0% found this document useful (0 votes)
29 views15 pages

Understanding ICT's Impact

it reviewer

Uploaded by

avie.llarico
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views15 pages

Understanding ICT's Impact

it reviewer

Uploaded by

avie.llarico
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

LIVING IN THE IT ERA • Nowadays people are in touch with the

help of ICT. Through chatting, E-mail,


LESSON 1: INTRODUCTION TO voice mail and social networking people
LIVING IN THE IT ERA communicate with each other. It is the
cheapest means of communication.
➢ The quickening pace of evolution in technology • ICT allows students to monitor and
is very evident in this era. manage their own learning, think
critically and creatively, solve simulated
➢ It seems that it is progressing faster than ever. real-world problems, work
➢ From year to year, the evolution of technology is collaboratively, engage in ethical
decision-making, and adopt a global
one of staggering promise and opportunity--as
perspective towards issues and ideas.
well as uncertainty. Basically, technology has
been around before, and as long as there are ➢ Job Opportunities
people, information technology will be there also
because there were always ways of • In the employment sector, ICT enables
communicating through technology available at organizations to operate more efficiently,
that point in time. so employing staff with ICT skills is vital
to the smooth running of any business.
➢ The future may be unknown, but digital
Being able to use ICT systems effectively
advancement continues to reshape our world in allows employees more time to concentrate
ways that encourage people to form new habits, on areas of their job role that require soft
find new ways to work together, and become skills.
better human beings.
• For example, many pharmacies use robot
➢ And, in most cases, these changes translate into a
technology to assist with picking
range of opportunities and disruptions across
prescribed drugs. This allows highly
every industry.
trained pharmaceutical staff to focus on
➢ Humans have always been quick to adapt jobs requiring human intelligence and
technologies for better and faster interaction, such as dispensing and
communication. checking medication
HISTORY OF ICT ➢ Education
O ICT, or information and communications • Information and Communications
technology (or technologies), is the Technology (ICT) can impact student
infrastructure and components that enable learning when teachers are digitally literate
modern computing. and understand how to integrate it into
O Although there is no single, universal definition curriculum.
of ICT, the term is generally accepted to mean all
• When teachers are digitally literate and
devices, networking components, applications
trained to use ICT, these approaches can
and systems that combined allow people and
lead to higher order thinking skills, provide
organizations (i.e., businesses, nonprofit
creative and individualized options for
agencies, governments and criminal enterprises)
students to express their understandings,
to interact in the digital world
and leave students better prepared to deal
USES OF ICT IN OUR DAILY LIVES with ongoing technological change in
society and the workplace.
➢ Communication.
• Schools use a diverse set of ICT tools to IMPACT OF ICT IN THE SOCIETY
communicate, create, disseminate, store,
POSITIVE IMPACT
and manage information.
1. Access to information: Increase in access to
• In some contexts, ICT has also become information and services that has accompanied
integral to the teaching- learning the growth of the Internet. Some of the positive
interaction, through such approaches as aspects of this increased access are better, and
replacing chalkboards with interactive often cheaper, communications, such as VoIP
digital whiteboards, using students’ own phone and Instant Messaging.
smartphones or other devices for learning
during class time, and the “flipped 2. Improved access to education, e.g. distance
classroom” model where students watch learning and online tutorials. New ways of
lectures at home on the computer and use learning, e.g. interactive multi-media and virtual
classroom time for more interactive reality.
exercises
3. New tools, new opportunities: ICT gives access
➢ Socializing to new tools that did not previously exist: digital
cameras, photo-editing software and high-quality
• Social media has changed the world. The printers, screen magnification or screen reading
rapid and vast adoption of these software enables partially sighted or blind people
technologies is changing how we find to work with ordinary text rather than Braille.
partners, how we access information from
the news, and how we organize to demand 4. Communication: Cost savings by using e.g.
political change. VoIP instead of normal telephone, email/
messaging instead of post, video conferencing
• The internet and social media provide instead of traveling to meetings, e-commerce
young people with a range of benefits, and web sites instead of sales catalogues. Access to
opportunities to empower themselves in a larger, even worldwide, markets.
variety of ways. Young people can
maintain social connections and support 5. Information management: Data mining of
networks that otherwise wouldn't be customer information to produce lists for targeted
possible and can access more information advertising. Improved stock control, resulting in
than ever before. The communities and less wastage, better cash flow, etc.
social interactions young people form
online can be invaluable for bolstering and 6. Security: ICT solves or reduces some security
developing young people's self-confidence problems, e.g. Encryption methods can keep data
and social skills. safe from unauthorized people, both while it is
being stored or while it is being sent
• As the ICT has become ubiquitous, faster electronically.
and increasingly accessible to non-
technical communities, social networking NEGATIVE IMPACT
and collaborative services have grown 1. Job loss: Manual operations being replaced
rapidly enabling people to communicate by automation. e.g. robots replacing people
and share interest in many more ways, sites on an assembly line. Job export. e.g. Data
like Facebook, Twitter LinkedIn You tube, processing work being sent to other countries
Flicker, second life delicious blogs wiki’s where operating costs are lower. Multiple
and many more let people of all ages workers being replaced by a smaller number
rapidly share their interest of the movement who are able to do the same amount of work.
without others everywhere.
2. Reduced personal interaction: Most people
need some form of social interaction in their
daily lives and if they do not get the chance • No IQ (Intelligence Quotient)
to meet and talk with other people, they may
feel isolated and unhappy. • No Feelings
• Storage
3. Reduced physical activity: This can lead to
health problems such as obesity, heart EVOLUTION OF COMPUTERS
disease, and diabetes.
➢ Six Generations
4. Cost: A lot of ICT hardware and software is
– Pre-Modern Era
expensive, both to purchase and to maintain.
An ICT system usually requires specialist – First Generation Computers
staff to run it and there is also the challenge
of keeping up with ever-changing – Second Generation Computers
technology.
– Third Generation Computers
5. Competition: this is usually thought of as – Fourth Generation Computers
being a good thing, but for some
organizations being exposed to greater – Fifth Generation Computers
competition can be a problem. If the Evolution of Computers –
organization is competing for customers,
A. Pre-Modern Era
donations, or other means of funding
nationally or even internationally, they may ➢ Three Classifications of Devices
lose out to other organizations that can offer
the same service for less money. – Manual Mechanical Devices
– Electro-Mechanical Devices
LESSON 2: HISTORY OF COMPUTERS
– Electronic Devices
DEFINITION OF COMPUTER
Pre-Modern Era – Manual Mechanical Devices
➢ Computer refers to an electronic device that
➢ are devices that are operated manually by the
accepts data and instructions, performs
user
logical and mathematical operations and
generates the outputs of the processing. The EXAMPLES OF MANUAL MECHANICAL
outputs or results are the information that we DEVICES
need.
Abacus (counting frame)
CHARACTERISTICS AND CAPABILITIES OF
– first man-made computing devices
COMPUTER
– used in centuries
➢ According to Dinesh Thakur from – uses beads
[Link] (2015), the basic – invented in China
characteristics of computers are:
• Speed Napier’s Bone
– manually-operated device used in calculating
• Accuracy
products and quotients
• Diligence – invented by John Napier

• Versatility
Oughtred’s Slide Rule
• Power of Remembering
– mechanical analog computer consists of
movable bars with a precise scale which uses PRE-MODERN ERA – ELECTRO DEVICES
approximations for solving problems like
multiplication, division, roots, logarithms ➢ principal components are circuit boards,
and trigonometry transistor or silicon chips
– invented by William Oughtred ➢ uses electrical switches and circuitry
Pascaline Calculator (Adding Machine) EXAMPLES OF ELECTRO DEVICES
– first mechanical calculating device that uses ABC (Atanasoff-Berry-Computer)
cogged wheels that can be used to add and
subtract two numbers – first special purpose digital computer that
– invented by Blaise Pascal solves simultaneous equations
– developed by John Atanasoff
Leibnitz Calculator (stepped drum) Electronic Numerical Integrator and Calculator
(ENIAC)
– considered the improved Pascaline which
could multiply and divide – first fully electronic general-purpose digital
– invented by Gottfried Leibnitz computer
Babbage’s Difference and Analytical Engines – completed by John Mauchly and J. Presper
Eckert
– embodied most of the design of modern Electronic Discrete Variable Automatic
computers Computer (EDVAC)
– Difference Engine can compute tables
– Analytical Engine completely automatic and – completely internally programmed machine
is capable of calculating any mathematical enhancement of ENIAC
problems – Mauchly and Eckert started working on it two
– invented by Charles Babbage years before ENIAC even went to operation
Electronic Delay Storage Automatic Calculator
PRE-MODERN ERA – ELECTRO- (EDSAC)
MECHANICAL DEVICES
– also known as Electronic Binary computer
➢ mechanical devices powered by electronic motor that uses binary representation of data and
and use switches and relays internally stored program
– first full-size stored-program computer was
EXAMPLES OF ELECTRO-MECHANICAL built according to the von Neumann machine
DEVICES built at the University of Cambridge, England
by Maurice Wilkes
Hollerith Card
– first use of punched cards to store data EVOLUTION OF COMPUTERS
– developed by Herman Hollerith B. FIRST GENERATION COMPUTERS (1951-
1958)

Automatic Weaving Loom ➢ size of computers are mainframes

– uses the concept punched card to control a ➢ major hardware features are vacuum tubes
sequence of operation and magnetic drums
– invented by Joseph Marie Jacquard
Automatic Sequence Controlled Calculator ➢ processing speed is 1,000 instructions per
(MARK1) second

– first general-purpose electro-mechanical Examples


computer Universal Automatic Computer (UNIVAC)
– invented by Howard H. Aiken
1st commercial business computer developed by John IBM System 370, System 3090, IBM PC-XT based
Eckert and John Mauchly computers, IBM PC-AT based computers, Intel 4004,
8008, 8080, Pentium series, Dual core, Quad core,
IBM 701 – 1st generation IBM computers (IBM 650
and i serie
most popular)
F. FIFTH GENERATION COMPUTERS
C. SECOND GENERATION COMPUTERS
(FUTURE)
(1959-1963)
➢ next generation of computers
➢ size of computer is mainframe
CLASSIFICATION OF COMPUTERS
➢ major hardware features are transistors and
magnetic core ➢ According to Purpose
➢ processing speed is 1,000,000 instructions • General-purpose computers have the
per second ability to store different programs of
instruction and thus, perform a variety of
Examples
operations. Examples:
TRADIC personal computer, laptop, tablet
1st transistorized computer • Special-purpose computers are
designed to perform one specific task.
UNIVAC II, IBM 7070, 7090 and 1400 series
The program of instructions is built into,
D. THIRD GENERATION COMPUTERS or permanently stored in the machine.
(1964-1970) Examples: highway tolls, air traffic
control, satellite tracking, airline
➢ minicomputers became available
reservations, and automated teller
➢ major hardware features are integrated circuit machines.
or “chips”
➢ According to Data Handled
➢ processing speed is 10,000,000 instructions
• Analog Computers
per second
- “analogous” meaning similar
Examples: - used for scientific, engineering, and
process control purposes
IBM System 360
Examples: analog speedometer in an
1st general-purpose machine used in science and automobile
Business
• Digital Computers
E. FOURTH GENERATION COMPUTERS - refer to machines that specialize in
(1971-PRESENT) counting - it operates by counting
values that are discrete, or separate and
➢ size of computers varies from mainframes, distinct
minicomputers, and microcomputers
• Hybrid Computers
➢ major hardware features are microprocessors
- combines the measuring capabilities of
or large-scale integrated circuit
the analog computer and the logical and
➢ minimum processing speed is 100,000,000 control capabilities of the digital
instructions per second computer - offers an efficient
and economical method of working out
Examples: special types of problems in science and
various areas of engineering
- contain special equipment to convert contains hypertext links, or highlighted
analog voltages into digital voltages, and keywords and images that lead to related
vise-versa information.
➢ According to Capacity ➢ A collection of linked Web pages that has a
common theme or focus is called a Web site.
➢ Capacity refers to amount of data that can be
stored in memory, the speed of internal ➢ The main page that all of the pages on a
operation of the computer, capacity of storage particular Web site are organized around and
devices, and number and types of peripheral link back to is called the site’s home page.
devices
➢ Timothy John Berners-Lee OM KBE FRS
1. Microcomputers FREng FRSA FBCS, also known as TimBL,
is an English engineer and computer scientist
2. Minicomputers
best known as the inventor of the World Wide
3. Mainframes Web.

4. Supercomputer ➢ He is a Professorial Fellow of Computer


Science at the University of Oxford and a
Components of Computer System professor at the Massachusetts Institute of
➢ Hardware refers to the internal and external Technology.
physical compositions of computer Web 1.0 (Read Only Static Web)
➢ Software refers to a set of instructions that is ➢ It is an old internet that only allows people to
to be executed by the computer called read from the internet. First stage worldwide
program linking web pages and hyperlink. Web is used
➢ Peopleware refers to the personnel involved as “information portal”. It uses table to
within the computer installation or could be positions and align elements on page.
anybody who wants their job to be done using ➢ Most read only web. If focused on
computer company’s home pages.
➢ Dataware refers to the steps specifying the ➢ Dividing the world wide web into
manner certain activities are to be usable directories
accomplished
➢ It means web is use as “Information
LESSON 3: INTERNET CONCEPTS Portal”
➢ Internet is defined as an information ➢ It started with the simple idea “put
superhighway, to access information over content together”
the web.
➢ Example of Web 1.0
➢ However, it can be defined in many ways,
internet is a world-wide global system of ➢ [Link]
interconnected computer networks
➢ Home Page
The Web
➢ Directories
➢ The Web (World Wide Web) consists of
➢ Page Views
information organized into Web pages
containing text and graphic images. ➢ HTML/Portals.
➢ The world wide web is larger collection of ➢ Disadvantages
interconnected documents or content. It
➢ Read only web ➢ Wordpress Blogger
Tumbler
➢ Limited user interaction
➢ Wikis - is a hypertext publication
➢ Lack of standards
collaboratively edited and managed by its
Web 2.0 (Read-write interactive web) own audience directly using a web browser.
B. A term used to describe a new generation of A typical wiki contains multiple pages for the
Web services and applications with an increasing subjects or scope of the project and may be
emphasis on human collaboration. either open to the public or limited to use
within an organization for maintaining its
➢ It is a platform that gives users the possibility internal knowledge base.
(liberty) to control their data.
➢ Example:
➢ This is about user-generated content and the
read-write web. ➢ Wikipedia Wikibooks Wikiversity Commons
Wiktionary Wikiquote
➢ People are consuming as well as contributing
information through blogs or sites. ➢ Wikivoyage Wikidata Wikinews Wikispecies
MediaWiki
➢ Allows the user to interact with the page
known as DYNAMIC PAGE; instead of just ➢ Video Sharing Sites - a website that lets
reading a page, the user may be able to people upload and share their video clips with
comment or create a user account. Dynamic the public at large or to invited guests.
page refers to the web pages that are affected
Example:
by user input or preference.
➢ Youtube Facebook LinkedIn Flickr
➢ Is focused on the ability for people to
Photobucket LinkedIn Flickr
collaborate and share information online via
social media, blogging and Web-based ➢ Photobucket Twitter Veoh Dailymotion
communities. VimeoPRO
Example of Web 2.0 are the following: ➢ [Link] Metacafe
Social Networking - is the use of Internet-based ➢ Key Features of Web 2.0:
social media sites to stay connected with friends,
➢ Folksonomy – allows users to
family, colleagues, customers, or clients.
categorize and classify/arrange
Social networking can have a social purpose, a
information using freely chosen
business purpose, or both, through sites such as:
keywords (e.g. tagging).
Example
➢ Rich User Interface – content is
➢ Facebook Twitter LinkedIn Google+ dynamic and is responsive to user’s
input. An example would be a website
➢ Pinterest Tumblr Instagram Page
that shows local content.
Blogs - is a discussion or informational
➢ User Participation – the owner of
website published on the world wide web
website is not the only one who is able
consisting of discrete, often informal diary-style
to put content. Others are able to place
text entries (posts). Posts are typically displayed
a content on their own by means of
in reverse chronological order, so that the most
comments, reviews, and evaluation.
recent post appears first, at the top of the web
page. ➢ Long Tail – services are offered on
demand rather than on a one-time
➢ Example
purchase. This is synonymous to types of products and/or services the business
subscribing to a data plan that charges offers.
you for the amount of time you spent
➢ Entertainment Website If you think about
on Internet or a data plan that charges
your internet browsing habits, you can
you for the amount of bandwidth you
probably think of a few websites that you
used.
visit purely for entertainment purposes.
Web 3.0: (Read-write intelligent web)
➢ Portfolio Website are sites devoted to
➢ Suggested name by John Markoff of showing examples of past work. Service
the New York Times for the third providers who want to show potential clients
generation of the web. the quality of the work they provide can use
a portfolio website to collect some of the best
➢ In this generation, all the
samples of past work they’ve done. This type
application on web or mobile will be
of website is simpler to build than a business
upgraded with more features. It
website and more focused on a particular
applies same principles as Web 2.0:
task: collecting work samples.
two-way interaction.
➢ Brochure Website are a simplified form of
➢ Web 3.0 will be more connected,
business websites. For businesses that know
open, and intelligent, with semantic
they need an online presence, but don’t want
web technologies, distributed
to invest a lot into it (maybe you’re confident
databases, natural language
you’ll continue to get most of your business
processing, machine learning,
from other sources), a simple brochure site
machine reasoning and autonomous
that includes just a few pages that lay out the
agents.
basics of what you do and provide contact
➢ Semantic Web - provides a information may be enough for you.
framework that allows data to be
➢ Nonprofit Website In the same way that
shared and reuse to deliver web
businesses need websites to be their online
content specifically targeting the user.
presence, nonprofits do as well. A nonprofit
➢ It is a web of data. website is the easiest way for many potential
donors to make donations and will be the first
➢ Changing the web into a language that place many people look to learn more about a
can be read and categorized by the nonprofit and determine if they want to
system rather than humans. support it.
Types of Websites: ➢ Educational Website The websites of
➢ eCommerce Website is a website people can educational institutions and those offering
directly buy products from you’ve probably online courses fall into the category of
used a number of eCommerce websites educational websites. These websites have
before, most big brands and plenty of smaller the primary goal of either providing
ones have one. Any website that includes a educational materials to visitors or providing
shopping cart and a way for you to provide information on an educational institution to
credit card information to make a purchase them.
falls into this category. ➢ Infopreneur Website websites overlap a bit
➢ Business Website is any website that’s with business and eCommerce websites, but
devoted to representing a specific business. It they represent a unique type of online
should be branded like the business (the same business. Infopreneurs create and sell
logo and positioning) and communicate the
information products. That could be in the now affect the network. In 1982 the word internet
form of courses, tutorials, videos or eBooks. started. 1986 – First “ free net” created in Case
Western Reserve University 1991: US government
➢ Personal Website Not all websites exist to
allowed business agencies to connect to internet.
make money in some way or another. Many
Now all people can connect to the internet and
people find value in creating personal
improve their life and work quality. The internet
websites to put their own thoughts out into
support various aspects in our life. Vinton Gray Cerf
the world. This category includes personal
ForMemRS is an American Internet pioneer and is
blogs, vlogs, and photo diaries people share
recognized as one of "the fathers of the Internet",
with the world.
sharing this title with TCP/IP co-developer Bob
➢ Web Portal are often websites designed for Kahn.
internal purposes at a business, organization,
Major Components of the Internet
or institution. They collect information in
different formats from different sources into Servers – is a computer program that provides
one place to make all relevant information service to another computer program and it’s user.
accessible to the people who need to see it.
Types of Servers
They often involve a login and personalized
views for different users that ensure the Application Server – a program in computer that
information that’s accessible is most useful to provides the business logic for an application
their particular needs. program.
➢ Wiki or Community Forum Website Most Web Server – a computer program that serves
people are familiar with wikis through the requested HTML pages or files.
most famous example of one out there:
Wikipedia. But wikis can be created on pretty Proxy Server – is a software that acts as an
much any subject you can imagine. A wiki is intermediary between an endpoint device, such as
any website where various users are able to computer and another server from which a user is
collaborate on content and all make their own requesting.
tweaks and changes as they see fit. There are Mail Server – is an application that receives
wikis for fan communities, for business incoming e-mail from local users and remote senders
resources, and for collecting valuable and forward outgoing e-mail for delivery
information sources.
File Server – is a computer responsible for central
THE internet storage and management of data files so that other
The Internet or “net” (network of network) is the computer on the same network can access them.
largest computer network in the world that connects Policy Server – is a security component of a policy –
billions of computer user. The word internet comes based network that provides authorization services
from combination between “interconnection” and and facilities tracking and control of files.
“network”. Network is a collection of computers and
devices connected via communication channels and IP Address (Internet Protocol) – is a numerical
transmission media allow to share resources label assigned to each device. This provides identity
(hardware, software, data, information). Generally, to a network device.
nobody owns the internet. Browser – is an application program that provides a
ARPA – Advanced Research Project Agency January way to look information on the web.
2, 1969 – started an experimental computer network. Example of browsers: Google chrome, safari,
Concept – No server, but equal internet explorer, opera,
importance/participation to every computer in the
network. Even if, one or two node destroyed that will Mozilla
– Domain Name System (DNS) – is • Social networking
the phonebook of internet. We access • Watch & post videos
information online through domain • Games
names. • Take college courses
• Monitor home while away
Name Entity • Financial transactions
• Download music and movies

.com commercial
Internet Terms and Definition
Internet - A global network of thousands of
.org organization
computer networks linked by data lines and wireless
systems.
.net network Web – a collection of billions of webpages that you
can view with a web browser
.edu education
Email – the most common method of sending and
receiving messages online
.gov National and State Government Agencies
Social media – websites and apps that allow people
to share comments, photos, and videos
.ph Philippines
Online gaming – games that allow people to play
with and against each other over the Internet
.au Australia Software updates – operating system
and application updates can typically
downloaded from the Internet
HTML - Hypertext Markup Language is a coding
Internet Service Provide (ISP) – is an organization
language used to tell a browser how to place pictures,
that provides services for accessing, using or
text, multimedia and links to create a web page.
participating in the internet.
When a user clicks on a link within a web page, that
Two types of ISP: link, which is coded with HTML, links the user to a
specific linked web page.
National ISP – provided internet access to a specific
geographic area. URL - Uniform Resource Locator is a web address
used to connect to a remote resource on the world
Regional ISP – business that provides internet access
wide web.
in cities and towns nationwide.
Bit - is a single digit in the binary numbering system
Example of ISP: Sky Broadband, PLDT, Converge
(base 2). For example: 1 is a bit or 0 is a bit.
Uses of Internet
Byte - generally consists of eight bits.
• Look for information Upload - To upload is to transfer data from your
• School works, jobs, and home purposes computer to another computer.
• Send and receive electronic mail
• Video teleconferencing (video call, video Download - To download is to transfer data from
chat) another computer to your computer.
• Buy and sell product
HTTP - is the acronym for Hypertext Transfer organizations. It may be intended to harm someone’s
Protocol, the data communication standard of web reputation, physical harm, or even mental harm.
pages. When a web page has this prefix, the links,
Cybercrime can cause direct harm or indirect harm to
text, and pictures should work correctly in a web
whoever the victim is. However, the largest threat of
browser.
cybercrime is on the financial security of an
HTTPS - is the acronym for Hypertext Transfer individual as well as the government. Cybercrime
Protocol Secure. This indicates that the web page has causes loss of billions of USD every year
a special layer of encryption added to hide your
Example of a cybercrime
personal information and passwords from others.
Cybercrime, also called computer crime, the use of a
Router or router-modem combination is the
computer as an instrument to further illegal ends,
hardware device that acts as the traffic cop for
such as committing fraud, trafficking in child
network signals arriving at your home or business
pornography and intellectual property, stealing
from your ISP. A router can be wired or wireless or
identities, or violating privacy.
both.
Cybercrime laws in the Philippines
Encryption - is the mathematical scrambling of data
so that it is hidden from eavesdroppers. Encryption Republic Act No. 10175, or the Cybercrime
uses complex math formulas to turn private data into Prevention Act of 2012, was signed into law by
meaningless gobbledygook that only trusted readers President Aquino on Sept. 12, 2012. Its original goal
can unscramble. was to penalize acts like cybersex, child
pornography, identity theft and unsolicited electronic
Web Bot - A term that applies to programs/applets
communication in the country.
(macros and intelligent agents) used on the Internet.
Such bots perform a repetitive function, such as Top 5 Popular Cybercrimes to Effortlessly Protect
posting messages to multiple newsgroups or doing Your Computer and Data Against its Impact
searches for information.
1. Phishing: using fake email messages to get
Search Engine - specialized software, such as personal information from internet users;
Google and Yahoo, that lets www browser users 2. Misusing personal information (identity
search for information on the web by using theft);
keywords, phrases. 3. Hacking: shutting down or misusing websites
or computer networks;
LESSON 4: Cyber Crimes , Netiquettes & Internet 4. Spreading hate and inciting terrorism;
ThreatS 5. Distributing child pornography
Cybercrime law includes laws related to computer
crimes, internet crimes, information crimes, Other Types of Cybercrime
communications crimes, and technology crimes.
Hacking
While the internet and the digital economy represent
a significant opportunity, they’re also an enabler for It is an illegal practice by which a hacker breaches
criminal activity. the computer’s security system of someone for
personal interest.
What is Cyber?
Unwarranted mass-surveillance
It is the Characteristics of the culture of computers,
information, technology and virtual reality. The Mass surveillance means surveillance of a substantial
crime that involves and uses computer devices and fraction of a group of people by the authority
Internet, is known as cybercrime. Cybercrime can be especially for the security purpose, but if someone
committed against an individual or a group; it can does it for personal interest, it is considered as
also be committed against government and private cybercrime.
Child pornography organization, etc. are highly confidential and even
small amount of negligence to these data may cause
It is one of the most heinous crimes that is brazenly
great damage to the whole nation. Therefore, such
practiced across the world. Children are sexually
data need security at a very high level.
abused and videos are being made and uploaded on
the Internet. How to Secure Data?
Child Grooming Let us now discuss how to secure data. In order to
make your security system strong, you need to pay
It is the practice of establishing an emotional
attention to the following:
connection with a child especially for the purpose of
child-trafficking and child prostitution. 1. Security Architecture
2. Network Diagram
Copyright infringement 3. Security Assessment Procedure
If someone infringes someone’s protected copyright 4. Security Policies
without permission and publishes that with his own 5. Risk Management Policy
6. Backup and Restore Procedures
name, is known as copyright infringement.
7. Disaster Recovery Plan
Money laundering 8. Risk Assessment Procedures

Illegal possession of money by an individual or an


organization is known as money laundering. It Once you have a complete blueprint of the points
typically involves transfers of money through foreign mentioned above, you can put better security system
banks and/or legitimate business. In other words, it is to your data and can also retrieve your data if
the practice of transforming illegitimately earned something goes wrong.
money into the legitimate financial system. Netiquette In any given social situation, be it in a
Cyber-extortion classroom or a party, a person without proper
etiquette is little appreciated. The offender may elicit
When a hacker hacks someone’s email server or a laugh or two, but it gets tiresome to be around a
computer system and demands money to reinstate the person who has no respect for rules. Eventually, the
system, it is known as cyber-extortion. wrong doer begins to be annoying and more so
Cyber-terrorism frustrating to be with. You don’t want to be one of
those people. Yet you just might be one when you are
Normally, when someone hacks government’s on the net.
security system or intimidates government or such a
big organization to advance his political or social
objectives by invading the security system through Netiquette refers to etiquette on the internet. Good
computer networks, it is known as cyber-terrorism. netiquette is based on respect for other net users. It is
avoiding online actions that will annoy or frustrate
Cyber Security other people. One indicator that you have bead
Cyber security is a potential activity by which etiquette is when you send or flood people with
information and other communication systems are unwelcome e-mail, or spam.
protected from and/or defended against the The basic rule is “to treat people the way you would
unauthorized use or modification or exploitation or want to be treated.” Be polite to anyone you meet.
even theft Being hidden behind a fancy username gives you no
All sorts of data whether it is government, corporate, right to insult or mock people. Always put yourself
or personal need high security; however, some of the “in the shoes of the other person” before you even
data, which belongs to the government defense begin writing up your comment, as it may be
system, banks, defense research and development inappropriate and hurtful to others. Use emoticons to
show your tone or emotion. You may not see whom
you are chatting with, but there is a person on the
other end of line. If you wouldn’t say it to them face A lot of people don’t bother to read an email
to face, chances are you shouldn’t say it online either. before they send it out, as can be seen from
the many spelling and grammar mistakes
In the area of typing, almost everybody knows that contained in emails. Apart from this, reading
writing in uppercase letters makes it look “YOU’RE your email through the eyes of the recipient
SHOUTING”. Refrain from typing more than two or will help you send a more effective message
three consecutive words, in uppercase letters. If you and avoid misunderstandings and
want to stress a point, use HTML options, “quotation inappropriate comments.
marks” or “asterisks* on your text. The following are
additional lists of netiquette in using the email. 6. Do not copy a message or attachment without
permission

1. Be concise and direct to the point Do not copy a message or attachment


belonging to another user without permission
Do not make an e-mail longer than it needs to of the originator. If you do not ask permission
be. Remember that reading an e-mail is first, you might be infringing on copyright
harder than reading printed communications laws.
and a long e-mail can be very discouraging to
read. 7. Do not use email to discuss confidential
information
2. Use proper spelling, grammar and
punctuation Sending an email is like sending a postcard.
If you don’t want your email to be displayed
This is not only important because improper on a bulletin board, don’t send it. Moreover,
spelling, grammar and punctuation give a bad never make any libelous or racially
impression of you. It is also important for discriminating comments in emails, even if
conveying the message properly. E-mails they are meant to be a joke.
with no full stops, or commas are difficult to
read and can sometimes even change the 8. Don’t forward virus hoaxes and chain letters
meaning of the text.
If you receive an email message warning you
3. Do not attach unnecessary files of a new unstoppable virus that will
immediately delete everything from your
By sending large attachments you can annoy computer, this is most probably a hoax. Since
people. Wherever possible try to compress it is impossible to find out whether a chain
attachments and only send attachments when letter is real or not, the best place for it is
they are productive. recycle bin.

4. Use proper structure and layout 9. Don’t send or forward emails containing
libelous, defamatory, offensive, racist or
Since reading from a screen is more difficult obscene remarks
than reading from paper, the structure and lay
out is very important for e –mail messages. By sending or just forwarding one libelous,
Use short paragraphs and blank lines between or offensive remark in an email, you can face
each paragraph. When making points, court cases resulting in multi million pesos
number them or mark each point as separate penalties.
to keep the overview.
10. Use cc: field sparingly
5. Read the email before you send it
Try not to use the cc: filed unless the recipient masquerading as a trusted entity, dupes a victim into
in the cc: field knows why they are receiving opening an email, instant message, or text message.
a copy of the messages. The recipient is then tricked into clicking a malicious
link, which can lead to the installation of malware,
Internet Threats the freezing of the system as part of a ransom ware
attack or the revealing of sensitive information.
Email Spam Email spam, also known as junk email,
is unsolicited bulk messages sent through email. The Pharming
use of spam has been growing in popularity since the Pharming is a type of social engineering cyber-attack
early 1990s and is a problem faced by most email in which criminals redirect internet users trying to
users. Recipients of spam often have had their email reach a specific website to a different, fake site.
addresses obtained by spambots, which are These “spoofed” sites aim to capture a victim’s
automated programs that crawl the internet looking personally identifiable information (PII) and log-in
for email addresses. Spammers use spambots to credentials, such as passwords, social security
create email distribution lists. A spammer typically numbers, account numbers, and so on, or else they
sends an email to millions of email addresses, with attempt to install pharming malware on their
the expectation that only a small number will respond computer. Pharmers often target websites in the
or interact with the message. financial sector, including banks, online payment
platforms, or e-commerce sites, usually with identity
theft as their ultimate objective
Dangers on the Internet
Spyware
The term spam is derived from a famous Monty
Python sketch in which there are many repetitive Spyware is loosely defined as malicious software
iterations of the Hormel canned meat product. While designed to enter your computer device, gather data
the term spam was reportedly first used to refer to about you, and forward it to a third-party without
unwanted email as early as 1978, it gained more your consent. Spyware can also refer to legitimate
widespread currency in the early 1990s, as internet software that monitors your data for commercial
access became more common outside of academic purposes like advertising. However, malicious
and research circles. spyware is explicitly used to profit from stolen data.
Computer Worm

Email Spoofing A computer worm is a type of malware that spreads


copies of itself from computer to computer. A worm
Email spoofing is the fabrication of an email header can replicate itself without any human interaction,
in the hopes of duping the recipient into thinking the and it does not need to attach itself to a software
email originated from someone or somewhere other program in order to cause damage.
than the intended source. Because core email
protocols do not have a built-in method of Trojan Horse
authentication, it is commonplace for spam and The term “Trojan” derives from the ancient Greek
phishing emails to use said spoofing to trick the story about the deceptive Trojan horse which led to
recipient into trusting the origin of the message. the fall of the city of Troy. When it comes to your
computer, a Trojan virus operates similarly – it hides
within seemingly harmless programs or tries to trick
Phishing you into downloading it. The name was coined in a
Phishing is a type of social engineering attack often US Air Force report in 1974, which speculated on
used to steal user data, including login credentials hypothetical ways computers could be compromised.
and credit card numbers. It occurs when an attacker, Computer Virus
A computer virus is a malicious piece of computer
code designed to spread from device to device. A
subset of malware, these self-copying threats are
usually designed to damage a device or steal data.
Hacker
A computer hacker is a computer expert who uses
their technical knowledge to achieve a goal or
overcome an obstacle, within a computerized system
by non-standard means. Though the term hacker has
become associated in popular culture with a security
hacker – someone who utilizes their technical know-
how of bugs or exploits to break into computer
systems and access data which would otherwise be
unavailable to them – hacking can also be utilized by
legitimate figures in legal situations. For example,
law enforcement agencies sometimes use hacking
techniques in order to collect evidence on criminals
and other malicious actors.

You might also like