texts, numbers, sounds, images and video
o the rights of individuals and companies to deny or restrict the collection and use of information
about them
o the ability of an individual or group to seclude them or information about themselves and
thereby reveal them selectively
o boundaries and content of what is considered private differ among cultures and individuals, but
share basic common themes
Computer crime
o criminal activity where a computer or network is the source, tool, target, or place of a crime
o include computer fraud, copyright infringement, computer theft, computer attack, blackmail,
and forgery in which computers or networks are used to facilitate the illicit activity
Cyber Law
o refers to any laws relating to protecting the Internet and other online communication
technologies
o describes the legal issues related to use of inter-networked information technology
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 7
ICT NOTES ICT AND SOCIETY SPM 2009
Definition of ethics
o a moral philosophy where a person makes a specific moral choice and sticks to it
o significantly broader than the common conception of analyzing right and wrong
o ethics in computing means moral guidelines to refer to when using the computer and computer
networks
Definition of law
o legal system comprising of rules and principles that govern the affairs of a community and
controlled by a political authority
o differs from one country to another
o computer law refers to all areas in law that requires an understanding of computer technology
such as hardware, software and Internet
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 8
ICT NOTES ICT AND SOCIETY SPM 2009
Authentication
o process where users verify that they are who they say they are
o to ensure the user who attempts to perform functions in a system is in fact the user who is
authorised to do so
o two commonly used authentication methods
1. biometric device - a device that translates personal characteristic into a digital code that
is compared with a digital code stored in the database
2. callback system – the checking system that authenticates the user
o very important in order to safeguard against the authorized access and use
Verification
o act of providing or disproving the correctness of a system with respect to a certain
formal specification
o two methods commonly used in verification
1. user identification – the process of validating the user
2. processed object – something the user has such as identification card, security token,
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 9
ICT NOTES ICT AND SOCIETY SPM 2009
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 10
ICT NOTES ICT AND SOCIETY SPM 2009
PORNOGRAPHY
o considered as negative content
o any form of media or material that depicts erotic behaviour and is intended to cause sexual
excitement
o tends to exploit men, women and children in a distasteful manner
o impact to society
- can lead to criminal acts such as exploitation of women and children
- can lead to sexual addiction or perversion
- can develop low moral value towards other men, women or children
- can erode good religious, cultural and social beliefs and behaviour
1.2.3.2 Describe the process of filtering to control access to controversial contents. {Kartika}
Internet Filtering
o process that prevents or blocks access to certain materials on the Internet
o most commonly used to prevent children from accessing inappropriate material and to keep
employees productive on the Internet
Keyword Blocking
o software uses
- a list of banned words or objectionable terms
- a predefined list of keywords that it considers offensive or inappropriate
o as the page is downloading, the filter searches for any of these words
o if found, will block the page completely, stop downloading the page, block the banned words and
even shut down the browser
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 11
ICT NOTES ICT AND SOCIETY SPM 2009
Site Blocking
o software
- maintains a list of “dubious internet sites”
- prevents access to any sites on this list
- “denial list” regularly updated
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 12
ICT NOTES ICT AND SOCIETY SPM 2009
Security of
Security of
government data
government data
Privacy and
Legal status of online Privacy and
Legal status of online confidentially of
transaction confidentially of
transaction information
information
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 13
ICT NOTES ICT AND SOCIETY SPM 2009
Computer Crime
o any criminal activity that is related to the use of computers
o include computer fraud, copyright infringement, computer theft and computer attack
o encompass unauthorized or illegal activities perpetrated via computer as well as the theft of
computers and other technological hardware
1. Fraud
• having an intention to take advantage over or causing loss to other people, mainly on monetary
basis through the use of computer
• any dishonest misrepresentation of fact intended to induce another to do or refrain from doing
something which causes loss
2. Copyright infringement
• unauthorized use of material that is covered by copyright law, in a manner that violates one of
the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted
work, or to make derivative works
• occurs when a person copies someone else's copyrighted items without permission including
public display of a copy of copyrighted work
• a violation of the rights secured by a copyright
• e.g. the widespread of illegal downloading activities and sharing of recorded music in mp3
format also the unauthorized copying of movies even after the closing down of Napster
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 14
ICT NOTES ICT AND SOCIETY SPM 2009
3. Theft
• unauthorized use of another person’s property with intention to deny the owner the rightful
possession of that property or its use
• examples of computer theft include:
- transfer of payments to the wrong accounts
- tap into data transmission lines on database at no cost
- divert goods to the wrong destination
4. Attacks
• any activities taken to disrupt the equipment of computer systems, change processing control or
corrupt stored data
• e.g. physical attack that disrupt the computer facility or its transmission lines then, an electronic
attack that uses the power of electromagnetic energy
• uses a malicious code to exploit a weakness in software, or in the computer security practices of
a computer user
• programs run by people to gain unauthorized control over a computer
2. Local Penetration
- programs that gain unauthorized access to the computer on which they are run
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 15
ICT NOTES ICT AND SOCIETY SPM 2009
Computer security
- protecting our computer systems and the information they contain against unwanted access,
damage, destruction or modification
- need to protect our computer from any intruders such as hackers, crackers and script kiddie
- do not want strangers to
o read our e-mail
o use our computer to attack other systems
o send forged e-mail from our computer
o examine personal information stored on our computer such as financial statements
Malicious code
known as a rogue program
threat to computing assets by causing undesired effects in the programmer’s part
effects is caused by an agent (with the intention to cause damaged)
agent = the writer of the code, or any person who cause its distribution
a) Virus
- potentially damaging computer program that affects, or infects, a computer negatively by
altering the way the computer works without the user’s knowledge or permission
- virus infects the computer, it can spread throughout and may damage files and system
software, including the operating system
- program that can pass the malicious code to other programs by modifying them
- attaches itself to the program
- can overtake the entire computing system and spread to the other system
b) Trojan horse
- program that hides within or looks like a legitimate program
- certain condition or action usually triggers the Trojan horse
- unlike a virus or worm, a Trojan horse does not replicate itself to other computers
- must be installed by users or intruders before it can affect the system’s assets information
then used for malicious purposes
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 16
ICT NOTES ICT AND SOCIETY SPM 2009
c) Logic bomb
- a malicious code that goes off when a specific condition occurs
- example: the time bomb
- goes off and caused threats at a specified time or date
d) Back door
- program or set of instructions in a program that allow user
to bypass security controls when accessing a program,
computer, or network
- perpetrators gain access to insecure computers, install a
back door or modify an existing program to include a back
door, which allows them to continue to access the computer
remotely without the user’s knowledge
- feature in a program that allows someone to access the
program with special privileges
e) Worm
- program that copies itself repeatedly, for example in memory or on a network, using up
resources and possibly shutting down the computer or network
Hacking
source of threat to security in computer
unauthorised access to the computer system by hacker
hacker = persons who learn about the computer system in detail.
they write program referred to as hacks
hacker may use modem or cable to hack the targeted computers
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 17
ICT NOTES ICT AND SOCIETY SPM 2009
Theft
2 types of computer theft are:
computer is used to steal money, goods, information and resources
stealing of computer especially notebook and PDA s
3 approaches to prevent theft are:
prevent access by using locks, smartcard, or password
prevent portability by restricting the hardware from being moved
detect and guard all exits and record any hardware transported
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
People rely on computers to create, store and manage critical information. It is important that the computer
and the data they store are accessible and available when needed. It is also important that users take
measures to protect their computers and data from lost, damage and misused.
Security measures mean the precautionary measures taken toward possible danger or damage.
1. Data backup
- program of file duplication
- backups of data applications are necessary so that they can be recovered in case of an
emergency
- depending on the importance of the information, daily, weekly or biweekly backups
from a hard disk can be performed
2. Cryptography
- process of hiding information by altering the actual information into different representation, for
example, an APA can be written as I? X
- considered a branch of both mathematics and computer science, and is affiliated closely with
information theory, computer security, and engineering
- used in applications present in technologically advanced societies; examples include the security of
ATM cards, computer passwords, and electronic commerce, which all depend on cryptography
- cryptosystems depend on a key such as a password like the numbers or a phrase that can be used to
encrypt or decrypt a message
- traditional type of cryptosystem used on a computer network is called a symmetric secret key system
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 18
ICT NOTES ICT AND SOCIETY SPM 2009
3. Antivirus
- protects a computer against viruses by identifying and removing any computer viruses found in the
computer memory, on storage media or incoming e-mail files
- scans for programs that attempt to modify the boot program, the operating system and other
programs that normally are read from but not modified
- program identifies an infected file, it attempts to remove its virus, worm or Trojan horse
- program cannot remove the infection, it often quarantines the infected file
- quarantine is a separate area of a hard disk that holds the infected file until the infection can be
removed to ensure other files will not become infected
- patents for inventions Utility, design or plant patents that protect inventions and improvements to
existing inventions
4. Anti-spyware
Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information
about the user. The spyware program communicates information to the outside source.
An anti-spyware application program sometime called tracking software or a spybot is used to remove
spyware.
Examples of Anti-spywares programs are:
i) Spybot Search and Destro
ii) Ad-aware
iii) Spyware blaster
5. Firewall
- piece of hardware or software which functions in a networked environment to prevent some
communications forbidden by the security policy
- implement a security policy
- might permit limited access from in or outside the network perimeters or from certain user or for
certain activities
Data Backup
• program of file duplication
• backups of data application are necessary so that they can be recovered in case of an emergency
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 19
ICT NOTES ICT AND SOCIETY SPM 2009
Cryptography
• process of hiding information by altering the actual information into different representation, for
example, an APA can be written as I?X
Antivirus
• antivirus program protects a computer against viruses by identifying and removing any computer
viruses found in the computer memory, on storage media or incoming e-mail files
Anti-Spyware
spyware
o program placed on a computer without the user’s knowledge
o secretly collects information about the user
anti-spyware application program sometime called tracking software or a spybot is used to remove
spyware
Firewall
• firewall is a piece of hardware or software which functions in a networked environment to prevent
some communications forbidden by the security policy
Human Aspects
• human aspect refers to the user and also the intruder of a computer syste
compiled by: LIM PEK CHOO SMK TUN ABANG HAJI OPENG 20