Uploaded by Anne Santos

REVIEWER LIVING IN THE IT ERA

advertisement
LIVING IN THE IT ERA
MODULE 1: INTRODUCTION TO LIVING IN
THE INFORMATION TECHNOLOGY ERA
OVERVIEW OF ICT
The term TECHNOLOGY presently includes
advancements in communication and how
information is handled, thus enabling
governments, organizations, industries, and
ordinary individuals to improve on their
decision making, business processes and
everyday living.
Information and communication
technology (ICT)
- These are related to technologies that
facilitate the transfer of information and
variou types of electronically mediated
communication (Zuppo, 2012)
ICT Hierarchy by colrain zuppo
SLIDE 6 PICTURE
When do we use the term ICT and how
does it differ from IT?
Information technology
• Pertains to the industry that involves
computers, software, networking, and
other IT infrastructure to help relay or
manage information important in modernday living as seen primarily in large
companies or corporations.
Information communication technology
• Described as using computers and other
digital technologies to assist individuals or
institutions in handling or using
information.
• ICT is technology that supports activities
involving information such as gathering,
processing, storing, and presenting data.
Uses of ICT In Our Daily Lives
• Communication
• Job Opportunities
• Education
• Socializing
Four Basic Periods of Computer History
- PRE- MECHANICAL AGE
- MECHANICAL AGE
- ELECTROMECHANICAL AGE
- ELECTRONIC AGE
THE PRE-MECHANICAL AGE (3,000 BC TO
1450 AD)
WRITING AND ALPHABETS
PAGE 12-13
• At around 2000 BC the Phoenicians
created symbols that expressed single
syllables and consonants (the first true
alphabet)
• Greek adopted the Phoenician alphabet
and added vowels
• Romans gave the letters Latin name to
create the alphabet we use today
PAPER AND PENS
PAGE 15
THE FIRST CALCULATOR
- Abacus- first recorded adding machine.
Invented in Babylonia and popularized in
China.
PAGE 16
MECHANICAL AGE (1450-1840)
First Information Explosion
- Johann Guttenberg; Movable metal type
printing process in 1450.
THE FIRST GENERAL PURPOSE COMPUTERS
• John Napier – (1614) a Baron of
Merchiston, Scotland invented LOGS
(Logarithm).
• LOGS – allows multiplication and division
to be reduce in addition and subtraction.
• 1614 – Arabian Lattice – lays out a special
version of the multiplication tables on a set
of four-sided wooden rods.(multiply, divide
large numbers and find square and cube
root).
PAGE 18
• Wilhelm Shickard – 1623 - (Professor at
University of Tubingen, Germany) –
invented the first mechanical calculator that
can work with six digits and can carries
digits across columns.
• William Oughtred – (1575 – 1660)
invented the slide rule.
PAGE 19
• Blaise Pascal (1642) – invented the
Pascaline. (made of clock gears and levers)
that could solve mathematical problems like
addition and subtraction.
• Gottfried Leibniz – (1617) invented
Stepped Reckoner that could multiply 5
digit and 12 digit numbers yielding up to 16
digit numbers.
• Joseph-Marie Jacquard (1801) developed
the automatic loom (weaving loom) that
was controlled by punched cards.
PAGE 20
• Charles Xavier Thomas de Colmar -1820 –
developed Arithmometer (the first mass
produced calculator).
• Charles Babbage – invented the difference
engine (1821) and analytical engine (1832).
- Father of modern computer.
• Lady Ada Augusta Lovelace Byron – 1842
– the first computer programmer.
PAGE 21
ELECTROMECHANICAL AGE (1840-1940)
* The Beginning of Telecommunications *
• Voltaic Battery – first electric battery
known as voltaic pile.
• Telegraph Samuel F.B. Morse – conceived
of his version of an Electromagnetic
Telegraph (1832)
PAGE 22
TELEPHONE AND RADIO
• Graham Bell – 1879 - developed the first
working telephone.
• Guglielmo Marconi – 1894 – (RADIO)
discovered that electrical waves travel
through space and can produce and effect
far from the point at which it.
PAGE 23
• Dorr Felt – 1885 – devises the
comptometer, a key driven adding and
subtracting calculator.
• Comptograph containing a built-in printer.
PAGE 24
• Herman Hollerith – father of information
processing.
• Punched Card – provided computer
programmers with a new way to put
information into their machines.
• He founded the Tabulating Machine
Company , later became the Computer
Tabulating Recording Company and
International Business Machines
Corporation (IBM)
PAGE 25
Lee de Forest – 1906 – developed vacuum
tubes This is important for it provided
electrically controlled switch.
Computers on the Job
- Computers have become a universal on
the job tool for decision- making,
productivity, and communication.
COMPUTERS ON THE GO
- Consumer Kiosks
- ATM Transactions
- POS Systems at retail stores
- Self- checkout systems
- Portable computers or mobile devices
- M- commerce systems
- GPS Systems
PAGE 26
ELECTRONIC AGE (1941 – PRESENT)
• Konrad Zuse – 1941 – built the first
programmable computer called Z3.
• Howard Aiken – 1942 – developed Mark I
the first stored program computer.
• John Atanasoff and Clifford Berry – 1942 –
completed the first all electronic computer
called ABC or Atanasoff-Berry Computer
MODULE 2: WORLD OF COMPUTERS
COMPUTERS IN THE HOME
- CONVERGENCE
- WIRELESS NETWORKING
- SMART APPLIANCES
- SMART HOMES
COMPUTERS IN EDUCATION
- Many students today have access to
computers either in a classroom or a
computer lab
- Colleges and Universities are even more
integrated.
- Distance Learning
WHAT IS A COMPUTER AND WHAT DOES IT
DO?
Input- use types in the numbers 2 and 5
Processing- Computer adds 2 and 5.
Output- computer displays the results
(output).
Storage- Computer saves data (in this case,
the output) for future use.
GENERATION OF COMPUTERS
VACUUM TUBES (1946-1957)
- Very Expensive
- Very Large
- Used a lot of electrivity
- Generated a lot of heat
- Relied on machine language
- Solve one problem at a time
- Input was based on punched cards and
paper tape
- Output was displayed on printouts
- Unreliable
- Need AC
- Non-portable
- Slow input and output devices
TRANSISTORS (1958-1963)
- Smaller
- More energy- efficient
- More reliable
- Generated a lot of heat
- Still rely on punch cards for input
- Prinouts for output
- Consumed less power
- More compact in size
- More reliable and faster
- Still very costly
- AC Required
INTEGRATED CIRCUITS (1964- 1970)
- smaller in size
- reliable and efficient
- started remote processing, time-sharing,
multi-programming
- high level programming
- generated less heat
- Faster
- Lesser maintenance
- Costly
- AC required
- Lesser electricity
- Keyboards and monitors introduced
MICROPROCESSORS (1971)
- More powerful
- Internet introduced
- Development of GUIs, mouses, and
handheld devices
- very cheap
- Portable and reliable
- Use of PCs
- Very small in size
- No AC required
- Easily available
FIFTH-GENERATION (NOW AND THE
FUTURE)
- Artificial Intelligence
- High level programming
- Ultra large-scale integration (ULSI)
- User-friendly interface
- Multimedia features
- Very powerful
- Cheaper rates
- Still in development
CATEGORIES OF COMPUTERS
EMBEDDED COMPUTERS
- Embedded into a product and designed to
perform specific tasks or functions for that
product.
MOBILE DEVICES
- A very small device with some type of
built-in computing or Internet capability.
PERSONAL COMPUTERS (PCs)
- A small computer designed to be used by
one person at a time.
PORTABLE COMPUTERS
- is a computer designed to be easily moved
from one place to another, as opposed to
those designed to remain stationary at a
single location such as desktops and
workstations.
MIDRANGE SERVERS
- A medium-sized computer used to host
programs and data for a small network.
MAINFRAME COMPUTERS
- Powerful computer used by several large
organizations to manage large amounts of
centralized data.
SUPERCOMPUTERS
- Fastest, most expensive, most powerful
type of computer.
MODULE 3:ELEMENTS OF COMPUTER
SYSTEM AND BASIC COMPUTER
COMPONENTS
HARDWARE
- Computer hardware is the collection of
physical elements that constitutes a
computer system. Computer hardware is
the physical parts or components of a
computer, such as the monitor, mouse,
keyboard, computer data storage, hard disk
drive (HDD), graphic cards, sound cards,
memory, motherboard, and so on, all of
which are physical objects that are tangible.
SOFTWARE
(a) SYSTEM SOFTWARE
(b) APPLICATION SOFTWARE
(c) OPERATING SYSTEM
(d) DEVICE DRIVER
(e) UTILITY SOFTWARE
PEOPLE
- The most important element of a
computer system is its users. They are also
called live-ware of the computer system.
(a) System Analysts
(b) System Programmers
(c) System Operators
PROCEDURES
- Procedure is a step by step series of
instructions to perform a specific function
and achieve the desired output.
(a) Hardware oriented procedure
(b) Software oriented procedure
(c) Internal procedure
DATA
- The facts and figures that are fed into a
computer for further processing are called
data. Data is raw until the computer system
interprets it using machine language, stores
it in memory, classifies it for processing, and
produces results in conformance with the
instructions given to it. Processed and
useful data is called information that is used
for decision making.
CONNECTIVITY
-When two or more computers are
connected, they can share information and
resources such as sharing of files
(data/music, etc.), sharing of the printer,
sharing of facilities like the internet, etc.
This sharing is possible using wires, cables,
satellite, infra-red, Bluetooth, microwave
transmission, etc.
COMPONENTS OF COMPUTER
CASE
-The computer case is a plastic or metal
enclosure that houses most of the
components.
POWER SUPPLY
- A power supply unit (PSU) converts
alternating current (AC) electric power to
low-voltage DC power for the internal
components of the computer. Laptops are
capable of running from a built-in battery,
normally for a period of hours
MOTHERBOARD
- The motherboard is the main component
of a computer. It is a large rectangular
board with integrated circuitry that
connects the other parts of the computer
including the CPU, the RAM, the disk drives
(CD, DVD, hard disk, or any others) as well
as any peripherals connected via the ports
or the expansion slots.
INSIDE THE MOTHERBOARD
- CPU
- RAM
- ROM
- BUSES
- CMOS BATTERY
CPU
- The CPU (Central Processing Unit)
performs most of the calculations which
enable a computer to function and is
sometimes referred to as the “brain” of the
computer. It is usually cooled by a heat sink
and fan. Most new CPUs include an on-die
Graphics Processing Unit (GPU).
RAM
- The Random-Access Memory (RAM) stores
the code and data that are being actively
accessed by the CPU.
READ-ONLY MEMORY (ROM)
- The Read-Only Memory (ROM) stores the
BIOS that runs when the computer is
powered on or otherwise begins execution,
a process known as Bootstrapping, or
“booting” or “booting up”. The BIOS (Basic
Input Output System) includes boot
firmware and power management
firmware.
BUSES
- Buses connect the CPU to various internal
components and to expand cards for
graphics and sound.
CMOS BATTERY
- The CMOS battery is also attached to the
motherboard. This battery is the same as a
watch battery or a battery for a remote to a
car’s central locking system.
EXPANSION CARD
- An expansion card in computing is a
printed circuit board the can be inserted
into an expansion slot of a computer
motherboard or backplane to add
functionality to a computer system vie the
expansion bus. Expansions cards can be
used to obtain or expand on feature not
offered by the motherboard.
INPUT DEVICES
- Input devices allow the user to enter
information into the system or control its
operation.
OUTPUT DEVICES
- Output devices display information in a
human readable form.
INPUT DEVICES
KEYBOARD
- Most common and very popular input
device which helps to input data to the
computer. The layout of the keyboard is like
that a traditional typewriter, although there
are some additional keys provided for
performing additional functions.
MOUSE
- The mouse is the most popular pointing
device. It is a very famous cursor control
device having a palm size box with around a
ball at its base, which senses the movement
of the mouse and sends corresponding
signals to the CPU when the mouse buttons
are pressed.
JOYSTICK
- Is also a pointing device, which is used to
move the cursor position on a monitor
screen. It is a stick having a spherical ball at
its both lower and upper ends. The lower
spherical ball moves in a socket. The
joystick can be moved in all four directions.
MICROPHONE
- The microphone is an input device
to input sound that is then stored in a
digital form. The microphone is used for
various applications such as adding sound
to a multimedia presentation or for mixing
music.
LIGHT PEN
- It is a pointing device similar to a pen. It is
used to select a displayed menu item or
draw pictures on the monitor screen. It
consists of a photocell and an optical
system placed in a small tube.
MAGNETIC INK CARD READER (MICR)
- MICR input device is generally used in
banks as the large numbers of cheques to
be processed every day. The bank's code
number and cheque number are printed on
the cheques with a special type of ink that
contains particles of magnetic material that
are machine-readable.
TRACKBALL
- It is an input device that is mostly used in a
notebook or laptop computer, instead of a
mouse. This is a ball that his half inserted
and by moving fingers on the ball, the
pointer can be moved.
SCANNER
- Scanners an input device, which works
more like a photocopy machine. It is used
when some information is available on
paper and it is to be transferred to the hard
disk of the computer for further
manipulation.
DIGITAL DIGITIZER
- It is an input that waivers analog
information into digital A digitizer can
convert a signal from the television or
camera into a series of numbers that would
be sent to the computer. They can be used
by the computer to create a picture of
whatever the camera had been pointed at.
OPTICAL CHARACTER READER (OCR)
- OCR is an input device used to read a
printed text. OCR scans the text optically,
character by character, converts them into
a chinereadable code, and stores the text
on the system memory.
BAR CODE READERS
- Bar Code Reader is a device used for
reading bar coded data (data in the form of
light and dark lines). Barcoded data is
generally used in labeling goods, numbering
the books, etc. It may be a handheld
scanner or may be embedded in a
stationary scanner.
OPTICAL MARK READER (OMR)
- OMR is a special type of optical scanner
used to recognize the type of mark made by
pea nor pencil. It is used where one out of a
few alternatives is to be selected and
marked.
OUTPUT DEVICES
MONITORS
- Monitors, commonly called as Visual
Display Unit (VDU), are the main output
device of a computer. It forms images from
tiny dots, called pixels that are arranged in a
rectangular form. The sharpness of the
image depends upon the number of pixels.
SECONDARY STORAGE DEVICE- Depending
on whether the second memory device is
part of the CPU or not, there are two types
of secondary memory – fixed and
removable.
FIXED DEVICES
- HARD DISK DRIVE
- CD/DVD DRIVE
CATHOD- RAY TUBE (CRT)
FLAT- PANEL DISPLAY
PRINTERS
- The printer is an output device, which is
used to print information on paper. There
are two types of printers −
• Impact Printers
• Non-Impact Printers
IMPACT PRINTERS:CHARACTER PRINTERS
* DOT MATRIX PRINTER (DMP)
* DAISY WHEEL
IMPACT PRINTERS:LINE PRINTERS
* DRUM PRINTER
* CHAIN PRINTER
NON-IMPACT PRINTERS
- Laser Printers
- Inkjet Printers
SPEAKERS
HEADSETS
PRIMARY STORAGE DEVICE- As primary
memory is expensive, technologies are
developed to optimize its use. These are
broad types of primary memory available.
REMOVABLE DEVICES
- PEN DRIVE/ THUMB DRIVE/ FLASH DISK
- BLU RAY DISK
STORAGE DEVICES
-SSD, MEMORY CARD
MODULE 4: OPERATING SYSTEM
System software: It is designed to run a
computer’s hardware and application
software, and make the computer system
available for use. It serves as the
interface between hardware, application
software, and the user.
Application software: Programs that allow
a user to perform specific tasks on a
computer
Operating system: A collection of programs
that manage and coordinate the activities
taking place within a computer system.
Acts as an intermediary between the user
and the computer.
Functions of an Operating System
▪ Memory Management
▪ Processor Management
▪ Device Management
▪ File Management
▪ Security
▪ Control over system performance
▪ Job accounting
▪ Error detecting aids
▪ Coordination between other software and
users
▪ Interaction with the Operators
in Windows
Differences Among Operating Systems
Command line vs. graphical user interface
(GUI)
▪ Most operating systems use GUI today
MAC OS
▪ Mac OS: Proprietary operating system for
computers made by Apple Corporation
▫ Based on the UNIX operating system;
originally set the standard for graphical
user interfaces
Personal operating system: designed to be
installed on a single computer
▪ Server operating system: designed to be
installed on a network server
▪ Mobile and embedded operating systems
also
exist
Types of processors supported
▫ Desktop, mobile, server, etc. • Number
of processors
▫ 32-bit or 64-bit CPUs
▪ Support for other technologies
▫ New types of buses
▫ Virtualization
▫ Power-saving features
▫ Touch and gesture input
Operating Systems for Personal Computers
and Servers
DOS: Disk Operating System
▫ PC-DOS: Created
originally for IBM
microcomputers
▫ MS-DOS: used with IBMcompatible
computers
▫ DOS traditionally used a
command-line interface
▫ Can enter DOS commands
WINDOWS
▪ Windows: The predominate personal
operating
system developed by Microsoft Corporation
UNIX
▪ UNIX: Operating system developed in the
late
1960s for midrange servers
LINUX
▪ Linux: Version (flavor) of UNIX available
without charge over the Internet
Operating Systems for
Mobile Phones and Other Devices
▪ Windows Mobile: Designed for mobile
phones
▫ Look and feel of desktop versions
▫ Current version 6.1, next version to be
called
Microsoft Phone.
▪ Windows Embedded: Designed for
consumer and
industrial devices that are not personal
computers
▫ Cash register, GPS devices, ATMs, medical
devices and robots.
▫ Windows Automotive and Microsoft Auto
for cars
▪ Android: Linux based OS developed by
Open Handset
Alliance (including Google)
▪ iPhone OS: Designed for Apple Mobile
phones
and mobile devices.
▪ BlackBerry Operating System: Designed
for
BlackBerry devices
▪ Palm OS and Palm webOS: Designed for
Palm
devices
▪ Symbian OS: Designed for use with smart
phones
▪ Embedded Linux: Used with mobile
phones, GPS
devices, and other mobile devices
COMPUTER NETWORK
WHAT IS NETWORK?
- Infrastructure is the
basic underlying
physical structure or
framework needed for
the operation of
a
service or enterprise
.
In the case of
networking,
infrastructure is the
hardware that supports
high
-speed
communications and data
transfer
WHY NETWORK?
- Networks are in wide use
today because they are
practical and useful.
They enable users to
share many things,
including:
▪ Files
▪ Resources
▪ Internet Connections
COMPUTER NETWORK DEVICES
- NETWORK INTERFACE CARD
- REPEATER
- HUB
- BRIDGE
- SWITCH
- ROUTER
- SERVER
- GATEWAY
NETWORK ARCHITECTURE
- CLIENT- SERVER
- PEER- TO- PEER
- PERSONAL AREA NETWORK (PAN)
- LOCAL AREA NETWORK (LAN)
- METROPOLITAN AREA NETWORK (MAN)
- WIDE AREA NETWORK (WAN)
- WIRELESS LAN (WLAN)
- CAMPUS AREA NETWORK (CAN)
WHAT IS CLOUD COMPUTING?
- Cloud computing is a technology that
allows you to access and use computing
resources (such as servers, storage,
databases, and software) over the internet,
rather than on your local computer or data
center. It provides on-demand, scalable,
and often cost-effective services, enabling
businesses and individuals to run
applications and store data without the
need for extensive hardware and
infrastructure investments.
- create web applications to serve business
needs; buy a computer to act as a server
add your files and code.
- you have more problems with managing
more computers:
* network connections
* manage the power
* cool it sufficiently
ADVANTAGES OF CLOUD COMPUTING
❑It offers to all sectors or businesses
❑Ability to use software from any device
via
browser
❑Carry the files and settings to other
devices
❑We can access the services from multiple
devices
❑Back up our files
❑No server space required
❑Better data security
❑Disaster recovery
❑Collaboration is possible
❑Cost saving potential
❑Save storage space on their desktops and
laptops
❑Upgrade software more quickly
CLOUD COMPUTING PROVIDERS
- Microsoft Azure
- Amazon Web Services
- Google Cloud Platform
- IBM Cloud
- Alibaba Cloud
CLOUD COMPUTING GRANT US AMAZING
SCALABILITY
FLEXIBILITY
-flexible
- create hundreds of servers
- delete them all just quickly
- we don't have to manually do the creation
process
- increase the number of resources
- it might reduce the resources to cut costs
BUSINESS CONTINUITY
- If something can happen, it will happen, so
we have to be prepared for the worst.
CLOUD PLATFORMS
- create backups
- Do migrations
- Switch to working copies
CLOUD PROVIDERS
- Create contingency plans
- Compensate you with credits
COST-EFFECTIVENESS
- Cost has a major factor when making
infrastructure decisions.
- Solutions must be cost-effective while
being useful.
CAPITAL EXPENDITURE
- The money you spend on the things that
are bought beforehand as assets.
OPERATIONAL EXPENDITURE (OPEX)
- The money you spend on things you need
while doing the operations.
CLOUD SERVICES
- you only pay for what you use
- when you can't pay for it anymore, the
resources you provisioned will no longer be
accessible to you.
- it is cheaper to use the cloud than buying
your own servers.
CLOUD PROVIDERS
- bought machines by bulk
- they are able to rent it for cheap.
- total cost of cloud
- cost calculators
CLOUD COMPUTING MODELS
- Infrastructure-as-a-Service (IaaS)
- Platform-as-a-Service (PaaS)
- Software-as-a-Service (SaaS)
- Infrastructure-as-a-Service (IaaS)
we get resources at the server level.
Hardware set up. Storage and networking.
Ex: Virtual Machines- Azure VMs & Google
VMs, AWS EC2; Containers- Docker &
Kubernetes
Ex: Application Platforms- Azure App
Service & Heroku: Some Data Processing
Systems- Data bricks
When to use PaaS?
- used when we only want to worry about
our application logic
- Building Web Applications= Just write
code and deploy to the platform and let it
do the rest.
- Data Processing= write the data
processing logic and let the platform worry
about how to run the process.
- Software-as-a-Service (SaaS)
It is software, usually available online, that
is offered as a service for multiple
customers.
When to use IaaS
- Use IaaS when we need direct access to
our machines.
* Customizing a machine- Installing
Software Dependencies & Configurations
* Using A Machine's Full Capacity- Using a
GPU for Graphics Rendering or Machine
Learning
* Migrating Existing Physical Servers- Move
from your existing physical servers and use
the cloud
EX: Office Suites- Micrsoft Office, Google
Workspace; Workflow Apps- Power
Automate & Zapier
Lift-and-Shift
- Lifting the applications from on-premises
servers and transferring them to cloud
servers.
What is Cloud Storage?
- add files
- plugging a USB thumb drive
- How do you store and access files in the
cloud?
- Platform-as-a-Service (PaaS)
A model of cloud computing wherein the
hardware and runtime is already handled
for you by the cloud provider.
When to use SaaS?
- used when you just need ready-made
software
- Online Software= accomplishes things
mostly without coding is typically SaaS
- No Code Software= Creates software
without coding is SaaS as well.
EX:
BLOB STORAGE- for storing files like images,
videos, documents, etc. that are not stored
together with the application
DISK STORAGE- storage disks that are
attached to servers.
FILES SHARES- act as folders and can be
mounted as a folder on your own laptop or
machine.
QUEUES- you can send data to queues and
process the data in sequence afterwards.
MODULE 5: TECHNOLOGY CONSULTING;
CYBERCRIMES
Cyber
- It is the characteristics of the
culture of computers,
information, technology and
virtual reality.
Cybercrime
- Defined as a crime
in which a computer
is the object of the
crime is used as a
tool to commit an
offense.
Republic Act No. 10175 Cybercrime
Prevention Act of 2012
- A law in the Philippines
approved on September
12, 2012 which aims to
address legal issues
concerning online
interactions and internet
Republic Act No. 10173 Data Privacy
Act of 2012
- An act protecting individual
personal information.
COMMON
FORMS OF
CYBERCRIMES
- COPYRIGHT
- PLAGIARISM
- COMPUTER ADDICTION
HACKING
• Infection of IT Systems with Malware – if
the act is committed against critical
infrastructure of the Philippines the,
penalty is between 12-20 years reclusion
temporal
• Six years up to twelve years of
imprisonment also known as prison
mayor.
COMPUTER-RELATED FORGERY, FRAUD
AND/OR IDENTITY THEFT
- Maximum of Php 200,000 fine or
prison mayor
ELECTRONIC THEFT
• Copyright Infringement
• Penalty of Php 50,000 –
500, 000 and or prison
mayor
CYBERBULLYING
- The Anti-Bullying Act of 2013
(RA 10627)
CYBERSEX
- Penalty at least Php 200,000 and or
prison mayor
CHILD PORNOGRAPHY
• Unlawful or prohibited acts defined
and punishable by Republic Act No.
9775 or the AntiChild Pornography
Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of
imprisonment or reclusion temporal
CYBER DEFAMATION
- Penalty of 6-12 years of
imprisonment or prison mayor.
Internet Threats
Hacking- Hacking is a term used to describe
actions taken by someone to gain
unauthorized access to a
computer. The availability of
information online on the tools,
techniques, and malware makes it
easier for even non-technical
people to undertake malicious
activities.
Malware- Malware is one of the more
common ways to infiltrate or
damage your computer. Malicious
software that infects your
computer, such as computer
viruses, worms, Trojan horses,
spyware, and adware.
Pharming- Pharming is a common type of
online fraud. A means to point you
to a malicious and illegitimate
website by redirecting the
legitimate URL. Even if the URL is
entered correctly, it can still be
redirected to a fake website.
Phishing- Phishing is used most often by
cyber criminals because it's easy
to execute and can produce the
results they're looking for with
very little effort.
Ransomware- Ransomware is a type of
malware
that restricts access to your
computer or your files and displays a
message that demands payment in
order for the restriction to be
removed.
Spam- The mass distribution of
unsolicited messages, advertising
or pornography to addresses
which can be easily found on the
Internet through things like social
networking sites, company
websites and personal blogs.
Spyware (Spyware & Adware)- Software
that collects personal
information about you without you
knowing. They often come in the
form of a ‘free' download and are
installed automatically with or
without your consent. These are
difficult to remove and can infect
your computer with viruses.
Trojan Horses- A malicious program that is
disguised as, or embedded within,
legitimate software. It is an
executable file that will install
itself and run automatically once
it's downloaded.
Viruses- Malicious computer programs that
are often sent as an email
attachment or a download with the
intent of infecting your computer,
as well as the computers of
everyone in your contact list. Just
visiting a site can start an
automatic download of a virus.
Wi-Fi Eavesdropping- WiFi eavesdropping is
another method used by cyber criminals to
capture personal information. Virtual
“listening in” on information
that's shared over an unsecure (not
encrypted) WiFi network.
Worms- A worm, unlike a virus, goes to
work on its own without attaching
itself to files or programs. It lives
in your computer memory, doesn't
damage or alter the hard drive and
propagates by sending itself to
other computers in a network.
Which is more valuable?
DATA THAN MONEY
"Data is more valuable than Money. If
someone takes
your money, that's all they have. if you let
someone
take your data, they may eventually take
your money
too."
from former Deputy Privacy Commissioner
Dondi Mapa
What is the Republic Act # for
Data Privacy ?
-DATA PRIVACY
Republic Act 10173
AN ACT PROTECTING INDIVIDUAL
PERSONAL INFORMATION IN
INFORMATION AND COMMUNICATIONS
SYSTEMS IN THE
GOVERNMENT AND THE PRIVATE SECTOR,
CREATING FOR THIS
PURPOSE A NATIONAL PRIVACY
COMMISSION, AND FOR OTHER PURPOSES
Data Privacy Act of 2012
The National Privacy Commission (NPC) is a
body that is mandated to administer and
implement this law. The functions of the
NPC
include:
** rulemaking
** advisory
**public education
**compliance and monitoring
**investigations and complaints
**enforcement
What is the definition of a data subject
under
the Data Privacy Act of 2012?
A. An individual who provides personal
information to a personal information
controller
B. A government agency that collects
personal
information for public records
C. An organization that collects personal
information from its employees
Know your Data Privacy Rights
Under RA10173, people whose personal
information
is collected, stored, and processed are
called data
subjects. Organizations that deal with your
personal
details, whereabouts, and preferences are
dutybound to observe and respect your
data privacy
rights.
If you feel that your personal data has been
misused, maliciously disclosed or
improperly
disposed of, or if any of the rights discussed
here
have been violated, the data subject has the
right to
file a complaint.
Limitation on Rights
The provisions of the law regarding
transmissibility
of rights and the right to data portability
will not
apply if the processed personal data are
used only
for the needs of scientific and statistical
research
and based on such, no activities are carried
out and
no decisions are taken regarding the data
subject.
There should also be an assurance that the
personal
data will be held under strict confidentiality
and
used for the declared purpose.
They will not also apply to the processing of
personal data gathered for investigations in
relation
to any criminal, administrative, or tax
liabilities of a
data subject. Any limitations on the rights of
the
data subject should only be to the minimum
extent
necessary to achieve the purpose of said
research or
investigation.
Imprisonment: NOTEBOOK
Download