la1-ict and society

61
Topic 1.1 - Introduction to Information and Communication Technology Topic 1.1 – Pengenalan kepada Teknologi maklumat dan komunikasi LEARNING AREA 1 – ICT & SOCIETY 1

Upload: zuhaila-binti-yusof

Post on 05-Jan-2016

31 views

Category:

Documents


5 download

DESCRIPTION

nota ICT Tingkatan 4 - LA1

TRANSCRIPT

Page 1: La1-Ict and Society

Topic 1.1 - Introduction to Information and Communication Technology

Topic 1.1 – Pengenalan kepada Teknologi maklumat dan komunikasi

LEARNING AREA 1 – ICT & SOCIETY

1

Page 2: La1-Ict and Society

1.1.1.1 Define ICT

ICT is the technology required for information processing, in particular, the use electronics computers, communication devices and application software to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

ICT ADALAH TEKNOLOGI BERKAITAN PEMPROSESAN MAKLUMAT , DALAM KATA LAINNYA ADALAH BERKENAAN PENGGUNAAN KOMPUTER, PERANTI KOMUNIKASI DAN APLIKASI PERISIAN UNTUK MENUKAR , MENYIMPAN, MELINDUNGI, MEMPROSES, MENGHANTAR DAN MEMPEROLEH MAKLUMAT BILA-BILA DAN DI MANA SAHAJA

2

Page 3: La1-Ict and Society

knowledge obtained from reading, investigation,

INFORMATION COMMUNICATION TECHNOLOGY

knowledge obtained from reading, investigation, study or research to make decisions and to predict the future knowledge and helps us to fulfill our daily tasks

an act of transmitting messages a process whereby information is exchanged between individuals using symbols, signs or verbal interactions, internet, e-mail or video conferencing

the use of scientific knowledge, experience and resources to create processes and product that fulfill human needs

MAKLUMAT KOMUNIKASI TEKNOLOGI

pengetahuan yang boleh didapati dari pembacaan,kajian,pembelajaran yang membantu manusia memenuhi keperluan harian

proses bertukar-tukar maklumat dengan menggunakan peranti dan perkhidmatan komunikasi seperti internet,e-mail,tele-sidang dan telefon

penggunaan peralatan atau peranti komunikasi yang membolehkan komunikasi berlaku

3

Page 4: La1-Ict and Society

Timeline for the development of technology

3500BCSumerians created cuneiform writing

1925television

1500BCPhoenicians developed the alphabet

1941 computer

105 BC Tsai Lun of China invented paper

1958photocopier machine

1454 printing machine 1963communication satellite

1793telegraph line 1969 first Internet (ARPANET)

1876telephone

4

Page 5: La1-Ict and Society

1.1.1.2 Describe the brief evolution of computers

FIRST GENERATION COMPUTERS(1940-1956)

VACUUM TUBES WAS INTRODUCES, IS AN ELECTRONIC TUBE MADE OF GLASS USED AS COMPUTER COMPONENTS TO STORE AND PROCESS DATA.

ENIAC IS FIRST GENERATION COMPUTER THAT CONTAINS WEIGHTS OF 30 TONS, 18000 VACUUM TUBES, 30-50 FOOT SPACE AND 16000 WATTS OF POWER.

Generasi Pertama (1940-1956)

Tiub Vakum diperkenalkan,merupakan alat elektronik diperbuat daripada kaca dan digunakan sebagai komponen komputer untuk menyimpan dan memposes data

generasi komputer pertama (ENIAC) mempunyai berat 30 tan, 18000 tiub vakum, luas 30 ke 50 kaki dan menggunakan kuasa 16000 watts. 5

Page 6: La1-Ict and Society

SECOND GENERATION COMPUTERS(1956-1963)

TRANSISTORS REPLACE VACUUM TUBES IN THIS GENERATION. TRANSISTORS ARE SMALL DEVICES THAT TRANSFER ELECTRONIC SIGNAL ACROSS RESISTOR.

TRANSISTOR DO NOT PRODUCED LOTS OF HEATS AND USE LESS POWER ALSO FASTER, CHEAPER AND SMALLER THAN VACUUM TUBES.

Komputer Generasi Kedua (1956-1963)

Transistor menggantikan tiub vakum dimana ia peranti lebih kecil yang menukar signal elektronik merentasi perintang

transistor tidak menghasilkan haba yang banyak(tidak panas) dan kurang menggunakan kuasa, murah dan kecil berbanding tiub vakum.

6

Page 7: La1-Ict and Society

THIRD GENERATION COMPUTERS(1964-1971)

INTEGRATED CIRCUITS (IC) REPLACED TRANSISTOR. AN IU IS A COMPLETE ELECTRONIC CIRCUIT ON A SMALL CHIP MADE OF

SILICONE. IU WAS RELIABLE, COMPACT AND CHEAPER THAN TRANSISTORS

Komputer Generasi Ketiga (1964-1971)

Litar bersepadu menggantikan transistor ia merupakan litar elektronik yang lengkap diatas cip

yang kecil diperbuat daripad silikon ia sangat sesuai, kecil dan murah berbanding transistor

7

Page 8: La1-Ict and Society

FOURTH GENERATION COMPUTERS(1971-PRESENT)

MICROPROCESSOR WAS INTRODUCED, FROM THOUSAND OF INTEGRATED CIRCUITS CHANGE ONTO SINGLE SILICONE CHIP.

THE INTEL 4004 CHIP DEVELOPED IN 1971, LOCATED ALL THE COMPONENTS OF THE COMPUTER FROM THE CENTRAL PROCESSING UNITS AND MEMORY TO INPUT/OUTPUT CONTROLS ON A SINGLE CHIP.

COMPUTER IS 100 TIMES SMALLER THAN ENIAC COMPUTER IN FIRST GENERATION.

Komputer Generasi keempat (1971-akan datang)

menggunakan mikropemprosesan, daripada beribu slitar berintegrasi bertukar kepada cip silikon yang tunggal

cip intel 4004 dibangunkan pada 1971, dimana terletaknya semua komponen komputer daripada unit pemeprosesan pusat dan memori untuk pengawalan input output data cip tunggal.

8

Page 9: La1-Ict and Society

FIFTH GENERATION COMPUTER(PRESENT –BEYOND)

FIFTH GENERATION COMPUTING DEVICES BASED ON ARTIFICIAL INTELLIGENCE ARE STILL IN DEVELOPMENT THOUGH THERE ARE SOME APPLICATIONS SUCH AS VOICE RECOGNITION THAT ARE BEING USED TODAY.

Generasi Kelima Komputer (akan datang – masa depan)

◦ berdasarkan kepada kepintaran buatan dimana telah dibina dan dipertingkatkan pembangunannya seperti face verification (pengenalan melalui wajah) yang mana telah mula digunakan kini.

9

Page 10: La1-Ict and Society

1.1.2.1 LIST THE USAGE OF ICT IN EVERYDAY LIFE.

EDUCATION (PENDIDIKAN) BANKING (PERBANKAN) INDUSTRY (INDUSTRI) E-COMMERCE (E-DAGANG)

10

Page 11: La1-Ict and Society

Teachers - use computers to search for teaching materials, participate in online forums and online conferences as well as to aid their teaching.

Guru -Mencari bahan pengajaran, menyertai forum dan telesidang

Students - use the computers as a reference tool. They use computers to browse the internet to look for information.

Pelajar-Mencari bahan rujukan di internet

School Administrators - use computers for administrative purposes to make sure that the entire operation runs smoothly.

Pentadbir sekolah -Guna komputer dalam pengurusan pentadbiran

Researchers - use computers to collect and process data.

Penyelidik -Mengumpul dan memproses data

11

Page 12: La1-Ict and Society

•Customers - can make any transactions at the 24 hour service centers or via online. These services allow them to do transaction at anytime they want.

Pelanggan – urusniaga 24jam sehari, secara atas talian, bila-bila masa

•Businessman - can save their time by using the online services offered by banks. They can access company accounts for loan applications, business transactions and update on their cash flow at any time.

Ahli perniagaan - urusan perbankan syarikat boleh dilakukan secara atas talian seperti urusniaga perniagaan dan kemaskini aliran tunai

•Bank Administrator - oversee the entire banking activities such as reconciliations, inter-branch transactions (IBT), telegraphic transfer and others by referring to the banking system.

Pentadbir bank – menguruskan keseluruhan aktiviti bank seperti penyesuaian, urusniaga antara cawangan, pindah telegraf

12

Page 13: La1-Ict and Society

Workers - use machines that are connected to computers to operate. In some productions, robots are used to take over jobs that are dangerous to the workers.

Pekerja – guna mesin yang disambung kepada komputer. Robot digunakan untuk mengambil alih pekerjaan yang merbahaya

Researchers- use computers to analyse and collect research data for future reference.

Penyelidik-guna komputer untuk menganalisa dan mendapatkan data sebagai rujukan masa akan datang

Administrators - use computers to oversee the entire operations in the plant or factory to detect specific errors or defects that occurred in the process.

Pentadbir – guna komputer untuk memantau keseluruhan operasi di dalam kilang dan mengenalpasti kesalahan dalam pemprosesan

13

Page 14: La1-Ict and Society

Customers - use computers to be connected online with suppliers to purchase products. This method can save time and cost as they do not have to go to any outlets.

Pelanggan - Boleh berhubung dengan pembekal secara atas talian, jimat masa dan kos, tidak perlu ke tempat pembekal

Suppliers - use computers to keep track of their transactions. All products are bar coded and can be read by the computer scanner to help in determining prices and managing inventory.

Pembekal – komputer digunakan untuk memantau urusniaga. Semua produk menggunakan kod bar dan boleh di imbas oleh pengimbas

Employees - use computers and telephones to communicate with their customers for any enquiries. The system helps employees to get the latest updates on inventory to be informed to the customers.

Pekerja – guna komputer dan telefon untuk berkomunikasi dengan pelanggan. Sistem juga akan membantu pekerja mendapatkan maklumat terkini untuk disampaikan kepada pelanggan

14

Page 15: La1-Ict and Society

COMPUTERIZED NON COMPUTERIZED ALL BANKING ACTIVITIES

ARE DONE BY USING COMPUTER SYSTEM

TRANSACTION CAN BE DONE ANYWHERE AND ANYTIME

IT TAKES SHORTEN TIME FOR ANY BANKING PROCESS

MORE PRODUCTIVE.

ALL BANKING ACTIVITIES WERE DONE MANUALLY

TRANSACTION CAN ONLY BE MADE DURING WORKING HOURS.

IT TAKES LONG TIME FOR ANY BANKING PROCESS

LESS PRODUCTIVE

BERKOMPUTER TIDAK BERKOMPUTER semua aktiviti

perbankan menggunakan sistem komputer

transaksi boleh dilakukan bila-bila dan di mana sahaja

mengambil masa yang sedikit melakukan proses perbankan

lebih produktif/cekap

semua aktiviti bank dijalankan secara manual

transaksi dijalankan dalam waktu kerja sahaja

mengambil proses lama menjalankan kerja

kurang produktif/kurang cekap

15

Page 16: La1-Ict and Society

POSITIVE IMPACTS NEGATIVE IMPACTS FASTER COMMUNICATION

SPEED LOWER COMMUNICATION

COST CAN SHARE OPINIONS

AND INFORMATION PAPERLESS

ENVIRONMENT INFORMATION AND

COMMUNICATION BORDERLESS THROUGH INTERNET.

CAN BE NEGATIVE BECAUSE IT COURAGE PEOPLE TO ACCESS PORNOGRAPHY AND VIOLENCE WEB SITES.

CAN HARM USES FOR LONG HOURS USED

KESAN POSITIVE KESAN NEGATIF komunikasi cepat kos komunikasi rendah perkongsian maklumat persekitaran tiada kertas dunia tanpa sempadan

(internet)

penyalahgunaan komputer pornografi dan keganasan

kesan buruk jika digunakan terlalu lama: bad posture, eyestrain, physical and mental stress.

1.1.2..1 State the impact of ICT on society.

16

Page 17: La1-Ict and Society

17

Page 18: La1-Ict and Society

Topic 1.2 - Computer Ethics and Legal Issues

Etika Komputer Dan Isu Undang-undang

18

Page 19: La1-Ict and Society

Computer ethics

Codes of ethic

Intellectual properties

privacy Computer crime

Cyber Law

SYSTEM OF MORAL STANDARDS OR VALUES USED AS A GUIDELINE FOR COMPUTER USERS ETHICAL.

ETIKA KOMPUTERstandard moral atau nilai yang digunakan ebagai panduan bagi pengguna komputer

GUIDELINES IN ICT THAT HELP DETERMINE WHETHER A SPECIFIC COMPUTER ACTION IS ETHICAL OR UNETHICAL.

KOD ETIKApanduan bagi memastikan samada perlakuan menggunakan komputer itu beretika atau tidak

WORKS CREATED BY INVENTORS, AUTHORS AND ARTISTS.

HAK MILIK INTELEKTUALkerja yang dibuat oleh pencipta seperti artis , pembuat program dan sebagainya.

THE RIGHT OF INDIVIDUALS AND COMPANIES TO DENY OR RESTRICT AND COLLECTION AND USED OF INFORMATION ABOUT THEM.

PRIVASIprivasi merujuk kepada hak milik induk atau syarikat

ANY ILLEGAL ACTS INVOLVING COMPUTERS.

JENAYAH KOMPUTER

jenayah komputer, perlakuan tidak baik membabitkan komputer

ANY LAWS RELATING TO PROTECTING THE INTERNET AND OTHER ONLINE COMMUNICATION TECHNOLOGIES UNDANG-UNDANG SIBER

undang-undang siber merujuk kepada undang-undang bagi melindungi kepentingan berkaitan internet dan teknologi komunikasi

19

Page 20: La1-Ict and Society

Law Ethics

AS A RULE TO CONTROL COMPUTER USERS. PERATURAN MENGAWAL PENGGUNA PC

AS A GUIDELINE TO COMPUTER USERS PANDUAN UNTUK PENGGUNA KOMPUTER

TO PREVENT MISUSE OF COMPUTERS MENGELAKKAN PENYALAHGUNAAN PC

ETHICAL BEHAVIOR IS JUDGED BY MORAL STANDARDS. KELAKUAN DIHAKIMI OLEH STANDARD MORAL

COMPUTER USERS MUST FOLLOW THE REGULATIONS AND LAW. PENGGUNA PC MESTI MEMATUHINYA

COMPUTER USERS ARE FREE TO FOLLOW OR IGNORE THE CODE OF ETHICS. BEBAS UNTUK MENGIKUT ETIKA ATAU TIDAK

PUNISHMENTS

ADA HUKUMAN

NO PUNISHMENT FOR ANYONE WHO

VIOLATES ETHICS. TIADA HUKUMAN UNTUK MEREKA YANG MELANGGARNYA

DEPEND ON COUNTRY AND STATE WHERE THE CRIME IS COMMITTED BERGANTUNG KEPADA NEGARA YANG TERBABIT

UNIVERSAL, CAN BE APPLIED ANYWHERE,

ALL OVER THE WORLD

SEMUA TEMPAT DI DUNIA

NOT OBEYING LAWS ARE CALLED CRIME TIDAK MEMATUHI AKAN DIGELAR PENJENAYAH

NOT FOLLOWING ETHICS ARE CALLED IMMORAL TIDAK MEMATUHINYA DIGELAR TIDAK BERMORAL

20

Page 21: La1-Ict and Society

AS BUSINESSES CONTINUE TO EXPAND GLOBALLY, BUSINESS OWNERS MUST REALIZE THE IMPORTANCE OF GETTING PROFESSIONAL ADVICE ON HOW TO ESTABLISH AND SAFEGUARD THEIR INTELLECTUAL PROPERTY RIGHTS. THESE INCLUDE :

oTRADEMARKS FOR BRAND IDENTITYoCOPYRIGHTS FOR MATERIALSoPATENTS FOR INVENTIONSoDESIGN FOR PRODUCT APPEARANCE

perniagaan berkembang secara global dimana pemilik mesti sedar kepentingan mendapatkan khidmat nasihat bagaimana menjaga harta intelek mereka. ini merangkumi

oIDENTITI PRODUKoHAKCIPTAoPATENoREKABENTUK

21

Page 22: La1-Ict and Society

22

terdapat 3 cara untuk mendapatkan privasi dari pemilik

1. Cookies

2. Electr

onic

profile

3. Spyware

Page 23: La1-Ict and Society

23

- used to identify users by web casting, e-commerce and other

- contain user information and are saved in the computer hard disk

- used by some websites to store passwords and track how regularly we visit a websites, that’s how we become potential targets for web advertisers

- Cookies digunakan dalam penggunaan internet untuk tujuan peribadi seperti login atau menyimpan rekod2 aktiviti di internet.

- Keadaan ini boleh meyebabkan

1. cookies

Page 24: La1-Ict and Society

24

the combining of data in a database that can be sold to the Internet by the company to the interested parties

this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers

includes personal details such as your age, address and marital status

2. Electronic Profile

Page 25: La1-Ict and Society

25

A program that collects user information without the user’s knowledge

Can enter computers, like a virus Is a result of installing new programs Communicates information that collects to

some outside source while we are online

3. Spyware

Page 26: La1-Ict and Society

1.2.2.1 List ways to protect privacy.

PRIVACY CAN BE PROTECTED BY:

(A) PRIVACY LAW

THE PRIVACY LAWS IN MALAYSIA EMPHASISES ON THE FOLLOWING:

- SECURITY SERVICES TO REVIEW THE SECURITY POLICY - SECURITY MANAGEMENT TO PROTECT THE RESOURCES - SECURITY MECHANISM TO IMPLEMENT THE REQUIRED SECURITY SERVICES - SECURITY OBJECTS, THE IMPORTANT ENTITIES WITHIN THE SYSTEM ENVIRONMENT

(A) UNDANG-UNDANG PRIVASI

undang-undang privasi di malaysia berkaitan dengan- servis keselamatan untuk memaparkan polisi keselamatan- pengurusan keselamatan untuk mengawal sumber- mekanisma keselamatan bagi mengimplementsi keperluan perkhidmatan keselamatan- objek keselamatan, entiti penting berkaitan persekitaran keselamatan

26

Page 27: La1-Ict and Society

1.2.2.1 List ways to protect privacy.

PRIVACY CAN BE PROTECTED BY:

(B) UTILITIES SOFTWARE

- INSTALL ANTI-SPAM PROGRAM, FIREWALL, ANTI-SPYWARE AND ANTIVIRUS - PURCHASE GOODS WITH CASH RATHER THAN CREDIT CARD - CLEAR YOUR HISTORY FILE WHEN YOU ARE FINISHED BROWSING - FILL IN ONLY NECESSARY INFORMATION ON WARRANTY AND REGISTRATION FORM.

(B) Perisian Utiliti

- menginstall program anti spam, dinding api, anti perisik dan antivirus- membeli barangan secara tunai- menghilangkan sejarah carian internet apabila selesai melayari internet- hanya mengisi perkara yang perlu dalam borang internet

27

Page 28: La1-Ict and Society

1.2.2.2 State authentication and verification methods/ technologies.

AUTHENTICATION IS A PROCESS WHERE USERS VERIFY THEIR IDENTITY. AUTHENTICATION DEALS WITH THE PROBLEM OF DETERMINING WHETHER A USER SHOULD BE ALLOWED ACCESS TO A PARTICULAR SYSTEM.

PEMBUKTIAN merupakan proses di mana pengguna mengesahkan bukti identiti samada pengguna itu dibenarkan atau tidak mengakses sesuatu sistem METHODS OF AUTHENTICATION

28

BIOMETRIC DEVICE CALL BACK SYSTEM

TRANSLATES PERSONAL CHARACTERISTICS INTO A DIGITAL CODE THAT IS COMPARED WITH A DIGITAL CODE STORED IN THE DATABASE.

CHECKING SYSTEM THAT AUTHENTICATES THE USER-BANK

PERANTI YANG MENUKAR KARAKTOR PERIBADI KEPADA KOD DIGITAL YANG BOLEH MEMBANDINGKAN DENGAN KOD DIGITAL YANG DISIMPAN DALAM PANGKALAN DATA

SISTEM YANG MENYEMAK PEMBUKTIAN OLEH PENGGUNA-BANK

Page 29: La1-Ict and Society

29

Page 30: La1-Ict and Society

30

USER IDENTIFICATION/pengenalan pengguna

PROCESSED OBJECT/ OBJEK PEMPROSESAN

REFERS TO THE PROCESS OF VALIDATING THE USER. -show exam slip to verify that you are the valid candidate for the exam-password

REFERS TO SOMETHING THE USER HAS SUCH AS IDENTIFICATION CARD, SECURITY TOKEN AND CELL PHONE.

MERUJUK KEPADA PROSES YANG DIJALANKAN PRNGGUNA BAGI PENGESAHAN

-Menunjukkan slip peperiksaan-Kata laluan

MERUJUK KEPADA PENGGUNA YANG MEMPUNYAI OBJEK SEPERTI KAD PENGENALAN, TOKEN KESELAMATAN DAN TELEFON.

METHOD OF VERIFICATION/PENGESAHAN

Page 31: La1-Ict and Society

31

Page 32: La1-Ict and Society

32

Page 33: La1-Ict and Society

1.2.3.1 a)List effects of controversial contents of pornography on society

PORNOGRAPHY CAN LEAD TO CRIMINAL ACTS SUCH AS EXPLOITATION OF WOMEN AND CHILDREN CAN LEAD TO SEXUAL ADDICTION OR PERVERSION CAN DEVELOP LOW MORAL VALUE TOWARDS OTHER MEN, WOMEN OR CHILDREN CAN ERODE GOOD RELIGIOUS, CULTURAL AND SOCIAL BELIEFS AND BEHAVIOR

PORNOGRAFI◦ boleh menggalakkan perlakuan jenayah seperti eksploitasi wanita dan

kanak-kanak◦ boleh menjurus kepada perlakuan seks◦ boleh membangunakan nilai moral yang rendah terhadap lelaki dan wanita

mahupun kanak-kanak

SLANDER CAN DEVELOP INTO A SOCIETY THAT DISREGARDS HONESTY AND TRUTH CAN DEVELOP BAD HABIT OF SPREADING UNTRUTHS AND RUMORS CAN LEAD TO UNNECESSARY ARGUMENT CAN CAUSE PEOPLE TO HAVE NEGATIVE ATTITUDES TOWARDS ANOTHER PERSON

FITNAH

boleh membangunkan masyarakat yang tidak jujur boleh membangunkan tabiat buruk seperti menyebarkan khabar angin membawa kepada pertelingkahan yang tidak perlu boleh menyebabkan perlakuan negatif antara sau sama lain atau masyarakat

keseluruhannya33

Page 34: La1-Ict and Society

34

Page 35: La1-Ict and Society

1.2.3.2 Describe the process of filtering to control access to controversial contents

THE METHOD OF CHOICE TO LIMIT ACCESS ON THE INTERNET IS TO FILTER EITHER BY A. KEYWORD BLOCKING. THE METHOD USES A LIST OF BANNED WORD OR OBJECTS

TERMS SUCH AS XXX, SEX, AND NUDE. AS THE PAGE IS DOWNLOADING, THE FILTER SEARCHES FOR ANY OF THESE WORDS. IF FOUND, IT WILL BLOCKED THE PAGE COMPLETELY. STOP DOWNLOADING THE PAGE, BLOCK THE BANNED WORDS AND EVEN SHUT DOWN THE BROWSER.

B. SITE BLOCKING. THE METHOD USE SOFTWARE TO LIST THE WEBSITES THAT WILL BE BLOCKED BY USING SOFTWARE. THE SOFTWARE PREVENTS USERS FROM BEING ACCESS THE WEB SITES ON LIST.

C. WEB RATING SYSTEM. WEB SITES ARE RATING IN TERMS OF NUDITY, SEX, VIOLENCE AND LANGUAGE. THE WEB SITES RATE CAN BE DONE BY SETTING THE BROWSER TO ONLY ACCEPT PAGE WITH CERTAIN LEVEL OF RATINGS.

LANGKAH PENAPISAN DALAM MELAYARI INTERNET ADALAH

a. PENGHALANG KATAKUNCI katakunci yang berkaitan dengan perkara-perkara buruk disimpan dalam

pangkalan data.pengguna yang menaip atau menekan perkataan tersebut akan dihalang dari mengakses laman berkaitan perkara tersebut

b. PENGHALANG TAPAK satu perisian berfungsi untuk mengenalpasti laman-laman yang tidak

patut atau boleh dilayari.c. SISTEM RATING WEB merupakan sistem yang mengenalpasti laman-laman yang tidak baik yang

selau dilayari. sistem akan menghalang pengguna daripada melayari laman-laman web tersebut.

35

Page 36: La1-Ict and Society

1.2.4.1 Explain the need for cyber law

THE NEED FOR CYBER LAW IS TO PROTECT THE INTERNET AND OTHER ONLINE

COMMUNICATION TECHNOLOGIES.THE NEEDS OF CYBER LAW ARE

INTEGRITY AND SECURITY INFORMATION LEGAL STATUS OF ONLINE TRANSACTIONS PRIVACY AND CONFIDENTIALLY OF INFORMATION INTELLECTUAL PROPERTY RIGHTS SECURITY OF GOVERNMENT DATA

KEPERLUAN UNDANG-UNDANG SIBER ADALAH UNTUK MENGAWAL INTERNET DAN LAIN-LAIN TEKNOLOGI ATAS TALIAN. IA BERKAITAN

MAKLUMAT KESELAMATAN DAN INTEGRITI TRANSAKSI ATAS TALIAN YANG SAH MAKLUMAT PRIVASI DAN SULIT HAK CIPTA TERPELIHARA KESELAMATAN DATA KERAJAAN

36

Page 37: La1-Ict and Society

1.2.4.2 Explain briefly the computer crimes below:

COMPUTER FRAUD IS DEFINED AS HAVING AN INTENTION TO TAKE ADVANTAGE OVER OR CAUSING LOSS TO OTHER PEOPLE, MAINLY ON MONETARY BASIS THROUGH THE USE OF COMPUTERS.

THERE ARE MANY FORMS OF COMPUTER FRAUD WHICH INCLUDE E-MAIL HOAXES, PROGRAM FRAUD, INVESTMENT SCHEMES, SALES PROMOTIONS AND CLAIMS OF EXPERTISE ON CERTAIN FIELDS.

PENIPUAN KOMPUTER merujuk kepada mengambil perhatian atau kesempatan yang boleh mengakibatkan kerugian kepada orang lain menerusi penggunaan komputer. contohnya penipuan email, skim pelaburan, promosi jualan dsbnya.

37

Page 38: La1-Ict and Society

38

COPYRIGHT INFRINGEMENT IS DEFINED AS A VIOLATION OF THE RIGHTS SECURED BY A COPYRIGHT. COPYRIGHT INFRINGEMENT INVOLVES ILLEGAL COPY OR REPRODUCTION OF COPYRIGHTS MATERIAL BY THE BLACK MARKET GROUP. THE OPEN COMMERCIAL SALE OF PIRATED ITEM IS ALSO ILLEGAL.

PELANGGARAN HAKCIPTA merujuk kepada pelanggaran kepada hakcipta, menyalin semula tanpa kebenaran dan sebagainya.

Page 39: La1-Ict and Society

1.2.4.2 Explain briefly the computer crimes below:

COMPUTER THEFT IS DEFINED AS THE UNAUTHORIZED USE OF ANOTHER PERSON’S PROPERTY WITH THE INTENTION TO DENY THE OWNER THE RIGHTFUL POSSESSION OF THAT PROPERTY OR ITS USE.EXAMPLES OF COMPUTER THEFT INCLUDE:

TRANSFER OF PAYMENTS TO THE WRONG ACCOUNTS GET ONLINE MATERIALS WITH NO COST TAP INTO DATA TRANSMISSION LINES ON DATABASE AT NO COST DIVERT GOODS TO THE WRONG DESTINATION

PENCURIAN KOMPUTER bermaksud penggunaan tanpa kebenaran keatas hak milik orang lain dengan nilai merosak, mengubah, menukar dan sebagainya pengalihan wang dari akaun orang lain mendapat barangan atas talian tanpa bayar mendapat maklumat tanpa bayaran\ mengalihkan penghantaran barangan ke tempat lain

39

Page 40: La1-Ict and Society

1.2.4.2 Explain briefly the computer crimes below:

COMPUTER ATTACK MAY BE DEFINED AS ANY ACTIVITIES TAKEN TO DISRUPT THE EQUIPMENT OF COMPUTER SYSTEMS, CHANGE PROCESSING CONTROL OR CORRUPT STORED DATA.

COMPUTER ATTACK CAN BE IN THE FORMS OF: PHYSICAL ATTACK THAT DISRUPT THE COMPUTER FACILITY OR ITS

TRANSMISSION LINES. AN ELECTRONIC ATTACK THAT USES THE POWER OF ELECTROMAGNETIC

ENERGY TO OVERLOAD COMPUTER CIRCUITRY. A COMPUTER NETWORK ATTACK THAT USES A MALICIOUS CODE TO EXPLOIT

A WEAKNESS IN SOFTWARE, OR IN THE COMPUTER SECURITY PRACTICES OF A COMPUTER USER

40

Page 41: La1-Ict and Society

1.3.1.1 Define Computer security. COMPUTERS SECURITY MEANS PROTECTING OUR

COMPUTER SYSTEMS AND THE INFORMATION THEY CONTAINS AGAINST UNWANTED ACCESS, DAMAGE, DESTRUCTION OR MODIFICATION.

keselamatan komputer bermaksud melindungi sistem komputer dan maklumat di dalamnya daripada akses yang tidak dibenarkan, kerosakan dan pengubahan

41

Page 42: La1-Ict and Society

42

1.MALICIOUS CODE 2. HACKING

3. ENVIRONMENTAL DISASTER 4. THIEF

Page 43: La1-Ict and Society

1.3.2.1 Explain briefly the different threats to computer security:

1. MALICIOUS CODE IS ALSO KNOWN AS A ROUGE PROGRAM. IT IS A TREAT TO COMPUTING ASSETS BY CAUSING UNDESIRED EFFECTS IN THE PROGRAMMER’S PART. THE EFFECT CAUSE BY AGENT, WITH THE INTENTION TO CAUSE DAMAGE. THE AGENT FOR MALICIOUS CODE IS THE WRITER OF THE CODE, OR ANY PERSON WHO CAUSES ITS DISTRIBUTION. THERE ARE VARIOUS KINDS OF MALICIOUS CODE. THEY INCLUDE VIRUS, TROJAN HORSE, LOGIC DOOR, TRAPDOOR AND BACKDOOR, WORM AND MANY OTHERS.

1. KOD HASAD juga dikenali sebagai program pemecah. ia mengganggu aset komputer dengan menyebabkan kerosakan. agen kod ini akan mengubah kod yang terdapat dalam program dan merosakkan komputer dengan kesannya seperti gangguan kepada perjalanan program. contohnya trojan horse, logic door, trapdoor dan backdoor, worm(cecacing) dan banyak lagi

43

Page 44: La1-Ict and Society

44

Page 45: La1-Ict and Society

45

Page 46: La1-Ict and Society

1.3.2.1 Explain briefly the different threats to computer security:

HACKING IS A SOURCE OF THREAT TO SECURITY IN COMPUTER. IT IS DEFINED AS UNAUTHORIZED ACCESS TO THE COMPUTER SYSTEM BY A HACKER.HACKERS ARE PERSONS WHO LEARN ABOUT THE COMPUTER SYSTEM IN DETAIL. THEY WRITE PROGRAM REFERRED TO AS HACKS. HACKERS MAY USE A MODEM OR CABLE TO HACK THE TARGETED COMPUTERS.

PENGGODAMAN adalah sumber gangguan kepada keselamatan dalam komputer. ia boleh diistilahkan sebagai akses tanpa kebenaran kepada sistem komputer oleh orang yang dikenali sebagai hacker. hacker adalah orang yang ada kepandaian tentang sistem komputer. mereka menulis program komputer berdasarkan penggunaan modem dan kabel untuk merosakkan komputer.

46

Page 47: La1-Ict and Society

47

• ENVIRONMENTAL DISASTER. BE IT AT HOME, STORES, OFFICES AND ALSO AUTOMOBILES. EXAMPLES OF NATURAL AND ENVIRONMENTAL DISASTERS: FLOOD, FIRE, EARTHQUAKES, STORMS AND TORNADOS, EXCESSIVE HEAT, NADEQUATE POWER SUPPLY

• BENCANA ALAM adalah juga satu cara yang merosakkan komputer. contohnya banjir, tanah runtuh, gempa bumi dan sebagainya.

Page 48: La1-Ict and Society

48

Page 49: La1-Ict and Society

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats.

Data Backup :CryptographyAnti virusAnti spywareFirewallHuman Aspects

49

Page 50: La1-Ict and Society

50

Page 51: La1-Ict and Society

51

Page 52: La1-Ict and Society

52

Page 53: La1-Ict and Society

53

Page 54: La1-Ict and Society

54

screening routers- ringkas, hanya melihat alamat dan jenis protocol.proxy gateway- rumit, melihat keseluruhan teksguard-lebih rumit, juga melihat keseluruhan teks

Page 55: La1-Ict and Society

55

Page 56: La1-Ict and Society

56

Page 57: La1-Ict and Society

1.4.1 Impact of ICT on Society

57

Page 58: La1-Ict and Society

1.4..1.1 Impact of ICT on Society

POSITIVE IMPACT FASTER COMMUNICATION SPEED. WITH THE INTERNET, NEWS OR MESSAGE

ARE SEND VIA E-MAIL TO ANYONE EFFICIENTLY. WITH THE CAPABILITY OF BROADBAND AND SPEED OF CONNECTION ON THE INTERNET, ANY INFORMATION CAN BE TRAVEL FASTER.

LOWER COMMUNICATION COST. WITH THE INTERNET, WE DO NOT HAVE TO PAY ANY BASIC SERVICES PROVIDED BY IN THE INTERNET. FURTHERMORE, THE COST OF THE CONNECTION TO THE INTERNET IS RELATIVELY CHEAP.

IPEOPLE CAN SHARE OPINION FROM INFORMATION THROUGH DISCUSSION GROUP AND FORUMS THROUGH INTERNET.

INFORMATION CAN BE STORED AND RETRIEVED THROUGH THE DIGITAL MEDIUM INSTEAD OF PAPER. (PAPERLESS ENVIRONMENT)

INFORMATION AND COMMUNICATION CAN BE BORDERLESS THROUGH INTERNET. BY USING INTERNET, PEOPLE ALL AROUND THE WORLD CAN BE CONNECTED THROUGH EACH OTHER.

IMPAK POSITIF KELAJUAN KOMUNIKASI YANG CEPAT – MELALUI INERNET, BERITA ATAU

MESEJ MENERUSI EMAIL AKAN LEBIH CEPAT DAN PANTAS. KOS KOMUNIKSI YANG RENDAH – DENGAN INTERNET, KITA TIDAK PERLU

MEMBUAT PEMBAYARAN ASAS PERKHIDMATAN. MANUSIA BOLEH BERKONGSI MAKLUMAT – MELALUI FORUM INTERNET PENYIMPAN MAKLUMAT BOLEH DIBUAT DAN TANPA KERTAS DUNIA TANPA SEMPADAN – DENGAN INTERNET , MANUSIA BOLEH

BERHUBUNG DENGAN SEMUA ORANG DI DUNIA DENGAN MUDAH

58

Page 59: La1-Ict and Society

NEGATIVE IMPACT Borderless information at time can be negative because

it courage people to access pornography and violence website. It can cause low moral values. It also can created problems such as gambling, information theft and fraud.

Computers can harms users if they use for long hours frequently

KESAN NEGATIF MAKLUMAT TANPA SEMPADAN KADANGKALA ADALAH

NEGATIF – CONTOHNYA MENGGALAKKAN PORNOGRAFI DAN KEGANASAN

KOMPUTER MENGGANGGU KESIHATAN JIKA DIGUNAKAN TERLALU LAMA.

59

Page 60: La1-Ict and Society

Choose ONE of the following topics: Copyright and Piracy from Moral and

Legal Standpoints. Lack of Security and its Effects on

Industry/Economy/ Government. Malaysian Cyber Law, Electronic

Government Law. Phishing Virus (Trojan Horse, Salami Attack) Hacking Security Measures (Biometrics,

Authentication

60

Page 61: La1-Ict and Society

DIGITAL SIGNATURE ACT 1997TELEMEDICINE ACT 1997COMPUTER CRIME ACT 1997COMMUNICATION AND MULTIMEDIA

ACT 19989

61