Monday, 2 November 2015

No.
Keyword(s)
Referring to:
1.
Computer Generations
1st generation (1940 – 1956)
  • Huge, slow, expensive, unreliable
  • Presper Eckert & William Maunchly built ENIAC (use vacuum tube)
  • Problem with vacuum tube – generates great deal of heat, burns out frequently
 2nd generation (1956 – 1963)
  • Uses transistors which were smaller than vacuum tubes, no need warm up time, consumed less energy, generate less heat, faster and more reliable.
  • Famous computer scientists: John Bardeen, Walter House Brattain, William Shockley
3rd generation (1964 – 1971)
·         IBM 370 series were introduced in 1964. Also CDC 7600 and B2500
·         Development of Integrated circuit begins.
·         Use silicon chips – reliable, compact, cheaper
·         Hardware and software sold separately.
·         First 256 bit RAM were introduced and was the basis for development of 1K bit RAM.
4th generation (1971 – present)
·         Famous computer scientists: Steve Jobs (built the 1st Apple computer), Bill Gates, Michael Dell
·          Silicone chips, microprocessor, storage devices were invented.
·         Computer became 100 times smaller than ENIAC.
·         Gain in speed, reliability and storage capacity
·         Personal and software industry bloomed.
5th generation (Present – beyond)
·         Based on Artificial Intelligence (AI)
·         New hardware technology was introduce: Silicone chips,Processor,Robotics,Virtual reality,Intelligent system,Programs which translate languages
2.
Positive impact of ICT on the society
The six positive impacts:
Faster communication speed
Lower communication cost
Reliable mode of communication
Effective sharing of information
Paperless environment
Borderless communication.
3.
Negative impact of ICT on the society
The two negative impacts:
Social problems
Health problems
4.
Why ethics and law in computing is needed?
Respecting ownership – not steal other people’s work either by duplicating or distributing
Respecting privacy and confidentiality – refraining oneself from invading other’s privacy without permission.
Respecting property – do not tamper and change electronic information.
5.
Intellectual property protection
Patent for inventions: utility, design, plant patent, (protect inventions and improvements)
Trademark for brand identity: Words, names, symbols, devices, images (represent products, goods or services)
Copyright for material : Literary and artistic material, music, films, sounds recording and road casts
Design for product appearance: particular lines, contours, colour, shape, texture, ornamentations.
6.
Methods of authentications
authentications - a process where users verify their identity.
2 types:
Biometric devices – a device that translate personal characteristic into digital code
·         Fingerprint recognition
·         Facial recognition
·         Hand geometry scanning
·         Iris scanning (the area near to the coloured area of the pupil)
·         Retinal scanning (the eyeball)
·         Voice recognition
·         Signature verification system.
Callback system – checking system that authenticates the user. (Commonly used in the bank operation and business transaction.)
  • When book the taxi service
  • Operator call and call back for confirm the service required.
7.
Methods of verification
Verification - the act of proving or disproving the correctness of a system with respect to a certain formal specification.
2 common methods:
User identification – show passport, key-in user name & password, show exam slip.
Processed object – swipe security card to enter building, police check the driver’s license to identify valid driver.
8.
Controversial content
Pornography – any form of media or material that depicts erotic behavior and is intended to cause sexual excitement.
Slander – legal term for false and malicious statement.
9.
Internet filtering
3 common methods:
Keyword blocking – uses a list of banned words to filter access to the site
Website / site blocking – uses software to prevent access to any sites on the list
Web rating system – browser gain access to a certain level of ratings
10.
Cyber law acts in Malaysia
Digital Signature Act 1997 – secures electronic communications especially on the internet.
Computer Crimes Act 1997 – gives protection against misuse of computers and computer criminal activities.
Telemedicine Act 1997 – Ensure only qualified medical practitioners can practice telemedicine.
Communications and Multimedia Act 1998 – ensures that information is secure, network is reliable, and service is affordable all over Malaysia.
11.
Computer Crimes
Computer Fraud – intention to take advantage or causing loss (mainly monetarily basis)
Copyright Infringement – involves illegal copy or reproduction of copyright material by black market group
Computer Theft – unauthorized use of another person’s property
Computer Attack – to disrupt the equipment of computer systems …
12.
Computer Security
Hardware Security – measure used to protect the computer hardware
Software and Data Security – measure used to protect software and the loss of data files
Network Security – measure used to protect the network system.
13.
Security Threat
Malicious code
  • Virus – a program that can pass in the malicious code to other programs by modifying them
  • Trojan Horse – a program which can perform useful and unexpected action
  • Logic Bomb – that goes off when a specific condition occurs
  • Trapdoor or Backdoor – a program that allows someone to access the program with privileges
  • Worm – a program that copies and spreads itself through a network
Hacker – unauthorised person who access (hack) into computer
Natural and environmental threat – flood, fire, earthquake
Theft – steal money, goods, information and resources.
14.
Security Measures
Data backup – a program of file duplication. It is necessary so that they can be recovered in case of an emergency
Cryptography – process of hiding information by altering the actual information into different representation.
Antivirus – program that protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, storage or incoming email files.
Anti-spyware – program used to remove spyware.
Firewall – hardware or software which functions in a networked environment to prevent some communications forbidden by the security policies.
  • Screening router
  • Proxy gateway
  • Guard
Human aspect – refer to the user and also the intruder of a computer system.
  • Organisation self awareness – aware of the people they work with
  • Organisation user self awareness – provide employee with adequate training and importance of security and control
  • Individual user self awareness – aware of software from unreliable sources. Do not expose important information to stranger.
15.
Security Procedures
Data Protection
  • Backup files
  • Detect virus and do cleanup
  • Warn others on virus attack.
Detecting illegal access to systems
  • Tcpwrappers – control access at the application level rather than at socket level.
  • Tripwire – detect and report on any changes in the thousands of strategic system files.
Preventing illegal access to system
Preventing illegal access to root
Patch – small updates to software