SlideShare a Scribd company logo
1 of 39
Download to read offline
INFORMATION
           AND
 COMMUNICATION TECHNOLOGY


          LEARNING MODULE




INFORMATION AND COMMUNICATION TECHNOLOGY
               AND SOCIETY




           Pusat Perkembangan Kurikulum
           Kementerian Pelajaran Malaysia
                       2006
Learning Module: ICT and Society


1.     What is it?

       This is a learning module for a specific Learning Outcome as stipulated in
       the HSP that is :

       €   1.3 Computer Security



2.     Who is it for?

       This module is for students who are taking the ICT subject as their elective
       and for those who are interested in ICT.



3.     What can be achieved?

       Upon completion of this module, you should be able to :

       €   identify security threats

       €   know what measurements should be taken to overcome the threats



4.     Is previous knowledge necessary?

       No. The content of this module will enable you to acquire the knowledge.




     www.ppk.kpm.my                                                         < 1 >
Learning Module: ICT and Society

TOPIC :       1.3     COMPUTER SECURITY



SUBTOPIC : 1.3.3 Security measures



LEARNING OUTCOMES

You should be able to:

1.3.3.3   Apply the correct security procedures.

             A.        Antivirus
             B.        Anti-Spyware
             C.        Cryptography
             D.        Firewall
             E.        Data backup
             F.        Human aspects




DURATION :        6 periods




   www.ppk.kpm.my                                                      < 2 >
Learning Module: ICT and Society

REFERENCES

A. Books
1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information Age.
   Complete. Eight Edition.
2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering
   Computers 2005 : A Gateway to Information, Course Technology.
3. Stallings W. (2003) Cryptography and Network Security: Principles and
   Practices. Third Edition.


B. Web Addresses
1. Ad-Aware SE Personal ~ http://www.lavasoft.com

2. Antivirus ~ http://www.primode.com/glossary.html

3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf

4. AVG Free Edition Antivirus ~ http://www.grisoft.com

5. Cryptography ~ http://privacy.getnetwise.org/browsing

6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/

7. Cryptography ~ http://www.shodor.org/interactivate/discussions/cipher.html

8. Cryptography ~ http://www.signalguard.com/security/encryption.htm


C. Other sources

1. Windows Help and Support Center.




   www.ppk.kpm.my                                                        < 3 >
Learning Module: ICT and Society




                          A. ANTIVIRUS


Situation

Your computer displays strange behaviour. For instance, you discover that
“myhomework.doc” has suddenly been renamed to “myhomework.exe”.

Discuss :

   i) What do you think is the cause of this problem?


   ii) Determine the appropriate measures to overcome this threat.


   iii) Apply the correct security procedures to solve this problem.




 www.ppk.kpm.my                                                        < 4 >
Learning Module: ICT and Society




What is antivirus software?

Antivirus software is a program that detects viruses in your computer memory,
storage media or incoming files. It will identify, prevent and eliminate computer
viruses and other malicious software. Examples of antivirus software are McAfee
VirusScan, Norton AntiVirus, Trend Micro PC-cillin, and Doctor Solomon.




Why do we need an antivirussoftware?

Antivirus software protects a computer against viruses by identifying and
removing any computer viruses found.




   www.ppk.kpm.my                                                         < 5 >
Learning Module: ICT and Society

How do you scan your file?

To scan selected area in your personal computer:

1.    You may use the antivirus software installed in your computer to scan
     selected area, disk or the entire computer. In this module we use AVG Free
     Edition antivirus software.

2. Start the antivirus software by clicking Start then go to All Programs. Next,
   select AVG Free Edition followed by AVG Free Control Center (Figure 1).




                                    Figure 1




     www.ppk.kpm.my                                                      < 6 >
Learning Module: ICT and Society

3. Click Scan Selected Areas (Figure 2).




                                  Figure 2

4. Select Drive C: and click Scan Selected Areas (Figure 3).




                                  Figure 3




   www.ppk.kpm.my                                                      < 7 >
Learning Module: ICT and Society

5. Scanning process in progress (Figure 4). You may Stop or Pause the
   process at any time and resume by restarting or reopen the antivirus software.




                                    Figure 4

6. During the progress report, you will be notified if your computer is infected
   (Figure 5).




                                    Figure 5


   www.ppk.kpm.my                                                         < 8 >
Learning Module: ICT and Society


7. The program will try to heal the infected file(s) automatically. Dialogue box
   (Figure 6) will appear if the virus is detected. Click Continue to proceed
   scanning another file.




                                   Figure 6

Table 1 shows the actions of help, Info, Heal, Delete file and Move to Vault
buttons.

 Option       Action

              AVG Free Edition Help – Basic.




              Proceed with what you are doing and the antivirus will ignore the
              virus.




   www.ppk.kpm.my                                                        < 9 >
Learning Module: ICT and Society


Option    Action

          Call up the dialogue with information on the detected virus if
          available.




          Heal the infected object if possible.




          Remove the infected object.




  www.ppk.kpm.my                                                   < 10 >
Learning Module: ICT and Society


 Option       Action

              If you do not want to delete the file, you can quarantine the file by
              sending it to the AVG Virus Vault. Click Move to Vault.




                                    Table 1

8. Figure 7 displays scanning statistics. The virus statistics box shows 1 object
   is infected. This program will delete the object. Click Close to finish the
   scanning process. You may also repeat the above process by clicking Scan
   again.




                                    Figure 7

   www.ppk.kpm.my                                                        < 11 >
Learning Module: ICT and Society

Assessment

1.   Below are steps in scanning antivirus Rearrange them in the correct
sequence.
      a. Scan the selected file
      b. Choose an antivirus program
      c. Wait while the program is scanning and the result is produced
      d. Select file that need to be scanned




2. Antivirus is a software which ______________, _______________ and
   ______________ computer viruses and other malicious software.

3. Which of the following is an antivirus software?
     A Microsoft Office
     B Trend Micro PC-cillin
     C Windows XP
     D Microsoft Word


Enrichment

1. Repeat the above processes to scan other files or areas in your computer.
   Write down the infected file name and virus if any.




   www.ppk.kpm.my                                                     < 12 >
Learning Module: ICT and Society




                     B. ANTI-SPYWARE


       Situation

       While you are surfing the Internet, your computer displays a lot of pop-up
       windows and disturbs your surfing.

       Discuss :

          i) What do you think is the cause of this problem?

          ii) Determine the appropriate measures to overcome this threat.


          iii) Apply the correct security procedures to solve this problem.




What is spyware?
   www.ppk.kpm.my                                                         < 13 >
Learning Module: ICT and Society


Spyware is a program placed in a computer without the user’s knowledge that
secretly collects information about the user. Spyware can enter a computer as a
virus or as a result of a user installing a new program. The spyware program
communicates information it collects to others while you are online.

Effects and risks

   €   Stealing of confidential data (e.g. passwords)
   €   Violation of privacy
   €   Unsolicited advertising

Symptoms of spyware infection

The most common symptoms or warning signs of presence of spyware on a
system include:
   - Unusual slowness of the system.
   - System instability.
   - Slow Internet connection.
   - Reception of an unusual amount of spam or junk mail.
   - Endless pop-ups.
   - Windows error messages.
   - Computer crashes with no warning.
   - Computer screen freezes.
   - “Blue screen of death”.
   - Hijacked home page.
   - Computer takes much longer to boot up or shut down.
   - Unexplained and unauthorized charges on your credit card.
   - Extremely slow and frustrating to work on your computer.

What is anti-spyware software?

Anti-spyware software is a program that detects, quarantines and removes
spyware to prevent them from getting into your computer. Examples of anti-
spyware software are Lavasoft Ad-Aware SE Personal, PC Health Plan, and
Malware Scanner.




How to detect and remove spyware?

   www.ppk.kpm.my                                                      < 14 >
Learning Module: ICT and Society

1. Choose an anti-spyware program. In this module we use Lavasoft Ad-Aware
   SE Personal.

2. Click Start, next click All Programs then click Lavasoft Ad-Aware SE
   Personal and then click Ad-Aware SE Personal (Figure 1).




                                    Figure 1

2. Click Start to begin the process (Figure 2).




                                    Figure 2

3. The Preparing System Scan dialogue box will be displayed. Click Next to
   start scanning (Figure 3).


   www.ppk.kpm.my                                                       < 15 >
Learning Module: ICT and Society




                                 Figure 3

4. The program will perform system scanning (Figure 4). During this process,
   the program is detecting and tracking the spywares in your computer.




                                 Figure 4



5. After the scanning completes, the Scan Complete dialogue box will be
   displayed.
   Click Next (Figure 5).


   www.ppk.kpm.my                                                    < 16 >
Learning Module: ICT and Society




                                   Figure 5


6. The program will display all the identified objects to be removed. Select the
   object you wish to delete or quarantine. Click Next (figure 6).




                                   Figure 6



7. The remove confirmation dialogue box will be displayed. Click OK to remove
   the object(s) (Figure 7).




   www.ppk.kpm.my                                                       < 17 >
Learning Module: ICT and Society




                                    Figure 7

8. The object(s) will be removed and the spyware scanning process is
completed.

Assessment

1. Which of the following refers to a spyware program?
   A. It lets you secretly read other people's e-mail.
   B. It blocks advertisements from popping up while you surf the Internet.
   C. It performs tasks on your computer without your consent and control.
   D. It performs scheduled tasks on your computer.

2. Which of the following is a symptom if a computer is infected by
sypware?
   A. Pop-up advertisements will be seen and your computer slows down.
   B. Your web browser contains unwanted additional components.
   C. Your settings have changed (for example, your browser default home
      page) and you cannot change them back to the way they were.
   D. All of the above.

3. Which of the following actions will help to protect your computer
  against spyware?
   A. Using a firewall.
   B. Installing anti-spyware protection.
   C. Only downloading programs from Web sites you trust.
   D. All the above.

4. You may be infected by spyware when you
   A. play music CD.
   B. download programs from sources you don't know.
   C. install new software from a trusted source
   D. all of the above.

Enrichment

How often do you need to scan your personal computer using anti-spyware?
Discuss this with your friend(s). Repeat the above processes to detect spyware
in your computer. Write down the infected objects if any.




   www.ppk.kpm.my                                                        < 18 >
Learning Module: ICT and Society




                    C. CRYPTOGRAPHY


    Situation

    Your brother who is studying abroad needs some money. He asks your
    father to bank in some money into his bank account. He must email his
    account information to you. Your father is worried that someone else may
    obtain this information and commit fraud.

    Discuss :

       i) What is your advice to your father to overcome this matter?

       ii) Apply the correct security procedures to solve this problem.




What is cryptography?

   www.ppk.kpm.my                                                         < 19 >
Learning Module: ICT and Society


Cryptography is a process associated with encryption and decryption. Encryption
is the process of transforming information from an unsecured form (ordinary text,
cleartext or plaintext) into coded information (ciphertext), which cannot be easily
read by outside parties. The transformation process is controlled by an algorithm
and a key. The process must be reversible so that the intended recipient can
return the information to its original, readable form, but reversing the process
without the appropriate encryption information is difficult. This means that details
of the key must also be kept secret.


How to use cryptography?

Cryptography is used when we want to send secured information. We want the
information to be understood by only the recipient.

In order to use cryptography, we need to understand how it works (Diagram 1).


               encryption                           decryption

                     by using                            by using
  Plaintext        Encryption        Ciphertext        Decryption          Plaintext
     (P)          Algorithm and         (C)           Algorithm and           (P)
                    a key (K)                           a key (K)



                                    Diagram 1

Sender will encrypt a message (plaintext) by using an encryption algorithm and a
key. This encrypted message is called ciphertext.
Recipient will decrypt the ciphertext by using decryption algorithm and a key that
is agreed upon. This decrypted ciphertext is called plaintext (message).




   www.ppk.kpm.my                                                          < 20 >
Learning Module: ICT and Society

Let us try a classical cryptography that was used by Julius Caesar during his time
called Caesar Cipher.
               Encryption algorithm: C = (P + K) mod 26 with K = 3

             Decryption algorithm: P = (C € K) mod 26 with K = 3

                            Mod = balance of a
                                 division

1. Before using the algorithm, we need to number the entire alphabet (A      • Z)
   with 0 • 25 in order (Table 2).

                 A     B     C       D     E        F      G    H
                 0     1      2      3     4        5      6     7
                 I     J     K       L     M       N       O     P
                 8     9     10      11   12       13     14    15
                Q      R     S       T     U       V      W      X
                16    17     18      19   20       21     22    23
                 Y     Z
                24    25

                                      Table 2

2. Let us encrypt the phrase ‚ATTACKƒ, with the encryption algorithm given.

 Plaintext      Number            (P + 3) mod 26       Number      Ciphertext
             Representation             =C          Representation
     A             0                 0+3=3                3            D
     T            19                19 + 3 = 22          22            W
     T            19                19 + 3 = 22          22            W
     A             0                 0+3=3                3            D
     C             2                 2+3=5                5            F
     K            10                10 + 3 = 13          13            N

3. Try to decrypt the ciphertext by using the decryption algorithm given.

Ciphertext       Number            (C – 3) mod 26          Number        Plaintext
              Representation             =P             Representation
    D               3                 3€3=0                   0             A
    W              22                22 € 2 = 19             19             T
    W              22                22 € 3 = 19             19             T
    D               3                 3€3=0                   0             A
    F               5                 5€3=2                   2             C
    N              13                13 € 3 = 10             10             K
Assessment

   www.ppk.kpm.my                                                           < 21 >
Learning Module: ICT and Society


1. Encryption and decryption are processes involved in a _______________.

2. An encrypted ordinary text is called _______________.

3. A reversing process to retrieve the message sent is called
   ________________.

4. Decrypt the ciphertext given by using Caeser Cipher.

      ciphertext : ZRUOG

      plaintext: ___________


Enrichment

Create your own cryptography.

1. Develop the encryption and decryption algorithm.

2. Show how your cryptography works by using a table with plaintext heading,
   encryption technique, ciphertext, decryption technique and plaintext.




   www.ppk.kpm.my                                                    < 22 >
Learning Module: ICT and Society




                       D. DATA BACKUP

       Situation

       You have spent one week typing your 24 page long assignment. You
       are worried your data would be lost if something bad happens to your
       computer

          i) How would you ensure the safety and protection of your valuable
              data?

          ii) Apply the correct security procedures to prevent this from
             happening. (skill-based)




What is data backup?
   www.ppk.kpm.my                                                          < 23 >
Learning Module: ICT and Society


A data backup is a duplication of a file, program or disk that can be used if the
original source is lost, damaged or destroyed.

Why do we need to backup data?
It is absolutely critical that you understand when corruption happens, hard disk
drives will fail, motherboards will short out, and data will be erased. Therefore
you will need data backup to ensure your data is saved.

How to backup your file to external storage device

1.     Click My Documents folder (Figure1).




                                      Figure 1




     www.ppk.kpm.my                                                         < 24 >
Learning Module: ICT and Society

2. Highlight file or document from My Documents. For example, document
   “Exercise 1” (Figure 2).




                                       Figure 2

3. Insert a floppy disk (diskette) into your floppy drive. To copy the file to floppy
   disk, click File Menu then click Send to, then click 3 1/2 Floppy ( A: )
   (Figure 3).




                                       Figure 3


   www.ppk.kpm.my                                                             < 25 >
Learning Module: ICT and Society

During this process, your file or document is being copied to the Floppy Disk
(Figure4).




                                     Figure 4


Note

Beside Floppy Disk, you may choose any external storage devices as a
destination such as CD-RW, flash disk, tape or network attach storage, to do your
data backup.

Assessment

1. Read the statements below. Answer T if True and F if False.

   a. We can directly make a data backup without addressing the target or
      destination to be copied
             ______

   b. We can copy a few files at one time during backup                    ___-
      ___

   c. We cannot select more than one folder at one time to do backup
           ______

   d. We can do a few data backup to same destination.
           ______


2. Explain briefly how to prevent the data lost?

   ____________________________________________________________

   ____________________________________________________________

   ____________________________________________________________.


Enrichment

   www.ppk.kpm.my                                                         < 26 >
Learning Module: ICT and Society

Repeat the above steps to backup data from a different folder or location in your
computer. You may backup your data in the same floppy disk or other
destinations in your computer.




                          E. FIREWALL


   Situation

   You are surfing the Internet to do your school assignment. When you want to
   download a file, your computer does not allow it to happen.

   Discuss :

      i) Why does this situation occur?




   www.ppk.kpm.my                                                        < 27 >
Learning Module: ICT and Society

What is Windows Firewall?

A firewall restricts information that comes to your computer from other computers.
It gives you more control over the data in your computer and provides a defence
against people or programs (including viruses and worms) that try to connect to
your computer without invitation.

How to set firewall?

Below is the example of setting up the firewall.

1. Click Start button, then click Control Panel (Figure 1).




                                     Figure 1




   www.ppk.kpm.my                                                         < 28 >
Learning Module: ICT and Society

2.    Click Network and Internet Connections (Figure 2).




                                   Figure 2

3.    Highlight your current Connection. Go to File menu then click Properties.
      Figure 3 is an example of the selected connection.




                                   Figure 3




     www.ppk.kpm.my                                                    < 29 >
Learning Module: ICT and Society

The Network Connection Properties will be displayed (Figure 4).




                                   Figure 4

4.    Click Advanced tab and check protect my computer and network by
      limiting or preventing access to this computer from the internet to
      enable the function (Figure 5).




                                       Figure 5
5. Click OK to complete the process.

     www.ppk.kpm.my                                                    < 30 >
Learning Module: ICT and Society

By doing so, you are enabling a security system that acts as a protective
boundary between a network and the outside world. The Internet Connection
Firewall (ICF) is a firewall software that is used to set restrictions on what
information is communicated from your network computer to and from the
Internet.

Assessment

1. A firewall helps to keep your computer more _______________.               It
   ______________ information that comes to your computer from other
   computers. It gives you more _____________ over the data on your computer
   and provides a line of defense against people or programs (including viruses
   and worms) that try to connect to your computer without invitation.

2. When turned on, firewall will ___________ the connection if any unrecognized
   person on the Internet or a network tries to connect to your computer.

3. A firewall will
      I. help block computer viruses and worms from reaching your computer.
     II. ask for your permission to block or unblock certain connection requests.
    III. detect or disable computer viruses and worms if they are already in your
         computer.
   IV. stop you from opening e-mail with dangerous attachments.

     A.   I and II
     B.   I and III
     C.   II and III
     D.   III and IV




   www.ppk.kpm.my                                                        < 31 >
Learning Module: ICT and Society




                      F.HUMAN ASPECTS

  Situation

  While working on your computer, you discover some of your files missing and
  some altered. You realise that intruders have accessed your computer.


  Discuss :

     i)   Determine the appropriate measures to overcome this threat.

     ii) Apply the correct security procedures to solve this problem.




What is a computer security?

   www.ppk.kpm.my                                                       < 32 >
Learning Module: ICT and Society


A computer security risk is a situation which can cause a loss or damage
computer hardware, software, data, information, or processing capability. Some
breaches to computer security are accidental. Others are planned intrusions. The
people involved are called perpetrators.

Category of perpetrators

Perpetrators of computer crime and other intrusions fall into seven basic
categories:-

 Category             Description
 Hacker               Someone who accesses a computer or network illegally,
                      with advanced computer skills and often claim the intent of
                      their security breaches is to improve security.

 Cracker              Someone who accesses a computer or network illegally,
                      with advanced computer skills but has the intent of
                      destroying data, stealing information, or other malicious
                      action.

 Script Kiddie        Someone who has the same intent as a cracker but does
                      not have the technical skills and knowledge, often
                      teenagers.

 Corporate Spy        Someone who is hired to break into a specific computer
                      and steal its proprietary data and information.

 Unethical            Employees who break into their employers’ computers for
 Employee             a variety of reasons.

 Cyber Extortionist   Someone who uses e-mail as a vehicle for extortion or
                      libeling.

 Cyber Terrorist      Someone who uses the Internet or network to destroy or
                      damage computers for political reasons.




Activity 1


   www.ppk.kpm.my                                                        < 33 >
Learning Module: ICT and Society

Safeguard Against Hardware Theft and Vandalism

Situation

You were asked to check the security measurements in your computer lab by
your teacher. Complete the checklist below. You can add other security
measurement(s).

   No                       Security Measurement                       Check
    1.       Locked Doors
    2.       Locked Windows
    3.       Locked Cabinets
    4.       Locked Grill
    5.       Double Lock
    6.       Alarm System
    7.       School Guard
    8.       Log Book
    9.       Implementing user identification
    10.
    11.
    12.
    13.
    14.
    15.


Activity 2

Safeguard Against Software Theft
Identify the originality of software being used in your computer lab. Complete the
checklist below. You can add other software.

                                                        Original?
   No                       Software
                                                        (Check)
    1.       Server Operating System
    2.       Client operating System
    3.
    4.
    5.
    6.
    7.
    8.
    9.
    10.



Assessment


   www.ppk.kpm.my                                                         < 34 >
Learning Module: ICT and Society

Match the category of perpetrator below with its description.



 Category                                                  Description
                                                Someone who accesses a
                                                computer or network illegally, with
 Cyber                                          advanced computer skills and
 Extortionist                                   often claim the intent of their
                                                security breaches is to improve
                                                security.

                                                Someone who uses the Internet
 Unethical
                                                or network to destroy or damage
 Employee
                                                computers for political reasons.

                                                Someone who has the same
                                                intent as a cracker but does not
 Cyber Terrorist
                                                have the technical skills and
                                                knowledge, often teenagers.

                                                Someone who is hired to break
                                                into a specific computer and steal
 Hacker
                                                its    proprietary   data     and
                                                information.

                                                Employees who break into their
 Cracker                                        employers’ computers for a
                                                variety of reasons.

                                                Someone who uses e-mail as a
 Script Kiddie
                                                vehicle for extortion or libeling.

                                                Someone who accesses a
                                                computer or network illegally, with
                                                advanced computer skills but has
 Corporate Spy                                  the intent of destroying data,
                                                stealing information, or other
                                                malicious action.




   www.ppk.kpm.my                                                         < 35 >
Learning Module: ICT and Society

Module Assessment

You are the president of your school computer club. Your club has successfully
conducted activities in helping teachers and educating the members. As a
respectable club, the club has been given a responsibility to help maintaining the
school computer lab.

Your teacher advisor wants you to help him in exercising an extra precautions in
the security measurement of the school’s computer lab.

Complete the table below with the correct security measurement for the sample
problem.

Problem                                               Security Measurement
Unauthorized password duplication
                                                      Antivirus
Unwanted pop-up windows while surfing the
Internet.
                                                      Data backup
Students accidentally visit pornography site.
                                                      Lock doors and windows




                            CONGRATULATIONS !!

YOU HAVE SUCCESSFULLY COMPLETED THIS MODULE. YOU ARE NOW
ABLE TO APPLY THE NECESSARY SECURITY MEASURES AND PROTECT
YOUR COMPUTER.




   www.ppk.kpm.my                                                         < 36 >
Learning Module: ICT and Society




www.ppk.kpm.my                            < 37 >

More Related Content

What's hot

Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5lisamulka
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesiakorneliszalukhu
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethicsbadak sumbu
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"Yokimura Dimaunahan
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 

What's hot (20)

Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
 
ComTech
ComTechComTech
ComTech
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 

Similar to Module ict society

La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and societyAzmiah Mahmud
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and societyShuren Lew
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyCSCJournals
 
JavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptxJavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptxGrace Jansen
 
Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...
Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...
Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...Jasmin Hami
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)Manuel Mejías
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208Manuel Mejías
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-studyIan Sommerville
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19IRJET Journal
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19IRJET Journal
 

Similar to Module ict society (20)

La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A Survey
 
JavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptxJavaZone_Mother Nature vs Java – the security face off.pptx
JavaZone_Mother Nature vs Java – the security face off.pptx
 
Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...
Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...
Stopping threats with Votiro's Advanced Content Disarm and Reconstruction tec...
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
Windows 8 kasp1248
Windows 8 kasp1248Windows 8 kasp1248
Windows 8 kasp1248
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208
 
Backup
BackupBackup
Backup
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Internet worm-case-study
Internet worm-case-studyInternet worm-case-study
Internet worm-case-study
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 

More from Kak Yong

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Module programming
Module programmingModule programming
Module programmingKak Yong
 
Module info systems
Module info systemsModule info systems
Module info systemsKak Yong
 
Module computer systems
Module computer systemsModule computer systems
Module computer systemsKak Yong
 
Module networks
Module networksModule networks
Module networksKak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programmingKak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaKak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsKak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsKak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyKak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Kak Yong
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Kak Yong
 

More from Kak Yong (20)

Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Module programming
Module programmingModule programming
Module programming
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Module computer systems
Module computer systemsModule computer systems
Module computer systems
 
Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
 

Module ict society

  • 1.
  • 2. INFORMATION AND COMMUNICATION TECHNOLOGY LEARNING MODULE INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY Pusat Perkembangan Kurikulum Kementerian Pelajaran Malaysia 2006
  • 3. Learning Module: ICT and Society 1. What is it? This is a learning module for a specific Learning Outcome as stipulated in the HSP that is : € 1.3 Computer Security 2. Who is it for? This module is for students who are taking the ICT subject as their elective and for those who are interested in ICT. 3. What can be achieved? Upon completion of this module, you should be able to : € identify security threats € know what measurements should be taken to overcome the threats 4. Is previous knowledge necessary? No. The content of this module will enable you to acquire the knowledge. www.ppk.kpm.my < 1 >
  • 4. Learning Module: ICT and Society TOPIC : 1.3 COMPUTER SECURITY SUBTOPIC : 1.3.3 Security measures LEARNING OUTCOMES You should be able to: 1.3.3.3 Apply the correct security procedures. A. Antivirus B. Anti-Spyware C. Cryptography D. Firewall E. Data backup F. Human aspects DURATION : 6 periods www.ppk.kpm.my < 2 >
  • 5. Learning Module: ICT and Society REFERENCES A. Books 1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information Age. Complete. Eight Edition. 2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering Computers 2005 : A Gateway to Information, Course Technology. 3. Stallings W. (2003) Cryptography and Network Security: Principles and Practices. Third Edition. B. Web Addresses 1. Ad-Aware SE Personal ~ http://www.lavasoft.com 2. Antivirus ~ http://www.primode.com/glossary.html 3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf 4. AVG Free Edition Antivirus ~ http://www.grisoft.com 5. Cryptography ~ http://privacy.getnetwise.org/browsing 6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/ 7. Cryptography ~ http://www.shodor.org/interactivate/discussions/cipher.html 8. Cryptography ~ http://www.signalguard.com/security/encryption.htm C. Other sources 1. Windows Help and Support Center. www.ppk.kpm.my < 3 >
  • 6. Learning Module: ICT and Society A. ANTIVIRUS Situation Your computer displays strange behaviour. For instance, you discover that “myhomework.doc” has suddenly been renamed to “myhomework.exe”. Discuss : i) What do you think is the cause of this problem? ii) Determine the appropriate measures to overcome this threat. iii) Apply the correct security procedures to solve this problem. www.ppk.kpm.my < 4 >
  • 7. Learning Module: ICT and Society What is antivirus software? Antivirus software is a program that detects viruses in your computer memory, storage media or incoming files. It will identify, prevent and eliminate computer viruses and other malicious software. Examples of antivirus software are McAfee VirusScan, Norton AntiVirus, Trend Micro PC-cillin, and Doctor Solomon. Why do we need an antivirussoftware? Antivirus software protects a computer against viruses by identifying and removing any computer viruses found. www.ppk.kpm.my < 5 >
  • 8. Learning Module: ICT and Society How do you scan your file? To scan selected area in your personal computer: 1. You may use the antivirus software installed in your computer to scan selected area, disk or the entire computer. In this module we use AVG Free Edition antivirus software. 2. Start the antivirus software by clicking Start then go to All Programs. Next, select AVG Free Edition followed by AVG Free Control Center (Figure 1). Figure 1 www.ppk.kpm.my < 6 >
  • 9. Learning Module: ICT and Society 3. Click Scan Selected Areas (Figure 2). Figure 2 4. Select Drive C: and click Scan Selected Areas (Figure 3). Figure 3 www.ppk.kpm.my < 7 >
  • 10. Learning Module: ICT and Society 5. Scanning process in progress (Figure 4). You may Stop or Pause the process at any time and resume by restarting or reopen the antivirus software. Figure 4 6. During the progress report, you will be notified if your computer is infected (Figure 5). Figure 5 www.ppk.kpm.my < 8 >
  • 11. Learning Module: ICT and Society 7. The program will try to heal the infected file(s) automatically. Dialogue box (Figure 6) will appear if the virus is detected. Click Continue to proceed scanning another file. Figure 6 Table 1 shows the actions of help, Info, Heal, Delete file and Move to Vault buttons. Option Action AVG Free Edition Help – Basic. Proceed with what you are doing and the antivirus will ignore the virus. www.ppk.kpm.my < 9 >
  • 12. Learning Module: ICT and Society Option Action Call up the dialogue with information on the detected virus if available. Heal the infected object if possible. Remove the infected object. www.ppk.kpm.my < 10 >
  • 13. Learning Module: ICT and Society Option Action If you do not want to delete the file, you can quarantine the file by sending it to the AVG Virus Vault. Click Move to Vault. Table 1 8. Figure 7 displays scanning statistics. The virus statistics box shows 1 object is infected. This program will delete the object. Click Close to finish the scanning process. You may also repeat the above process by clicking Scan again. Figure 7 www.ppk.kpm.my < 11 >
  • 14. Learning Module: ICT and Society Assessment 1. Below are steps in scanning antivirus Rearrange them in the correct sequence. a. Scan the selected file b. Choose an antivirus program c. Wait while the program is scanning and the result is produced d. Select file that need to be scanned 2. Antivirus is a software which ______________, _______________ and ______________ computer viruses and other malicious software. 3. Which of the following is an antivirus software? A Microsoft Office B Trend Micro PC-cillin C Windows XP D Microsoft Word Enrichment 1. Repeat the above processes to scan other files or areas in your computer. Write down the infected file name and virus if any. www.ppk.kpm.my < 12 >
  • 15. Learning Module: ICT and Society B. ANTI-SPYWARE Situation While you are surfing the Internet, your computer displays a lot of pop-up windows and disturbs your surfing. Discuss : i) What do you think is the cause of this problem? ii) Determine the appropriate measures to overcome this threat. iii) Apply the correct security procedures to solve this problem. What is spyware? www.ppk.kpm.my < 13 >
  • 16. Learning Module: ICT and Society Spyware is a program placed in a computer without the user’s knowledge that secretly collects information about the user. Spyware can enter a computer as a virus or as a result of a user installing a new program. The spyware program communicates information it collects to others while you are online. Effects and risks € Stealing of confidential data (e.g. passwords) € Violation of privacy € Unsolicited advertising Symptoms of spyware infection The most common symptoms or warning signs of presence of spyware on a system include: - Unusual slowness of the system. - System instability. - Slow Internet connection. - Reception of an unusual amount of spam or junk mail. - Endless pop-ups. - Windows error messages. - Computer crashes with no warning. - Computer screen freezes. - “Blue screen of death”. - Hijacked home page. - Computer takes much longer to boot up or shut down. - Unexplained and unauthorized charges on your credit card. - Extremely slow and frustrating to work on your computer. What is anti-spyware software? Anti-spyware software is a program that detects, quarantines and removes spyware to prevent them from getting into your computer. Examples of anti- spyware software are Lavasoft Ad-Aware SE Personal, PC Health Plan, and Malware Scanner. How to detect and remove spyware? www.ppk.kpm.my < 14 >
  • 17. Learning Module: ICT and Society 1. Choose an anti-spyware program. In this module we use Lavasoft Ad-Aware SE Personal. 2. Click Start, next click All Programs then click Lavasoft Ad-Aware SE Personal and then click Ad-Aware SE Personal (Figure 1). Figure 1 2. Click Start to begin the process (Figure 2). Figure 2 3. The Preparing System Scan dialogue box will be displayed. Click Next to start scanning (Figure 3). www.ppk.kpm.my < 15 >
  • 18. Learning Module: ICT and Society Figure 3 4. The program will perform system scanning (Figure 4). During this process, the program is detecting and tracking the spywares in your computer. Figure 4 5. After the scanning completes, the Scan Complete dialogue box will be displayed. Click Next (Figure 5). www.ppk.kpm.my < 16 >
  • 19. Learning Module: ICT and Society Figure 5 6. The program will display all the identified objects to be removed. Select the object you wish to delete or quarantine. Click Next (figure 6). Figure 6 7. The remove confirmation dialogue box will be displayed. Click OK to remove the object(s) (Figure 7). www.ppk.kpm.my < 17 >
  • 20. Learning Module: ICT and Society Figure 7 8. The object(s) will be removed and the spyware scanning process is completed. Assessment 1. Which of the following refers to a spyware program? A. It lets you secretly read other people's e-mail. B. It blocks advertisements from popping up while you surf the Internet. C. It performs tasks on your computer without your consent and control. D. It performs scheduled tasks on your computer. 2. Which of the following is a symptom if a computer is infected by sypware? A. Pop-up advertisements will be seen and your computer slows down. B. Your web browser contains unwanted additional components. C. Your settings have changed (for example, your browser default home page) and you cannot change them back to the way they were. D. All of the above. 3. Which of the following actions will help to protect your computer against spyware? A. Using a firewall. B. Installing anti-spyware protection. C. Only downloading programs from Web sites you trust. D. All the above. 4. You may be infected by spyware when you A. play music CD. B. download programs from sources you don't know. C. install new software from a trusted source D. all of the above. Enrichment How often do you need to scan your personal computer using anti-spyware? Discuss this with your friend(s). Repeat the above processes to detect spyware in your computer. Write down the infected objects if any. www.ppk.kpm.my < 18 >
  • 21. Learning Module: ICT and Society C. CRYPTOGRAPHY Situation Your brother who is studying abroad needs some money. He asks your father to bank in some money into his bank account. He must email his account information to you. Your father is worried that someone else may obtain this information and commit fraud. Discuss : i) What is your advice to your father to overcome this matter? ii) Apply the correct security procedures to solve this problem. What is cryptography? www.ppk.kpm.my < 19 >
  • 22. Learning Module: ICT and Society Cryptography is a process associated with encryption and decryption. Encryption is the process of transforming information from an unsecured form (ordinary text, cleartext or plaintext) into coded information (ciphertext), which cannot be easily read by outside parties. The transformation process is controlled by an algorithm and a key. The process must be reversible so that the intended recipient can return the information to its original, readable form, but reversing the process without the appropriate encryption information is difficult. This means that details of the key must also be kept secret. How to use cryptography? Cryptography is used when we want to send secured information. We want the information to be understood by only the recipient. In order to use cryptography, we need to understand how it works (Diagram 1). encryption decryption by using by using Plaintext Encryption Ciphertext Decryption Plaintext (P) Algorithm and (C) Algorithm and (P) a key (K) a key (K) Diagram 1 Sender will encrypt a message (plaintext) by using an encryption algorithm and a key. This encrypted message is called ciphertext. Recipient will decrypt the ciphertext by using decryption algorithm and a key that is agreed upon. This decrypted ciphertext is called plaintext (message). www.ppk.kpm.my < 20 >
  • 23. Learning Module: ICT and Society Let us try a classical cryptography that was used by Julius Caesar during his time called Caesar Cipher. Encryption algorithm: C = (P + K) mod 26 with K = 3 Decryption algorithm: P = (C € K) mod 26 with K = 3 Mod = balance of a division 1. Before using the algorithm, we need to number the entire alphabet (A • Z) with 0 • 25 in order (Table 2). A B C D E F G H 0 1 2 3 4 5 6 7 I J K L M N O P 8 9 10 11 12 13 14 15 Q R S T U V W X 16 17 18 19 20 21 22 23 Y Z 24 25 Table 2 2. Let us encrypt the phrase ‚ATTACKƒ, with the encryption algorithm given. Plaintext Number (P + 3) mod 26 Number Ciphertext Representation =C Representation A 0 0+3=3 3 D T 19 19 + 3 = 22 22 W T 19 19 + 3 = 22 22 W A 0 0+3=3 3 D C 2 2+3=5 5 F K 10 10 + 3 = 13 13 N 3. Try to decrypt the ciphertext by using the decryption algorithm given. Ciphertext Number (C – 3) mod 26 Number Plaintext Representation =P Representation D 3 3€3=0 0 A W 22 22 € 2 = 19 19 T W 22 22 € 3 = 19 19 T D 3 3€3=0 0 A F 5 5€3=2 2 C N 13 13 € 3 = 10 10 K Assessment www.ppk.kpm.my < 21 >
  • 24. Learning Module: ICT and Society 1. Encryption and decryption are processes involved in a _______________. 2. An encrypted ordinary text is called _______________. 3. A reversing process to retrieve the message sent is called ________________. 4. Decrypt the ciphertext given by using Caeser Cipher. ciphertext : ZRUOG plaintext: ___________ Enrichment Create your own cryptography. 1. Develop the encryption and decryption algorithm. 2. Show how your cryptography works by using a table with plaintext heading, encryption technique, ciphertext, decryption technique and plaintext. www.ppk.kpm.my < 22 >
  • 25. Learning Module: ICT and Society D. DATA BACKUP Situation You have spent one week typing your 24 page long assignment. You are worried your data would be lost if something bad happens to your computer i) How would you ensure the safety and protection of your valuable data? ii) Apply the correct security procedures to prevent this from happening. (skill-based) What is data backup? www.ppk.kpm.my < 23 >
  • 26. Learning Module: ICT and Society A data backup is a duplication of a file, program or disk that can be used if the original source is lost, damaged or destroyed. Why do we need to backup data? It is absolutely critical that you understand when corruption happens, hard disk drives will fail, motherboards will short out, and data will be erased. Therefore you will need data backup to ensure your data is saved. How to backup your file to external storage device 1. Click My Documents folder (Figure1). Figure 1 www.ppk.kpm.my < 24 >
  • 27. Learning Module: ICT and Society 2. Highlight file or document from My Documents. For example, document “Exercise 1” (Figure 2). Figure 2 3. Insert a floppy disk (diskette) into your floppy drive. To copy the file to floppy disk, click File Menu then click Send to, then click 3 1/2 Floppy ( A: ) (Figure 3). Figure 3 www.ppk.kpm.my < 25 >
  • 28. Learning Module: ICT and Society During this process, your file or document is being copied to the Floppy Disk (Figure4). Figure 4 Note Beside Floppy Disk, you may choose any external storage devices as a destination such as CD-RW, flash disk, tape or network attach storage, to do your data backup. Assessment 1. Read the statements below. Answer T if True and F if False. a. We can directly make a data backup without addressing the target or destination to be copied ______ b. We can copy a few files at one time during backup ___- ___ c. We cannot select more than one folder at one time to do backup ______ d. We can do a few data backup to same destination. ______ 2. Explain briefly how to prevent the data lost? ____________________________________________________________ ____________________________________________________________ ____________________________________________________________. Enrichment www.ppk.kpm.my < 26 >
  • 29. Learning Module: ICT and Society Repeat the above steps to backup data from a different folder or location in your computer. You may backup your data in the same floppy disk or other destinations in your computer. E. FIREWALL Situation You are surfing the Internet to do your school assignment. When you want to download a file, your computer does not allow it to happen. Discuss : i) Why does this situation occur? www.ppk.kpm.my < 27 >
  • 30. Learning Module: ICT and Society What is Windows Firewall? A firewall restricts information that comes to your computer from other computers. It gives you more control over the data in your computer and provides a defence against people or programs (including viruses and worms) that try to connect to your computer without invitation. How to set firewall? Below is the example of setting up the firewall. 1. Click Start button, then click Control Panel (Figure 1). Figure 1 www.ppk.kpm.my < 28 >
  • 31. Learning Module: ICT and Society 2. Click Network and Internet Connections (Figure 2). Figure 2 3. Highlight your current Connection. Go to File menu then click Properties. Figure 3 is an example of the selected connection. Figure 3 www.ppk.kpm.my < 29 >
  • 32. Learning Module: ICT and Society The Network Connection Properties will be displayed (Figure 4). Figure 4 4. Click Advanced tab and check protect my computer and network by limiting or preventing access to this computer from the internet to enable the function (Figure 5). Figure 5 5. Click OK to complete the process. www.ppk.kpm.my < 30 >
  • 33. Learning Module: ICT and Society By doing so, you are enabling a security system that acts as a protective boundary between a network and the outside world. The Internet Connection Firewall (ICF) is a firewall software that is used to set restrictions on what information is communicated from your network computer to and from the Internet. Assessment 1. A firewall helps to keep your computer more _______________. It ______________ information that comes to your computer from other computers. It gives you more _____________ over the data on your computer and provides a line of defense against people or programs (including viruses and worms) that try to connect to your computer without invitation. 2. When turned on, firewall will ___________ the connection if any unrecognized person on the Internet or a network tries to connect to your computer. 3. A firewall will I. help block computer viruses and worms from reaching your computer. II. ask for your permission to block or unblock certain connection requests. III. detect or disable computer viruses and worms if they are already in your computer. IV. stop you from opening e-mail with dangerous attachments. A. I and II B. I and III C. II and III D. III and IV www.ppk.kpm.my < 31 >
  • 34. Learning Module: ICT and Society F.HUMAN ASPECTS Situation While working on your computer, you discover some of your files missing and some altered. You realise that intruders have accessed your computer. Discuss : i) Determine the appropriate measures to overcome this threat. ii) Apply the correct security procedures to solve this problem. What is a computer security? www.ppk.kpm.my < 32 >
  • 35. Learning Module: ICT and Society A computer security risk is a situation which can cause a loss or damage computer hardware, software, data, information, or processing capability. Some breaches to computer security are accidental. Others are planned intrusions. The people involved are called perpetrators. Category of perpetrators Perpetrators of computer crime and other intrusions fall into seven basic categories:- Category Description Hacker Someone who accesses a computer or network illegally, with advanced computer skills and often claim the intent of their security breaches is to improve security. Cracker Someone who accesses a computer or network illegally, with advanced computer skills but has the intent of destroying data, stealing information, or other malicious action. Script Kiddie Someone who has the same intent as a cracker but does not have the technical skills and knowledge, often teenagers. Corporate Spy Someone who is hired to break into a specific computer and steal its proprietary data and information. Unethical Employees who break into their employers’ computers for Employee a variety of reasons. Cyber Extortionist Someone who uses e-mail as a vehicle for extortion or libeling. Cyber Terrorist Someone who uses the Internet or network to destroy or damage computers for political reasons. Activity 1 www.ppk.kpm.my < 33 >
  • 36. Learning Module: ICT and Society Safeguard Against Hardware Theft and Vandalism Situation You were asked to check the security measurements in your computer lab by your teacher. Complete the checklist below. You can add other security measurement(s). No Security Measurement Check 1. Locked Doors 2. Locked Windows 3. Locked Cabinets 4. Locked Grill 5. Double Lock 6. Alarm System 7. School Guard 8. Log Book 9. Implementing user identification 10. 11. 12. 13. 14. 15. Activity 2 Safeguard Against Software Theft Identify the originality of software being used in your computer lab. Complete the checklist below. You can add other software. Original? No Software (Check) 1. Server Operating System 2. Client operating System 3. 4. 5. 6. 7. 8. 9. 10. Assessment www.ppk.kpm.my < 34 >
  • 37. Learning Module: ICT and Society Match the category of perpetrator below with its description. Category Description Someone who accesses a computer or network illegally, with Cyber advanced computer skills and Extortionist often claim the intent of their security breaches is to improve security. Someone who uses the Internet Unethical or network to destroy or damage Employee computers for political reasons. Someone who has the same intent as a cracker but does not Cyber Terrorist have the technical skills and knowledge, often teenagers. Someone who is hired to break into a specific computer and steal Hacker its proprietary data and information. Employees who break into their Cracker employers’ computers for a variety of reasons. Someone who uses e-mail as a Script Kiddie vehicle for extortion or libeling. Someone who accesses a computer or network illegally, with advanced computer skills but has Corporate Spy the intent of destroying data, stealing information, or other malicious action. www.ppk.kpm.my < 35 >
  • 38. Learning Module: ICT and Society Module Assessment You are the president of your school computer club. Your club has successfully conducted activities in helping teachers and educating the members. As a respectable club, the club has been given a responsibility to help maintaining the school computer lab. Your teacher advisor wants you to help him in exercising an extra precautions in the security measurement of the school’s computer lab. Complete the table below with the correct security measurement for the sample problem. Problem Security Measurement Unauthorized password duplication Antivirus Unwanted pop-up windows while surfing the Internet. Data backup Students accidentally visit pornography site. Lock doors and windows CONGRATULATIONS !! YOU HAVE SUCCESSFULLY COMPLETED THIS MODULE. YOU ARE NOW ABLE TO APPLY THE NECESSARY SECURITY MEASURES AND PROTECT YOUR COMPUTER. www.ppk.kpm.my < 36 >
  • 39. Learning Module: ICT and Society www.ppk.kpm.my < 37 >