Full Transcript

LIVING IN THE IT ERA POSITIVE IMPACTS OF ICT INTRODUCTION TO INFORMATION AND Access to information COMMUNICATION TECHNOLOGY Improved education...

LIVING IN THE IT ERA POSITIVE IMPACTS OF ICT INTRODUCTION TO INFORMATION AND Access to information COMMUNICATION TECHNOLOGY Improved education New tools and opportunities Communication INFORMATION AND COMMUNICATION Improved Security TECHNOLOGY (ICT) The infrastructure and components that NEGATIVE IMPACTS OF ICT enable modern computing. Refers to all the technology used to Job loss handle telecommunications, broadcast Reduced personal interaction media, intelligent building management Reduced physical activity systems, etc. Cost Competition USE OF ICT IN OUR DAILY LIVES COMMUNICATION 1. Instant messaging EMERGING TECHNOLOGY – Is a term 2. Eay information sharing generally used to describe a new technology or 3. Multiple communication formats the continuing development of an existing (e.g. video calls, text, etc.) technology. JOB OPPORTUNITES 1. Online Job Portals (e.g. LinkedIn, Indeed, etc.) INTERNET OF THINGS (IoT) - refers to 2. Skill Development everyday objects that are connected to the 3. Job automation (e.g. software internet, allowing them to send and receive data development, IT support, etc.) (e.g. Smart home devices, wearables, and 4. Allows employees more time to connected cars). concentrate on areas of their job role that require soft skills. EDUCATION ROBOTICS – It is an interdisciplinary sector of 1. Online Learning science and engineering dedicated to the design, 2. Digital Resources construction, and use of mechanical robots. 3. Interactive Learning (e.g. Educational Apps, games, etc.) 4. Collaboration ROBOTIZATION – Is automating tasks using SOCIALIZING a machine that can perform complex and/or 1. Social Media Platforms repetitive tasks automatically (e.g. 2. Video Calls Manufacturing, healthcare, self-driving vehicles, 3. Online Communities etc.). 3D PRINTING (Additive Manufacturing) - Is COMPUTER – An electronic device that a process of making three dimensional solid manipulates information or data. It can store, objects from a digital file built in a CAD model. retrieve, and process data. ARTIFICIAL INTELLIGENCE - Is the APPLICATION OF ICT (OR COMPUTER) simulation of human intelligence processes by IN OUR DAILY LIVES machines, especially computer systems. These processes include learning, reasoning, and self- In healthcare, it makes it easier to store correction. and access patient data or complex information. It can be used to buy and sell products online. Can be used for trading. USES OF ARTIFICIAL INTELLIGENCE Government departments use computers Virtual Assistants to improves the quality of their services Chatbots (e.g. city planning, law enforcement, Self-driving cars etc.). Facial recognition In science, computers can be used for Personalized learning research, sharing information with other specialists. In banking, computers can be used to AUTOMATION – Is a method to control or check your balance or transfer money. operate a process, system, or device without continuous human involvement. Can be used to mimic previously human-exclusive tasks. HISTORY OF COMPUTERS TALLY STICKS – An ancient memory aid device to record and document CRYPTOCURRENCIES – A type of digital or numbers, quantities, or even messages. virtual money that uses technology called ABACUS – Is a mechanical device used blockchain to secure transactions (It exists only to aid an individual in performing online and operates independently, not mathematical calculations. controlled by the government). NAPIER’S BONES – Invented by Jon Napier in 1614, Allowed the operator to multiply, divide and calculate square and VOICE RECOGNITIONS - The ability of a cube roots by moving the rods around machine or program to receive and interpret and placing them in specially carry out spoken commands. constructed boards. SLIDE RULE – Invented by William Oughtred in 1622, used primarily for AUTONOMOUS VEHICLE - Are robotic multiplication, division, root, etc. (not vehicles that are designed to travel between normally used for addition and destinations without a human operator. subtraction). PASCALINE – Invented by Blaise Pascal in 1642, it was its limitation to DRONES – Unmanned aircraft. They are addition and subtraction. controlled remotely. STEPPED RECKONER – Invented by Mauchly. It was the first electronic Gottfried Wilhelm Leibniz in 1672. The general-purpose computer. machine that can add, subtract, multiply, UNIVAC 1 – UNIversal Automatic and divide automatically. Computer 1. The first commercial JACQUARD LOOM – A mechanical computer. loom invented by Joseph-Marie EDVAC – Electronic Discrete Variable Jacquard in 1881. It is an automatic Automatic Computer. The first stored loom controlled by punched cards. program computer. It can store program ARITHMOMETER – A mechanical and data. calculator invented by Thoms De OSBORNE 1 – The first portable Colmar in 1820. The first reliable, computer. useful, and commercially successful ELECTRONIC CONTROLS calculating machine. COMPANY – The first computer DIFFERENCE ENGINE AND company. Founded by John Presper ANALYTICAL ENGINE – An Eckert and John Mauchly automatic, mechanical calculator designed to tabulate polynomial functions, Invented by Charles Babbage GENERATIONS OF COMPUTER in 1822 and 1834. The first computer. AUGUSTA ADA BYRON (The first computer programmer) – Suggested to FIRST GENERATION (1946 - 1958) Babbage that he use binary system. She writes programs for analytical engine. First generation computers relied on SCHEUTZIAN CALCULATION machine language, the lowest-level ENGINE – Invented by Per Georg programming language understood by Scheutz in 1843. The first printing computers. They could only solve one calculator. problem at a time. TABULATING MACHINE – Invented by Herman Hollerith in 1890. To assist in summarizing information and SECOND GENERATION (1959 – 1964) accounting. Moved from cryptic binary machine HARVARD MARK 1 - Also known as language to symbolic or assembly IBM Automatic Sequence Controlled language which allowed programmers to Calculator (ASCC). Invented by specify instructions in words. Howard H. Aiken in 1943. Z1 – The first programmable computer. computer. Created by Konrad Zuse in Germany from 1936 to 1938. THIRD GENERATION (1965 – 1970) ATANASOFF-BERRY COMPUTER Transistors were miniaturized and (ABC) - It was the first electronic digital placed on silicon chips, called computing device. Invented by semiconductors, which drastically Professor John Atanasoff and Clifford increased the speed and efficiency of Berry. computers. ENIAC – Stands for Electronic Numerical Integrator And Computer. Developed by John Presper and John FOURTH GENERATION (1971 - TODAY) OFFLINE IDENTITY – Your identity that interacts one a regular basis at home, school or The microprocessor brought the fourth work. generation of computers, as thousands of integrated circuits were built onto a ONLINE IDENTITY – Your identity in single silicon chip. cyberspace. Should only reveal limited information about you. INDUSTRIAL REVOLUTION - is the process of change from an agrarian and handicraft WHY DO CYBER CRIMINALS WANT economy to one dominated by industry and YOUR IDENTITY? machine manufacturing. Long term profits FIRST INDUSTRIAL Medical benefits REVOLUTION File of fake tax return (MECHANIZATION) – Steam engine, Open or use of credit card accounts Cotton Gin, etc. Open loans SECOND INDUSTRIAL REVOLUTION (ELECTRIFICATION) – Combustion TYPES OF ORGANIZATIONAL DATA Engine, Bessemer Process, Chemical Synthesis. THIRD INDUSTRIAL TRADITIONAL DATA REVOLUTON (AUTOMATION AND GLOBALIZATION) – Digitalization, Includes personnel information programmable logic controller, etc. Application materials FOURTH INDUSTRIAL Payroll REVOLUTION (DIGITALIZATION) Offer letters – Internet of Things. FIFTH INDUSTRIAL INTERNET OF THINGS REVOLUTION Sensor (PERSONALIZATION) – Robots, Biometrics artificial intelligence. Face apps Eye sensor Tik Tok HUMAN MACHINE INTERACTION (HMI) - the interaction and communication between human users and a machine, a dynamic technical ATTACKERS – Individuals or groups who system, via a human-machine interface. attempt to exploit vulnerability for personal or financial gain. CYBER SECURITY CYBER SECURITY – Is protection of networked system and data from unauthorized use or harm. TYPES OF ATTACKERS TYPES OF MALWARE AMATEURS – Called Script Kiddies. Attackers with little to no skill, often use existing tools or SPYWARE – Designed to track and spy on the instructions found on the internet to launch user. attacks. ADWARE – Advertising supported software is HACKERS – This group of attackers break into designed to automatically deliver computers or networks to gain access. advertisements. WHITE HAT HACKERS – Breaks BOT – From the word robot, a bot is a malware into networks to discover weaknesses so designed to automatically perform action, that the security of these systems can be usually online. improved. BLACK HAT HACKERS – Take RANSOMWARE – Is designed to hold a advantage of any vulnerability for illegal computer system or data it contains captive until personal, financial, or political gain. a payment is made. GREY HAT HACKERS – Somewhere SCAREWARE – Designed to persuade the user between white and black hat hackers. to take a specific action based on fear. ORGANIZED HACKERS – These hackers include organizations of cyber ROOTKIT – Designed to modify the operating criminals, hacktivists, terrorists, and system to create a backdoor to access the state-sponsored hackers. computer. VIRUS – A malicious executable code that is attached to other executable files, often legitimate programs. FINDING SECURITY VULNERABILITIES TROJAN HORSE – Malware that carries out malicious operations under the guise of a desired operation. SECURITY VULNERABILITIES – Any kind of software or hardware defect. WORMS – Malicious code that replicate themselves by independently exploiting EXPLOIT – Used to describe a program written vulnerabilities in networks. to take advantage of a known vulnerability. MAN-IN-THE-MIDDLE (MitM) – Allows the ATTACK – The act of using exploit. attacker to take control over a device without the SOFTWARE VULNERABILITIES – Usually user’s knowledge. Attackers can capture user introduced by errors in the operating systems. information before relaying it to its intended destination. HARDWARE VULNERABILITES – Often introduced by hardware design flaws. SYMPTOMS OF MALWARE Files are modified File are deleted Unexplainable problems with network connections. Presence of unknown files. SOCIAL ENGINEERING – An access attack that attempts to manipulate individuals into performing actions or divulging confidential information. Pretexting – lie Tailgating – follow Something for something – exchange Brute-force attacks – tries several possible passwords. Network sniffing – listening and capturing packets.

Use Quizgecko on...
Browser
Browser