SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
TOC.CW.LA1.AS02.1

TABLE OF CONSTRUCT
Construct

:

S02

Impact of ICT on Society

Aspect

:

LA1.S02.1

Locate and present information on impact of ICT on society

Instrument

:

MARK

Verbal Presentation

CRITERIA

1

NOTE

Completed
ACF.CW.LA1.S01.2

SCandidates work in groups of 2
– 4 but must present individually.
Refer to Appendix
WAF.M1.S02.1.
Choose one of the following
topics:
1. Copyright and piracy from
moral and legal standpoints.
2. Lack of security and its
effects on industry/
economy/government.
3. Malaysian Cyber law,
electronic government law.
4. Phishing
5. Virus (Trojan Horse, Salami
Attack)
6. Hacking
7. Security Measures
(Biometrics, Authentication)
Values:
 Cooperate
 Responsibleuggested
anti-spyware software:
Lavasoft Ad-Aware SE
Personal.

1. Locate information
from more than one
source.
Write the number of
sources referred.

2

EVIDENCE

2. Present the
information in 5 to 10
slides.
Write the number of
slides used.

5

3. Presentation includes:
a. Topic
b. Content
c. Conclusion
d. Sources of
reference
Submit a soft copy or
hard copy of the
presentation.

2

4. Display cooperation.
a. Write the names
of group
members.
b. Verbal
verification from
group members
OR assessor’s
observation.

Print screen can be used to
display scan summary.
If no spyware is detected,
criterion four is considered done.
Write “No action taken”.
Values:
 Confident
Responsible

10

TOTAL MARK

Weitere ähnliche Inhalte

Was ist angesagt?

Protecting Web App
Protecting Web AppProtecting Web App
Protecting Web App
Aung Khant
 

Was ist angesagt? (9)

The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Protecting Web App
Protecting Web AppProtecting Web App
Protecting Web App
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacks
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
Beware of cyber security threats
Beware of cyber security threatsBeware of cyber security threats
Beware of cyber security threats
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 

Andere mochten auch (20)

La2 templates
La2 templatesLa2 templates
La2 templates
 
Computer
ComputerComputer
Computer
 
La3 templates
La3 templatesLa3 templates
La3 templates
 
Notacd01
Notacd01Notacd01
Notacd01
 
Scheme ict-2013-f4
Scheme ict-2013-f4Scheme ict-2013-f4
Scheme ict-2013-f4
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Notacd051
Notacd051Notacd051
Notacd051
 
La1 templates
La1 templatesLa1 templates
La1 templates
 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
 
Privacy
PrivacyPrivacy
Privacy
 
โปรแกรมและภาษาคอมพิวเตอร์
โปรแกรมและภาษาคอมพิวเตอร์โปรแกรมและภาษาคอมพิวเตอร์
โปรแกรมและภาษาคอมพิวเตอร์
 
Notacd081
Notacd081Notacd081
Notacd081
 
Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5Cd ict-worksheet-la5-form-5
Cd ict-worksheet-la5-form-5
 
Notacd10
Notacd10Notacd10
Notacd10
 
Notacd12
Notacd12Notacd12
Notacd12
 
Notacd09
Notacd09Notacd09
Notacd09
 
Notacd071
Notacd071Notacd071
Notacd071
 
Presentation1
Presentation1Presentation1
Presentation1
 
Notacd11
Notacd11Notacd11
Notacd11
 

Ähnlich wie La1 131209040938-phpapp02

Security researchers participate in conferences such as DefCon t.docx
Security researchers participate in conferences such as DefCon t.docxSecurity researchers participate in conferences such as DefCon t.docx
Security researchers participate in conferences such as DefCon t.docx
jeffreye3
 
FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1
ChereCheek752
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
annrodgerson
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
qqlan
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
IJNSA Journal
 

Ähnlich wie La1 131209040938-phpapp02 (20)

Toc.cw.la1.as02.1
Toc.cw.la1.as02.1Toc.cw.la1.as02.1
Toc.cw.la1.as02.1
 
Security researchers participate in conferences such as DefCon t.docx
Security researchers participate in conferences such as DefCon t.docxSecurity researchers participate in conferences such as DefCon t.docx
Security researchers participate in conferences such as DefCon t.docx
 
188
188188
188
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1FINAL PAPER1FINAL PAPER1
FINAL PAPER1FINAL PAPER1
 
Final paper1 final paper1
Final paper1 final paper1Final paper1 final paper1
Final paper1 final paper1
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat report
 

Mehr von cikgushaharizan (17)

Acf
AcfAcf
Acf
 
Ict on-society
Ict on-societyIct on-society
Ict on-society
 
Ethics law
Ethics lawEthics law
Ethics law
 
Computer security
Computer securityComputer security
Computer security
 
Computer generation
Computer generationComputer generation
Computer generation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 
Bidang pembelajaran-5-2
Bidang pembelajaran-5-2Bidang pembelajaran-5-2
Bidang pembelajaran-5-2
 
Bidang pembelajaran-5-1
Bidang pembelajaran-5-1Bidang pembelajaran-5-1
Bidang pembelajaran-5-1
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 
Bidang pembelajaran-4-2
Bidang pembelajaran-4-2Bidang pembelajaran-4-2
Bidang pembelajaran-4-2
 
Bidang pembelajaran-4-1
Bidang pembelajaran-4-1Bidang pembelajaran-4-1
Bidang pembelajaran-4-1
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

La1 131209040938-phpapp02

  • 1. TOC.CW.LA1.AS02.1 TABLE OF CONSTRUCT Construct : S02 Impact of ICT on Society Aspect : LA1.S02.1 Locate and present information on impact of ICT on society Instrument : MARK Verbal Presentation CRITERIA 1 NOTE Completed ACF.CW.LA1.S01.2 SCandidates work in groups of 2 – 4 but must present individually. Refer to Appendix WAF.M1.S02.1. Choose one of the following topics: 1. Copyright and piracy from moral and legal standpoints. 2. Lack of security and its effects on industry/ economy/government. 3. Malaysian Cyber law, electronic government law. 4. Phishing 5. Virus (Trojan Horse, Salami Attack) 6. Hacking 7. Security Measures (Biometrics, Authentication) Values:  Cooperate  Responsibleuggested anti-spyware software: Lavasoft Ad-Aware SE Personal. 1. Locate information from more than one source. Write the number of sources referred. 2 EVIDENCE 2. Present the information in 5 to 10 slides. Write the number of slides used. 5 3. Presentation includes: a. Topic b. Content c. Conclusion d. Sources of reference Submit a soft copy or hard copy of the presentation. 2 4. Display cooperation. a. Write the names of group members. b. Verbal verification from group members OR assessor’s observation. Print screen can be used to display scan summary. If no spyware is detected, criterion four is considered done. Write “No action taken”. Values:  Confident Responsible 10 TOTAL MARK