You are on page 1of 18

Learning Area 1.

0 : Introduction to ICT
ICT IN SOCIETY
TOPICS AND
SCOPE

Introduction
To ICT

DEFINE ICT
ICT : "ICT, is an abbreviation for information and communication technology, refers to all
equipment, applications and services that involve communication. Computers, cellphones,
televisions, radios and satellite systems are all part of ICT.
ROLES OF ICT IN EVERYDAY LIFE:
Education : Academic Portal, Online Learning, CD-based learning, Emel, VLE frog
Banking : ATM Machine, Online Banking, Debit, Credit card, Pay by phone
Industry : Robotic, Research & manufacture, Machine based indusrty
Commerce : Online business, bar code scanner, business system

COMPUTERIZED

NON-COMPUTERIZED

Education

more interesting & interactive experiences

depends on teachers & textbook

Banking

all transactions are done by computers

banking was done manually

Industry

Computers and telecommunications industry


became very popular and profitable since
production can be increased through an all day
operation.

Production was slow because


everything was done depended on
human labour.

Commerce

E-commerce plays an important role in the


economic scene. It includes distribution, buying,
selling and servicing products that are done
electronically

Trading was made using the barter


system and it was then later developed
into currency.

ADVANTAGES

DISADVANTAGES

Faster Communication Speed


Email/ whatsup messenger/ etc
Paperless Environment
Online forum / online exercise & notes

Social Problems
* Individualistic
* Introvert
* No real time conversation

Lower Communication Cost


Forum/ chat

Health Problems
* Cancer/Miscarriage (radiation risk)
* Effect body Posture
* Eyestrain

Effective Sharing Information


Blog/ web/ portal/ groupmail/ mailing list
Borderless Communication
Video conferencing (skype,facebook, etc)
Reliable Mode of Communication
Information could be accessed and retrieved
from anywhere & anytime

GENERATION OF COMPUTER

Unmoral Activities through internet


* Gamble
* Cyber crime
* Unmoral Website
Misuse of ICT Technology
* Fake News
* Slandering/Gossiping
* Bullying others

IMPACT
OF ICT IN
SOCIETY

IMPACT OF ICT IN SOCIETY

Computer
Ethics and

1.1.1

DEFINE COMPUTER ETHICS :

Legal Issues

A Moral standards or value guidelines to refer to when using the computer and internet

1.1.2

CODE OF ETHICS :
Is a guidelines in ICT that help determine whether a specific computer action is ethical or unethical

1.1.3

LEGAL ISSUES
Intellectual
Intellectual Property
Property

Refers
to works
created
Refers to
works created
by
vendors, authors
&
by vendors,
authors &
artists
artists

Authentication
Privacy
Privacy
Verification

LEGAL ISSUES
Controversial
Controversial
Contents
Contents &
& Control
Control

Controversial
Controversial Content
Content ::
Slander/Porno
Slander/Porno
Controversial
Control :: Filtering
Controversial Control
Filtering

Cyber Crimes

1.1.4

Fraud/
Attacks/
Fraud/ Theft/
Theft/ Attacks/
Copyright
Copyright Infringement
Infringement

INTELLECTUAL PROPERTY :
Property refers to any product of human intellect that is unique and has value in the market place.
covers ideas, inventions, unique name, computer program codes and many more.
It cover ideas, inventions, literary creations, unique names, bussiness models, computer program
Codes and else..

Intellectual Property Protection


Perlindungan Hak
cipta

Patents for
Invention
Utility, design or
plant patents that
protect inventions
and improvements
to existing
inventions.

Trademarks
for Brand
utilities

Design for
product
apperance

Word, names,
symbols, devices
and images that
represent product,
goods or services

Literary and artistic


material, music,
films, sound
recordings and
broadcast,
including software
and multimedia.

Copyright
for
materials
The features of, in
particular, the line,
contours, colors,
shape, texture or
material of the
product itself or its
ornamentation

1.1.5

DEFINE PRIVACY:

In IT refers to data and information privacy.


In general, data include texts, numbers, sounds, images and video. Information privacy is described
as the rights of individuals and companies to deny or restrict the collection and use of information about them.
How does computer technology threaten our Privacy

Cookies

Electroni
c Profile

Spyware

PRIVACY : Authorised Access


- user authentication and verification

CONTROVERSIAL CONTENTS AND CONTROL:

COMPUTER CRIME

COMPUTER SECURITY

COM PUTER THREAT/


ANCAM AN KOM PUTER
ANCAMAN KOMPUTER

1. Malicious
Code
2. Hacking
3. Natural
Disaster
4. Attack

Ancaman komputer/
Security Threat
1

Kod Hasad/
Malicious
Code

apa-apa kod dalam mana-mana


bahagian sistem perisian atau skrip
yang bertujuan untuk menyebabkan
kesan yang tidak diingini, pelanggaran
peraturan keselamatan atau kerosakan
kepada sistem.
Program komputer yang direka untuk
menyalin dirinya ke dalam program lain
yang disimpan di dalam komputer. Biasa
memasuki fail-fail berformat .doc , .xls
dan .exe. Berupaya menyebabkan
kerosakan besar kepada pc.
Tersebarhanyadengan bantuan manusia.

VIRUS

TROJAN
HORSE

Program komputer yang melaksanakan


tugas yang berguna tetapi secara sembunyi
membawa bersamanya virus atau worm.
Contohnya memuat turun perisian atau
permainan secara percuma daripada
internet. Pada peringkat awal kelihatan baik
tetapi sedikit demi sedikit menyebarkan
virus atau worm Ke dalam PC.

BOMB
LOGIC

Merupakan virus atau worm yang direka


untuk bertindak dalam jangka masa atau
keadaan tertentu. Apabila bom logik telah
memasuki pc , ia akan menunggu masa
yang telah ditetapkan oleh perekanya untuk
mula menjangkiti dan mula merosakkan pc.

TRAPDO
OR AND
BACKDO
OR

Program komputer yang akan membuka


back door dan akan membenarkan individu
luar mempunyai akses secara Tidak sah ke
atas individu yang lain menerusi internet.
Fungsi Back door ini merangkumi
menghantar dan menerima fail, Memadam
fail dan data serta melaksanakan program.

WORM
(CECACI
NG)

Program komputeryang menyalin dirinya


sendiri dan tersebar hanya menerusi
rangkaian. Ia merupakankan satu program
yang bertindak secara sendiri
(stand alone)

Ancaman komputer/
Security Threat
2

Penggodam/
Hacking

MENGGODAM boleh diistilahkan sebagai akses


tanpa kebenaran kepada system komputer

olehorang yang dikenali sebagai penggodam


(hacker)
PENGGODAM adalah individu yang mempunyai
akses ke atas komputer atau rangkaian secara
tidak sah. Penggodam adalah seseorang yang
mempunyai kemahiran tinggi dalam komputer dan
rangkaian.
3

Bencana
Alam/
Natural
disaster

Kecurian
Komputer

Bencana Alam yang berlaku secara


semulajadi turut sebenarnya memberi
ancaman kepada keselamatan
komputer. Antara bencana alam yang
memberi kesan besar ke atas komputer
termasuklah :
banjir,
gempabumi,
letusan gunung berapi
rebut taufan
dan kebakaran

6 LANGKAH MENJAGA KESELAMATAN KOMPUTER

Security Measures/
Security Threat
1. Data
backup /
Salinan data

Kriptografi/
Cryptograph
y

Antivirus

Anti Spyware

Firewall

TYPES OF FIREWALL

Human
aspect/
Aspek
Manusia

You might also like