La1 powerpoint

36
Topic 1.1 - Introduction to Information and Communication Technology

description

 

Transcript of La1 powerpoint

Page 1: La1 powerpoint

Topic 1.1 - Introduction to Information and

Communication Technology

Page 2: La1 powerpoint

1.1.1.1 Define ICT

ICT IS THE TECHNOLOGY REQUIRED FOR INFORMATION PROCESSING, IN PARTICULAR, THE USE ELECTRONICS COMPUTERS, COMMUNICATION DEVICES AND APPLICATION SOFTWARE TO CONVERT, STORE, PROTECT, PROCESS, TRANSMIT AND RETRIEVE INFORMATION FROM ANYWHERE, ANYTIME.

ICT ADALAH TKNOLOGI BERKAITAN PEMPROSESAN MAKLUMAT , DALAM KATA LAINNYA ADALAH BERKENAAN PENGGUNAAN KOMPUTER, PERANTI KOMUNIKASI DAN APLIKASI PERISIAN UNTUK MENUKAR , MENGAWASI, MEMPEROSES, MENGHUBUNG DAN MENGHASILKAN MAKLUMAT BILA-BILA DAN DI MANA SAHAJA

Page 3: La1 powerpoint

1.1.1.2 Describe the brief evolution of computers

FIRST GENERATION COMPUTERS(1940-1956) VACUUM TUBES WAS INTRODUCES, IS AN ELECTRONIC

TUBE MADE OF GLASS USED AS COMPUTER COMPONENTS TO STORE AND PROCESS DATA.

ENIAC IS FIRST GENERATION COMPUTER THAT CONTAINS WEIGHTS OF 30 TONS, 18000 VACUUM TUBES, 30-50 FOOT SPACE AND 16000 WATTS OF POWER.

GENERASI PERTAMA (940-1956) TIUB VAKUM DIPRKENALKAN. MERUPAKAN ALAT

ELEKTRONIK DIPERBUAT DARIPADA KACA DAN DIGUNAKAN SEBAGAI KOMPONEN KOMPUTER UNTUK MENYIMPAN MEMPOSES DATA

GENERASI KOMPUTER PERTAMA (ENIAC) MEMPUNYAI BERAT 30 TAN, 18000 TIUB VAKUM, LUAS 30 KE 50 KAKI DAN MENGGUNAKAN KUASA 16000 WATTS.

Page 4: La1 powerpoint

SECOND GENERATION COMPUTERS(1956-1963) TRANSISTORS REPLACE VACUUM TUBES IN THIS

GENERATION. TRANSISTORS ARE SMALL DEVICES THAT TRANSFER ELECTRONIC SIGNAL ACROSS RESISTOR.

TRANSISTOR DO NOT PRODUCED LOTS OF HEATS AND USE LESS POWER ALSO FASTER, CHEAPER AND SMALLER THAN VACUUM TUBES.

GENERASI KEDUA KOMPUTER (1956-1963)◦ TRANSISTOR MENGGANTIKAN TIUB VAKUM DIMANA

IA PERANTI LEBIH KECIL YANG MENUKAR SIGNAL ELEKTRONIK MERENTASI PERINTANG

◦ TRANSISTOR TIDAK MENGHASILKAN HABA YANG BANYAK(TIDAK PANAS) DAN KURANG MENGGUNAKAN KUASA, MURAH DAN KECIL BERBANDING TIUB VAKUM.

Page 5: La1 powerpoint

THIRD GENERATION COMPUTERS(1964-1971) INTEGRATED CIRCUITS (IU) REPLACED

TRANSISTOR. AN IU IS A COMPLETE ELECTRONIC CIRCUIT ON A

SMALL CHIP MADE OF SILICONE. IU WAS RELIABLE, COMPACT AND CHEAPER THAN

TRANSISTORSGENERASI KETIGA KOMPUTER(1964-1971)

◦ SIRKIT INTEGRASI MENGGANTIKAN TRANSISTOR◦ IA MERUPAKAN SIRKIT ELEKTRONIK YANG

LENGKAP DIATAS CIP YANG KECIL DIPERBUAT DARIPAD SILIKON

◦ IA SANGAT SESUAI, KECIL DAN MURAH BERBANDING TRANSISTOR

Page 6: La1 powerpoint

FOURTH GENERATION COMPUTERS(1971-PRESENT) MICROPROCESSOR WAS INTRODUCED, FROM THOUSAND OF

INTEGRATED CIRCUITS CHANGE ONTO SINGLE SILICONE CHIP.

THE INTEL 4004 CHIP DEVELOPED IN 1971, LOCATED ALL THE COMPONENTS OF THE COMPUTER FROM THE CENTRAL PROCESSING UNITS AND MEMORY TO INPUT/OUTPUT CONTROLS ON A SINGLE CHIP.

COMPUTER IS 100 TIMES SMALLER THAN ENIAC COMPUTER IN FIRST GENERATION.

GENERASI KEEMPAT KOMPUTER (1971-AKAN DATANG)◦ MENGGUNAKAN MIKROPEMPROSESAN, DARIPADA BERIBU

SIRKIT INTEGRASI BERTUKAR KEPADA CIP SILIKON YANG TUNGGAL

◦ CIP INTEL 4004 DIBANGUNKAN PADA 1971, DIMANA TERLETAKNYA SEMUA KOMPONEN KOMPUTER DARIPADA UNIT PEMEPROSESAN PUST DAN MEMORI UNTUK PENGAWALAN INPUT OUTPUT DIATA CIP TUNGGAL.

Page 7: La1 powerpoint

FIFTH GENERATION COMPUTER(PRESENT –BEYOND)

FIFTH GENERATION COMPUTING DEVICES BASED ON ARTIFICIAL INTELLIGENCE ARE STILL IN DEVELOPMENT THOUGH THERE ARE SOME APPLICATIONS SUCH AS VOICE RECOGNITION THAT ARE BEING USED TODAY.

GENERASI KELIMA KOMPUTER (AKAN DATANG –MASA DEPAN)

◦ BERDASARKAN KEPDA KEPINTARAN BUATAN DIMANA TELAH DIBINA DAN DIPERTINGKATKAN PEMBANGUNANNYA SEPERTI FACE VERIFICATION (PENGENALAN MELALUI WAJAH) YANG MANA TELAH MULA DIGUNAKAN KINI.

Page 8: La1 powerpoint

1.1.2.1 LIST THE USAGE OF ICT IN EVERYDAY LIFE.

EDUCATION (PELAJARAN) BANKING (PERBANKAN) INDUSTRY (INDUSTRI) E-COMMERCE (E-PERDAGANGAN)

Page 9: La1 powerpoint

1.1.2.2 State the differences between computerized and non-computerized systems.

COMPUTERIZED ALL BANKING ACTIVITIES ARE DONE BY USING COMPUTER SYSTEM TRANSACTION CAN BE DONE ANYWHERE AND ANYTIME IT TAKES SHORTEN TIME FOR ANY BANKING PROCESS MORE PRODUCTIVE.MENGGUNAKAN KOMPUTER SEMUA AKTIVIT PERBANKAN MENGGUNAKAN SISTEM KOMPUTER TRANSAKSI BOLEH DILAKUKAN BILA-BILA DAN DI MANA SAHAJA MENGAMBIL MASA YANG SEDIKIT MELAKUKAN PROSES PERBANKAN LEBIH PRODUKTIF/CEKAPNON-COMPUTERIZED ALL BANKING ACTIVITIES WERE DONE MANUALLY TRANSACTION CAN ONLY BE MADE DURING WORKING HOURS. IT TAKES LONG TIME FOR ANY BANKING PROCESS LESS PRODUCTIVETIDAK MENGGUNAKAN KOMPUTER SEMUA AKTIVITI BANK DIJALANKAN SECARA MANUAL TRANSAKSI DIJALANKAN DALAM WAKTU KERJA SAHAJA MENGAMBIL PROSES LAMA MENJALANKAN KERJA KURANG PRODUKTIF/KURANG CEKAP

Page 10: La1 powerpoint

1.1.2..1 State the impact of ICT on society.POSITIVE IMPACTS FASTER COMMUNICATION SPEED LOWER COMMUNICATION COST CAN SHARE OPINIONS AND INFORMATION PAPERLESS ENVIRONMENT INFORMATION AND COMMUNICATION BORDERLESS THROUGH INTERNET.KESAN POSITIF KOMUNIKASI CEPAT KOS KOMUNIKASI RENDAH PERKONGSIAN MAKLUMAT PERSEKITARAN TIADA KERTAS DUNIA TANPA SEMPADAN (INTERNET)

NEGATIVE IMPACTS CAN BE NEGATIVE BECAUSE IT COURAGE PEOPLE TO ACCESS PORNOGRAPHY AND

VIOLENCE WEB SITES. CAN HARM USES FOR LONG HOURS USEDKESAN NEGATIF PENYALAHGUNAAN KOMPUTER (PORNOGRAFI DAN KEGANASAN) KESAN BURUK JIKA DIGUINAKAN TERLALU LAMA

Page 11: La1 powerpoint

Topic 1.2 - Computer Ethics and Legal Issues

Page 12: La1 powerpoint

1.2.1.1 DEFINE COMPUTER ETHICS, CODE OF ETHICS, INTELLECTUAL PROPERTY, PRIVACY, COMPUTER CRIME AND CYBER LAW.

1. COMPUTER ETHICS IS A SYSTEM OF MORAL STANDARDS OR VALUES USED AS A GUIDELINE FOR COMPUTER USERS ETHICAL.

ETIKA KOMPUTER ADALAH SISTEM BERKAITAN STANDARD MORAL ATAU NILAI YANG DIGUNAKAN EBAGAI PANDUAN BAGI PENGGUNA KOMPUTER

2. CODE OF ETHICS IS GUIDELINES IN ICT THAT HELP DETERMINE WHETHER A SPECIFIC COMPUTER ACTION IS ETHICAL OR UNETHICAL.

KOD ETIKA ADALAH PANDUAN BAGI MEMASTIKAN SAMADA PERLAKUAN MENGGUNAKAN KOMPUTER ITU BERETIKA ATAU TIDAK

3. INTELLECTUAL PROPERTY REFERS TO WORKS CREATED BY INVENTORS, AUTHORS AND ARTISTS.

HAK MILIK INTELETUAL MERUJUK KEPADA KERJA YANG DIBUAT OLEH PENCIPTA SEPERTI ARTIS , PEMBUAT PROGRAM DAN SEBAGAINYA.

4. PRIVACY REFERS TO THE RIGHT OF INDIVIDUALS AND COMPANIES TO DENY OR RESTRICT AND COLLECTION AND USED OF INFORMATION ABOUT THEM.

PRIVASI MRUJUK KEPADA HAK MILIK INDUK ATAU SYARIKAT5. COMPUTER CRIME IS ANY ILLEGAL ACTS INVOLVING COMPUTERS. JENAYAH KOMPURER PERLAKUAN TIDAK BAIK MEMBABITKAN KOMPUTER6. CYBER LAW REFERS TO ANY LAWS RELATING TO PROTECTING THE

INTERNET AND OTHER ONLINE COMMUNICATION TECHNOLOGIES UNDANG-UNDANG SIBER MERUJUK KEPADA UNDANG-UNDANG BAGI

MELINDUNGI KEPENTINGAN BDERKAITAN INTERNET DAN TEKNOLOGI KOMUNIKASI

Page 13: La1 powerpoint

1.2.1.2 Differentiate between ethics and law.Law Ethics

AS A RULE TO CONTROL COMPUTER USERS. PERATURAN MENGAWAL PENGGUNA PC

AS A GUIDELINE TO COMPUTER USERS PANDUAN UNTUK PEN GGNA KOMPUTER

TO PREVENT MISUSE OF COMPUTERS MENGELAKKAN PENYALAHGUNAAN PC

ETHICAL BEHAVIOR IS JUDGED BY MORAL STANDARDS. KELAKUAN DIHAKIMI OLEH STANDARD MORAL

COMPUTER USERS MUST FOLLOW THE REGULATIONS AND LAW. PENGGUNA PC MESTI MEMATUHINYA

COMPUTER USERS ARE FREE TO FOLLOW OR IGNORE THE CODE OF ETHICS. BEBAS UNTUK MENGIKUT ETIKA ATAU TIDAK

PUNISHMENTS ADA HUKUMAN NO PUNISHMENT FOR ANYONE WHO

VIOLATES ETHICS. TIADA HUKUMAN UNTUK MEREKA YANG MELANGGARNYA

DEPEND ON COUNTRY AND STATE WHERE THE CRIME IS COMMITTED BERGANTUNG KEPADA NEGARA YANG TERBABIT

UNIVERSAL, CAN BE APPLIED ANYWHERE,

ALL OVER THE WORLD SEMUA TEMPAT DI DUNIA

NOT OBEYING LAWS ARE CALLED CRIME TIDAK MEMATUHI AKAN DIGELAR PENJENAYAH

NOT FOLLOWING ETHICS ARE CALLED IMMORAL TIDAK MEMATUHINYA DIGELAR TIDAK BERMORAL

Page 14: La1 powerpoint

1.2.1.3 State the need for intellectual property laws AS BUSINESSES CONTINUE TO EXPAND GLOBALLY, BUSINESS OWNERS MUST

REALIZE THE IMPORTANCE OF GETTING PROFESSIONAL ADVICE ON HOW TO ESTABLISH AND SAFEGUARD THEIR INTELLECTUAL PROPERTY RIGHTS. THESE INCLUDE :

o TRADEMARKS FOR BRAND IDENTITYo COPYRIGHTS FOR MATERIALSo PATENTS FOR INVENTIONSo DESIGN FOR PRODUCT APPEARANCEPERNIAGAAN BERKEMBANG SECARA GLOBAL DIMANA PEMILIK MESTI SEDAR

KEPENTINGAN MENDAPATKAN KHIDMAT NASIHAT BAGAIMANA MENJAGA HAK MILIK MEREKA. INI MERANGKUMIo IDENTITI PRODUKo HAKCIPTAo PATENo REKABENTUK

Page 15: La1 powerpoint

1.2.2.1 List ways to protect privacy.PRIVACY CAN BE PROTECTED BY:(A) PRIVACY LAWTHE PRIVACY LAWS IN MALAYSIA EMPHASISES ON THE FOLLOWING: - SECURITY SERVICES TO REVIEW THE SECURITY POLICY - SECURITY MANAGEMENT TO PROTECT THE RESOURCES - SECURITY MECHANISM TO IMPLEMENT THE REQUIRED SECURITY SERVICES - SECURITY OBJECTS, THE IMPORTANT ENTITIES WITHIN THE SYSTEM ENVIRONMENT(A) UNDANG-UNDANG PRIVASIUNDANG-UNDANG PRIVASI DI MALAYSIA BERKAITAN DENGAN- SERVIS KESELAMATAN UNTUK MEMAPARKAN POLISI KESELAMATAN- PENGURUSAN KESELAMATAN UNTUK MENGAWAL SUMBER- MEKANISMA KESELAMATAN BAGI MENGIMPLEMENTSI KEPERLUAN PERKHIDMATAN KESELAMATAN- OBJEK KESELAMATAN, ENTITI PENTING BERKAITAN PERSEKITARAN KESELAMATAN

Page 16: La1 powerpoint

1.2.2.1 List ways to protect privacy.PRIVACY CAN BE PROTECTED BY:(B) UTILITIES SOFTWARE - INSTALL ANTI-SPAM PROGRAM, FIREWALL, ANTI-SPYWARE AND ANTIVIRUS - PURCHASE GOODS WITH CASH RATHER THAN CREDIT CARD - CLEAR YOUR HISTORY FILE WHEN YOU ARE FINISHED BROWSING - FILL IN ONLY NECESSARY INFORMATION ON WARRANTY AND REGISTRATION FORM.(B) PERISIAN UTILITI- MENGINSTALL PROGRAM ANTI SPAM, DINDING API, ANTI PERISIK DAN ANTIVIRUS- MEMBELI BARANGAN SECARA TUNAI- MENGHILANGKAN SEJARAH CARIAN INTERNET APABILA SELESAI MELAYARI INTERNET- HANYA MENGISI PERKARA YANG PERLU DALAM BORANG INTERNET

Page 17: La1 powerpoint

1.2.2.2 State authentication and verification methods/ technologies.

AUTHENTICATION IS A PROCESS WHERE USERS VERIFY THEIR IDENTITY. AUTHENTICATION DEALS WITH THE PROBLEM OF DETERMINING WHETHER A USER SHOULD BE ALLOWED ACCESS TO A PARTICULAR SYSTEM.

PEMBUKTIAN MERUPAKAN PROSES DI MANA PENGGUNA MENGESAHKAN BUKTI IDENTITI SAMADA PENGGUNA ITU DIBENARKAN ATAU TIDAK MENGAKSES SESUATU SISTEM

METHODS OF AUTHENTICATION THERE ARE TWO COMMONLY USED AUTHENTICATION METHODS, WHICH ARE

BIOMETRIC DEVICE AND CALLBACK SYSTEM.LANGKAH DALAM PEMBUKTIANADA 2 CARA YANG BIASA IAITU PERANTI BIOMETRIK DAN SISTEM PANGGIL SEMULAA. BIOMETRIC DEVICE/ PERANTI BIOMETRIK IS A DEVICE THAT TRANSLATES

PERSONAL CHARACTERISTICS INTO A DIGITAL CODE THAT IS COMPARED WITH A DIGITAL CODE STORED IN THE DATABASE.

ADALAH PERANTI YANG MENUKAR KARAKTOR PERIBADI KEPADA KOD DIGITAL YANG BOLEH MEMBANDINGKAN DENGAN KOD DIGITAL YANG DISIMPAN DALAM PANGKALAN DATA

B. CALLBACK SYSTEM/SISTEM PANGGIL SEMULA REFERS TO THE CHECKING SYSTEM THAT AUTHENTICATES THE USER

MERUJUK KEPADA SISTEM YANG MENYEMAK PEMBKTIAN OLEH PENGGUNA

Page 18: La1 powerpoint

1.2.2.2 State authentication and verification methods/ technologies.

METHODS OF VERIFICATIONTHERE ARE TWO METHODS COMMONLY USED IN VERIFICATION,

WHICH ARE USER IDENTIFICATION AND PROCESSED OBJECT.LANGKAH DALAM PENGESAHAN2 KAEDAH BIASA DALAM PENGESAHAN ADALAH

MENGENALPASTI IDENTITI DAN OBJEK PEMPROSESANA. USER IDENTIFICATION/PENGENALPASTI IDENTITI REFERS TO

THE PROCESS OF VALIDATING THE USER.MERUJUK KEPADA PROSES YANG DIJALANKAN PRNGGUNA BAGI

PENGESAHANB. PROCESSED OBJECT/ OBJEK PEMPROSESAN REFERS TO

SOMETHING THE USER HAS SUCH AS IDENTIFICATION CARD, SECURITY TOKEN AND CELL PHONE.

MERUJUK KEPADA PENGGUNA YANG MEMPUNYAI OBJEK SEPERTI KAD PENGENALAN, TOKEN KESELAMATAN DAN TELEFON.

Page 19: La1 powerpoint

1.2.3.1 a)List effects of controversial contents of pornography on societyPORNOGRAPHY CAN LEAD TO CRIMINAL ACTS SUCH AS EXPLOITATION OF WOMEN AND CHILDREN CAN LEAD TO SEXUAL ADDICTION OR PERVERSION CAN DEVELOP LOW MORAL VALUE TOWARDS OTHER MEN, WOMEN OR CHILDREN CAN ERODE GOOD RELIGIOUS, CULTURAL AND SOCIAL BELIEFS AND BEHAVIORPORNOGRAFI

◦ BOLEH MENGGALAKKAN PERLAKUAN JENAYAH SEPERTI EKSPLOITASI WANITA DAN KANAK-KANAK

◦ BOLEH MENJURUS KEPADA PERLAKUAN SEKS◦ BOLEH MEMBANGUNAKAN NILAI MORAL YANG RENDAH TERHADAP LELAKI DAN WANITA

NAHUPUN KANAK-KANAK

SLANDER CAN DEVELOP INTO A SOCIETY THAT DISREGARDS HONESTY AND TRUTH CAN DEVELOP BAD HABIT OF SPREADING UNTRUTHS AND RUMORS CAN LEAD TO UNNECESSARY ARGUMENT CAN CAUSE PEOPLE TO HAVE NEGATIVE ATTITUDES TOWARDS ANOTHER PERSONFITNAH BOLEH MEMBANGUNKAN MASYARAKAT YANG TIDAK JUJUR BOLEH MEMBANGUNKAN TABIAT BURUK SEPRTI MENYEBARKAN KHABAR ANGIN MEMBAWA KEPADA PERTELINGKAHAN YANG TIDAK PERLU BOLEH MENYEBABKAN PERLAKUAN NEGATIF ANTARA SAU SAMA LAIN ATAU MASYARAKAT

KESELURUHANNYA

Page 20: La1 powerpoint

1.2.3.2 Describe the process of filtering to control access to controversial contentsTHE METHOD OF CHOICE TO LIMIT ACCESS ON THE INTERNET IS TO FILTER EITHER BY A. KEYWORD BLOCKING. THE METHOD USES A LIST OF BANNED WORD OR OBJECTS

TERMS SUCH AS XXX, SEX, AND NUDE. AS THE PAGE IS DOWNLOADING, THE FILTER SEARCHES FOR ANY OF THESE WORDS. IF FOUND, IT WILL BLOCKED THE PAGE COMPLETELY. STOP DOWNLOADING THE PAGE, BLOCK THE BANNED WORDS AND EVEN SHUT DOWN THE BROWSER.

B. SITE BLOCKING. THE METHOD USE SOFTWARE TO LIST THE WEBSITES THAT WILL BE BLOCKED BY USING SOFTWARE. THE SOFTWARE PREVENTS USERS FROM BEING ACCESS THE WEB SITES ON LIST.

C. WEB RATING SYSTEM. WEB SITES ARE RATING IN TERMS OF NUDITY, SEX, VIOLENCE AND LANGUAGE. THE WEB SITES RATE CAN BE DONE BY SETTING THE BROWSER TO ONLY ACCEPT PAGE WITH CERTAIN LEVEL OF RATINGS.

LANGKAH PENAPISAN DALAM MELAYARI INTERNET ADALAHA. PENGHALANG KATAKUNCI KATAKUNCI YANG BERKAITAN DENGAN PERKARA-PERKARA BURUK DISIMPAN

DALAM PANGKALAN DATA.PENGGUNA YANG MENAIP ATAU MENEKAN PERKATAAN TERSEBUT AKAN DIHALANG DARI MENGAKSES LAMAN BERKAITAN PERKARA TERSEBUT

B. PENGHALANG TAPAK SATU PERISIAN BERFUNGSI UNTUK MENGENALPASTI LAMAN-LAMAN YANG TIDAK

PATUT ATAU BOLEH DILAYARI.C. SISTEM RATING WEB MERUPAKAN SISTEM YANG MENGENALPASTI LAMAN-LAMAN YANG TIDAK BAIK

YANG SELAU DILAYARI. SISTEM AKAN MENGHALANG PENGGUNA DARIPADA MELAYARI LAMAN-LAMAN WEB TERSEBUT.

Page 21: La1 powerpoint

1.2.4.1 Explain the need for cyber lawTHE NEED FOR CYBER LAW IS TO PROTECT THE INTERNET AND OTHER

ONLINECOMMUNICATION TECHNOLOGIES.THE NEEDS OF CYBER LAW ARE

INTEGRITY AND SECURITY INFORMATION LEGAL STATUS OF ONLINE TRANSACTIONS PRIVACY AND CONFIDENTIALLY OF INFORMATION INTELLECTUAL PROPERTY RIGHTS SECURITY OF GOVERNMENT DATA

KEPERLUAN UNDANG-UNDANG SIBER ADALAH UNTUK MENGAWAL INTERNET

DAN LAIN-LAIN TEKNOLOGI ATAS TALIAN. IA BERKAITAN MAKLUMAT KESELAMATAN DAN INTEGRITI TRANSAKSI ATAS TALIAN YANG SAH MAKLUMAT PRIVASI DAN SULIT HAK CIPTA TERPELIHARA KESELAMATAN DATA KERAJAAN

Page 22: La1 powerpoint

1.2.4.2 Explain briefly the computer crimes below: COMPUTER FRAUD IS DEFINED AS HAVING AN INTENTION TO

TAKE ADVANTAGE OVER OR CAUSING LOSS TO OTHER PEOPLE, MAINLY ON MONETARY BASIS THROUGH THE USE OF COMPUTERS.

THERE ARE MANY FORMS OF COMPUTER FRAUD WHICH INCLUDE E-MAIL HOAXES, PROGRAM FRAUD, INVESTMENT SCHEMES, SALES PROMOTIONS AND CLAIMS OF EXPERTISE ON CERTAIN FIELDS.

PENIPUAN KOMPUTER MERUJUK KEPADA MENGAMBIL PERHATIAN ATAU KESEMPATAN YANG BOLEH MENGAKIBATKAN KERUGIAN KEPADA ORANG LAIN MENERUSI PENGGUNAAN KOMPUTER. CONTOHNYA PENIPUAN EMAIL, SKIM PELABURAN, PROMOSI JUALAN DSBNYA.

COPYRIGHT INFRINGEMENT IS DEFINED AS A VIOLATION OF THE RIGHTS SECURED BY A COPYRIGHT. COPYRIGHT INFRINGEMENT INVOLVES ILLEGAL COPY OR REPRODUCTION OF COPYRIGHTS MATERIAL BY THE BLACK MARKET GROUP. THE OPEN COMMERCIAL SALE OF PIRATED ITEM IS ALSO ILLEGAL.

PELANGGARAN HAKCIPTA MERUJUK KEPADA PELANGGARAN KEPADA HAKCIPTA, MENYALIN SEMULA TANPA KEBENARAN DAN SEBAGAINYA.

Page 23: La1 powerpoint

1.2.4.2 Explain briefly the computer crimes below: COMPUTER THEFT IS DEFINED AS THE UNAUTHORIZED USE OF ANOTHER

PERSON’S PROPERTY WITH THE INTENTION TO DENY THE OWNER THE RIGHTFUL POSSESSION OF THAT PROPERTY OR ITS USE.EXAMPLES OF COMPUTER THEFT INCLUDE:

TRANSFER OF PAYMENTS TO THE WRONG ACCOUNTS GET ONLINE MATERIALS WITH NO COST TAP INTO DATA TRANSMISSION LINES ON DATABASE AT NO COST DIVERT GOODS TO THE WRONG DESTINATION

PENCURIAN KOMPUTER BERMAKSUD PENGGUNAAN TANPA KEBENARAN KEATAS HAK MILIK ORANG LAIN DENGAN NILAI MEROSAK, MENGUBAH, MENUKAR DAN SEBAGAINYA◦ PENGALIHAN WANG DARI AKAUN ORANG LAIN◦ MENDAPAT BARANAN ATAS TALIAN TANPA BAYAR◦ MENDAPAT MAKLUMAT TAMNPA BAYARAN\◦ MENGALIHKAN PENGHANTARAN BARANGAN KE TEMPAT LAIN

Page 24: La1 powerpoint

1.2.4.2 Explain briefly the computer crimes below: COMPUTER ATTACK MAY BE DEFINED AS ANY ACTIVITIES TAKEN TO

DISRUPT THE EQUIPMENT OF COMPUTER SYSTEMS, CHANGE PROCESSING CONTROL OR CORRUPT STORED DATA.

COMPUTER ATTACK CAN BE IN THE FORMS OF: PHYSICAL ATTACK THAT DISRUPT THE COMPUTER FACILITY OR ITS

TRANSMISSION LINES. AN ELECTRONIC ATTACK THAT USES THE POWER OF ELECTROMAGNETIC

ENERGY TO OVERLOAD COMPUTER CIRCUITRY. A COMPUTER NETWORK ATTACK THAT USES A MALICIOUS CODE TO

EXPLOIT A WEAKNESS IN SOFTWARE, OR IN THE COMPUTER SECURITY PRACTICES OF A COMPUTER USER

SERANGAN KOMPUTER DIDEFINISIKAN SEBAGAI AKTIVITI MENGGANGU PERALATAN KOMPUTER , MENGUBAH KAWALAN DAN MEROSAKKAN DATA YANG DISIMPAN. SERANGAN KOMPUTER BOLEH DALAM BENTUK◦ SRANGAN FIZIKAL YANG MEROSAKKAN PERALATAN DAN TALIAN PENGHANTARAN◦ SERANGAN ELEKTRONOK DI MANA BOLEH MENYEBABKAN KEROSAKAN ATAS

PERALATAN AKIBAT LEBIHAN KUASA. SERANGAN RANGKAIAN KOMPUTER DENGAN MENGGUNAKAN KOD

SERANGAN BAGI MENGEKSPLOIT KELEMAHAN PERISIAN DSBNYA

Page 25: La1 powerpoint

1.3.1 Definition

Page 26: La1 powerpoint

1.3.1.1 Define Computer security. COMPUTERS SECURITY MEANS

PROTECTING OUR COMPUTER SYSTEMS AND THE INFORMATION THEY CONTAINS AGAINST UNWANTED ACCESS, DAMAGE, DESTRUCTION OR MODIFICATION.

KESELAMATAN KOMPUTER BERMAKSUD MELINDUNGI SISTEM KOMPUTER DAN MAKLUMAT DI DALAMNYA DARIPADA AKSES YANG TIDAK DIBENARKAN, KEROSAKAN DAN PENGUBAHAN

Page 27: La1 powerpoint

1.3.2.1 Explain briefly the different threats to computer security:

MALICIOUS CODE IS ALSO KNOWN AS A ROUGE PROGRAM. IT IS A TREAT TO COMPUTING ASSETS BY CAUSING UNDESIRED EFFECTS IN THE PROGRAMMER’S PART. THE EFFECT CAUSE BY AGENT, WITH THE INTENTION TO CAUSE DAMAGE. THE AGENT FOR MALICIOUS CODE IS THE WRITER OF THE CODE, OR ANY PERSON WHO CAUSES ITS DISTRIBUTION. THERE ARE VARIOUS KINDS OF MALICIOUS CODE. THEY INCLUDE VIRUS, TROJAN HORSE, LOGIC DOOR, TRAPDOOR AND BACKDOOR, WORM AND MANY OTHERS.

KOD MALICIOUS JUGA DIKENALI SEBAGAI PROGRAM PEMECAH. IA MENGGANGU ASET KOMPUTER DENGAN MENYEBABKAN KEROSAKAN. AGEN KOD INI AKAN MENGUBAH KOD YANG TERDAPAT DALAM PROGRAM DAN MEROSAKKAN KOMPUTER DENGAN KESANNYA SEPERTI GANGGUAN KEPADA PERJALANAN PROGRAM. CONTOHNYA TROJAN HORSE, LOGIC DOOR, TRAPDOOR DAN BACKDOOR, WORM(CECACING) DAN BANYAK LAGI

Page 28: La1 powerpoint

1.3.2.1 Explain briefly the different threats to computer security: HACKING IS A SOURCE OF THREAT TO SECURITY IN COMPUTER. IT IS DEFINED

AS UNAUTHORIZED ACCESS TO THE COMPUTER SYSTEM BY A HACKER. HACKERS ARE PERSONS WHO LEARN ABOUT THE COMPUTER SYSTEM IN

DETAIL. THEY WRITE PROGRAM REFERRED TO AS HACKS. HACKERS MAY USE A MODEM OR CABLE TO HACK THE TARGETED COMPUTERS.

HACKING ADALAH SUMBER GANGGUAN KEPADA KESELAMATAN DALAM KOMPUTER. IA BOLEH DIISTILAHKAN SEBAGAI AKSES TANPA KEBENARAN KEPADA SISTEM KOMPUTER OLEH ORANG YANG DIKENALI SEBAGAI HACKER. HACKER ADALAH ORANG YANG ADA KEPANDAIAN TENTANG SISTEM KOMPUTER. MEREKA MENULIS PROGRAM KOMPUTER BERDASARKAN PENGGUNAAN MODEM DAN KABEL UNTUK MEROSAKKAN KOMPUTER.

ENVIRONMENTAL DISASTER. BE IT AT HOME, STORES, OFFICES AND ALSO AUTOMOBILES. EXAMPLES OF NATURAL AND ENVIRONMENTAL DISASTERS:

FLOOD FIRE EARTHQUAKES, STORMS AND TORNADOS EXCESSIVE HEAT INADEQUATE POWER SUPPLY BENCANA ALAM ADALAH JUGA SATU CARA YANG MEROSAKKAN KOMPUTER.

CONTOHNYA BANJIR, TANAH RUNTUH, GEMPA BUMI DAN SEBAGAINYA.

Page 29: La1 powerpoint

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats.

Data Backup : Cryptography Anti virus Anti spyware Firewall Human Aspects

Page 30: La1 powerpoint

1.3.3.2 Apply the correct security procedures.DATA BACKUP : SALINAN FAIL ATAU PROGRAM DALAM BENTUK CD ATAU DVD, DISKET ATAU CAKERA

KERASCRYPTOGRAPHY PROSES MENYEMBUNYIKAN MAKLUMAT DENGAN MENGUBAH MAKLUMAT DALAM

BENTUK YANG LAIN TETAPI DIFAHAMI OLEH EMPUNYANYA.ANTI VIRUS MENGGUNAKAN PERISIAN ANTI VIRUS. CONTOH KASPERSKY, AVD, PANDA DAN

SEBAGAINYAANTI SPYWARE PERISIAN YANG MELINDUNGI KOMPUTER DARIPADA PERISIKAN LUAR MELAUI ATAS

TALIAN DIMANA SPYWARE AKAN MENCURI MAKLUMAT PENTING PENGGUNA SEPERTI NO PIN BANK DAN SEBAGAINYA.

FIREWALL MELINDUNGI KOMPUTER BERDASARKAN POLISI KESELAMATAN. BOLEH BERBENTUK

PERKAKASAN ATAU PERISIAN. 3 JENISIAITU SCREENING ROUTERS- RINGKAS, HANYA MELIHAT ALAMAT DAN JENIS PROTOCOL. PROXY GATEWAY- RUMIT, MLIHAT KESELURUHAN TEKS GUARD-LEBIH RUMIT, JUGA MELIHAT KESELURUHAN TEKSHUMAN ASPECTS MERUJUK KEPADA PENGGUNA DAN JUGA PENGGANGU DALAM SISTEM KOMPUTER.

Page 31: La1 powerpoint
Page 32: La1 powerpoint

1.4.1 Impact of ICT on Society

Page 33: La1 powerpoint

1.4..1.1 Impact of ICT on Society

POSITIVE IMPACT FASTER COMMUNICATION SPEED. WITH THE INTERNET, NEWS OR MESSAGE ARE

SEND VIA E-MAIL TO ANYONE EFFICIENTLY. WITH THE CAPABILITY OF BROADBAND AND SPEED OF CONNECTION ON THE INTERNET, ANY INFORMATION CAN BE TRAVEL FASTER.

LOWER COMMUNICATION COST. WITH THE INTERNET, WE DO NOT HAVE TO PAY ANY BASIC SERVICES PROVIDED BY IN THE INTERNET. FURTHERMORE, THE COST OF THE CONNECTION TO THE INTERNET IS RELATIVELY CHEAP.

IPEOPLE CAN SHARE OPINION FROM INFORMATION THROUGH DISCUSSION GROUP AND FORUMS THROUGH INTERNET.

INFORMATION CAN BE STORED AND RETRIEVED THROUGH THE DIGITAL MEDIUM INSTEAD OF PAPER. (PAPERLESS ENVIRONMENT)

INFORMATION AND COMMUNICATION CAN BE BORDERLESS THROUGH INTERNET. BY USING INTERNET, PEOPLE ALL AROUND THE WORLD CAN BE CONNECTED THROUGH EACH OTHER.

IMPAK POSITIF KELAJUAN KOMUNIKASI YANG CEPAT – MELALUI INERNET, BERITA ATAU MESEJ

MENERUSI EMAIL AKAN LEBIH CEPAT DAN PANTAS. KOS KOMUNIKSI YANG RENDAH – DENGAN INTERNET, KITA TIDAK PERLU MEMBUAT

PEMBAYARAN ASAS PERKHIDMATAN. MANUSIA BOLEH BERKONGSI MAKLUMAT – MELALUI FORUM INTERNET PENYIMPAN MAKLUMAT BOLEH DIBUAT DAN TANPA KERTAS DUNIA TANPA SEMPADAN – DENGAN INTERNET , MANUSIA BOLEH BERHUBUNG

DENGAN SEMUA ORANG DI DUNIA DENGAN MUDAH

Page 34: La1 powerpoint

NEGATIVE IMPACT Borderless information at time can be negative

because it courage people to access pornography and violence website. It can cause low moral values. It also can created problems such as gambling, information theft and fraud.

Computers can harms users if they use for long hours frequently

KESAN NEGATIF MAKLUMAT TANPA SEMPADAN KADANGKALA ADALAH

NEGATIF – CONTOHNYA MENGGALAKKAN PORNOGRAFI DAN KEGANASAN

KOMPUTER MENGGANGGU KESIHATAN JIKA DIGUNAKAN TERLALU LAMA.

Page 35: La1 powerpoint

Choose ONE of the following topics: Copyright and Piracy from Moral and

Legal Standpoints. Lack of Security and its Effects on

Industry/Economy/ Government. Malaysian Cyber Law, Electronic

Government Law. Phishing Virus (Trojan Horse, Salami Attack) Hacking Security Measures (Biometrics,

Authentication

Page 36: La1 powerpoint

DIGITAL SIGNATURE ACT 1997 TELEMEDICINE ACT 1997 COMPUTER CRIME ACT 1997 COMMUNICATION AND MULTIMEDIA ACT

19989