Pointers to Review (GEC ELEC 1) PDF

Summary

This document contains reviewer notes on computers, their uses, classification, functions, capabilities, and limitations. It also provides a timeline of the internet. The document is suitable for undergraduate students.

Full Transcript

MARY ANGELINE G. GOMEZ (BSHM 4B) POINTERS TO REVIEW (GEC ELEC 1) 6. Disadvantages (-of using the computer) A. Computer (MODULE 1)...

MARY ANGELINE G. GOMEZ (BSHM 4B) POINTERS TO REVIEW (GEC ELEC 1) 6. Disadvantages (-of using the computer) A. Computer (MODULE 1) The use of computers also presents some danger for people and the environment: 1. Uses of computers 2. Computer classification 1. Safety 2. Health risks 3. Environment 4. Use of power 5. Privacy violations 7. Computer system Elements and components 2. Computer classification 3. Functions ▪ A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system. (What is a computer?) ▪ Computers can perform four general operations, which comprise the information processing cycle. (What Does A Computer Do?) FOUR FUNCTIONS OF COMPUTER: ▪ Input - Output ▪ Process - Storage B. Web (MODULE 2) 1. Internet timeline (Timeline of the Internet) 4. Capabilities (Computer Capabilities) 1965 - Lawrence Roberts and Thomas Merril communicate with one another using computers 1. Ability to perform certain logic operations connected via a low-speed dial-up telephone line in Massachusetts and California, creating the 2. Ability to provide new time dimensions first Wide Area Network and laying the groundwork for the internet. 3. Ability to store and retrieve information 1969 - ARPAnet, the first version of the internet, is created and used to link computers at UCLA 4. Ability to control errors and Stanford. 5. Ability to check itself 1974 - Robert Kahn and Vinto Cerf publish "A protocol for Packet Network Communication" laying the groundwork for TCP/IP and much larger, interconnected computer networks. The 5. Limitations (Computer Limitations) word "internet"is first used. 1. Dependence on prepared instructions 1986 - NSFNET is founded, creating the backbone and providing the investment needed to 2. Inability to derive meanings from objects create the internet as we know it today. 3. Inability to generate information 1989 - The first commercial ISP, the world launches. 4. It cannot correct wrong instructions 1989 - Tim Berners-Lee invents the world wide web, which opens the door for the internet to go mainstream. 1993 - The first web browser available to the public, Mosaic launches. 1 MARY ANGELINE G. GOMEZ (BSHM 4B) 1994 - Netscape navigator is released in stores. Dynamic page 2000 - Some 300 million people around the world are officially online. 2004 - Facebook launches and the Web 2.0 begins to grow rapidly. Refers to a webpage that are affected by the user input or preference. 2007 - The iPhone is released, giving rise to the mobile revolution. ▪ Web 2.0 – is focused on the ability for the people to collaborate and share information online via social 2010 - 1.966 billion people are online worldwide. media. Blogging and web based communities. 2022 - 5 billion people are online Example of Web 2.0 2. Web browser timeline 1990 – Start A. A Social Networking Websites 1992 - Lynx (Text-based; no graphic content) ▪ Is the use of internet based social media sites to stay connected with friends families, colleagues, 1993 - Mosaic (Images imbedded in text; "world's first popular browser") customers, clients. Social networking can have a social purpose, business purpose or both. 1994 - Netscape Navigator (Replaced Mosaic) Examples: Facebook, Twitter, Instagram, Skype. LinkedIn, SlideShare, Tumblr, YouTube. 1995 - Internet Explorer (Microsoft's first web browser) B. Blogs 1996 – Opera ▪ a discussion or informal website published on the world wide web consisting of discrete, often 2000 – Stop informal diary-style text entries (posts). Post are typically displayed in reverse chronological order so the most recent post appears first, at the top of the webpage 2003 - Safari (Apple's signature browser) C. Wikis 2004 - Mozilla Firefox ▪ a hypertext publication collaboratively edited and managed by its own audience directly using a web 2008 - Google Chrome (Took over the browser market) browser. A typical wiki contains multiple pages for the subjects or scope of the project and may be 2015 – Microsoft Edge either open to the public or limited to use within an organization for maintaining its internal NOW - Fulldive Browser (World's first social browser) knowledge base. Example: Wikipedia, WikiAnswers, Wiki Wiki, Wikispaces, MediaWiki 3. Web 1-3 D. Video Sharing WEB 1.0 ▪ is a website that lets people upload and share their video clips with the public at large or two invited An old internet that only allows people to read from the internet. First stage worldwide linking web guest. pages and hyperlink. Web is use as information portal. It uses table to positions and align elements on Example: YouTube, Vimeo, TikTok page. most read only web. It focused on company's homepages. Key features of WEB 2.0 Dividing the worldwide web into usable directories It means web is use as information portal - Folksonomy It started with the simple idea - Rich user interface - User participation Disadvantage of web 1.0 - Long tail WEB 3.0 (READ – WRITE INTELLIGENT WEB) 1. Read only web 2. Limited user interaction 3. Lack of standards ▪ suggested name by John Markoff of the New York times for the third generation of the web. ▪ in this generation all the applications on web or mobile will be upgraded with more features. It applies WEB 2.0 (READ WRITE INTERACTIVE WEB) same principles as web 2.0 two way interaction ▪ a term used to describe a new generations of web services and applications with an Increasing emphasis ▪ web 3.0 will be more connected, open and intelligent, with semantic web technologies , distributed on human collaboration databases, natural language processing, machine learning, machine reasoning, and autonomous agent. ▪ it is a platform that gives the users the possibility (liberty) to control their data. ▪ this is about the user-generated content and the read-write web ▪ people are consuming as well as contributing information through blogs or sites. ▪ allows the user to interact with the page known as DYNAMIC PAGE; instead of just reading A page, the user may be able to comment or create a user account. 2 MARY ANGELINE G. GOMEZ (BSHM 4B) Examples of web 3.0 (OPEN, TRUSTLESS, PERMISSIONLESS) Types of e-commerce There are 6 basic types of e-commerce: 1. Business-to-Business (B2B) - Business-to-Business (B2B) e-commerce encompasses all electronic transactions of goods or services conducted between companies. Producers and traditional commerce wholesalers typically operate with this type of electronic commerce. 2. Business-to-Consumer (B2C) - The Business-to-Consumer type of e-commerce is distinguished by the establishment of electronic business relationships between businesses and final consumers. It corresponds to the retail section of e- commerce, where traditional retail trade normally operates. 3. Consumer-to-Consumer (C2C) - Consumer-to-Consumer (C2C) type e-commerce encompasses all electronic transactions of goods or services conducted between consumers. Generally, these transactions are conducted through a third party, which provides the online platform where the transactions are actually carried out. 4. Consumer-to-Business (C2B) - In C2B there is a complete reversal of the traditional sense of exchanging goods. This type of e-commerce 4. E-commerce is very common in crowdsourcing based projects. A large number of individuals make their services or 1. E- COMMERCE WEBSITE products available for purchase for companies seeking precisely these types of services or products. ▪ It is a website people can directly buy products from you’ve probably used a number of e commerce websites before, most big brands and plenty of smaller ones 5. Business-to-Administration (B2A) ▪ A customer finds the website, then buys goods and services. When they’ve decided they’re done online - This part of e-commerce encompasses all transactions conducted online between companies and public shopping, they move to the checkout phase. administration. This is an area that involves a large amount and a variety of services, particularly in areas ▪ Following the website’s checkout process, the buyer provides the necessary payment and shipping such as fiscal, social security, employment, legal documents and registers, etc. These types of services information have increased considerably in recent years with investments made in e-government. How e Commerce works? 6. Consumer-to-Administration (C2A) - The Consumer-to-Administration model encompasses all electronic transactions conducted between individuals and public administration. Examples of applications include: Education – disseminating information, distance learning, etc. Social Security – through the distribution of information, making payments, etc. Taxes – filing tax returns, payments, etc. Health – appointments, information about illnesses, payment of health services, etc. 3 MARY ANGELINE G. GOMEZ (BSHM 4B) Advantages of Ecommerce C. Computer Crimes (MODULE 3) 1. The main advantage of e-commerce is its ability to reach a global market, without necessarily implying a CYBER CRIME large financial investment. 2. By allowing direct interaction with the final consumer, e-commerce shortens the product distribution Defined as unlawful acts committed by using the computer as a tool or as a target or as both. Cyber crimes chain, sometimes even eliminating it completely. can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and 3. E-commerce allows suppliers to be closer to their customers. mischief. 4. Cost reduction is another very important advantage normally associated with electronic commerce. 1. Cybercrimes Categories Disadvantages of e-commerce CYBERCRIME CAN BE CATEGORIZED Strong dependence on information and communication technologies (ICT); Lack of legislation that adequately regulates the new e-commerce activities, both nationally and 1. Unauthorized Access: Access means gaining entry into, instructing or communicating with the logical, internationally; Market culture is averse to electronic commerce (customers cannot touch or try the arithmetical, or memory function resources of a computer, computer system or computer network. products); 2. Hacking & Cracking: Every act committed towards breaking into a computer and/or network is hacking. The users’ loss of privacy, the loss of regions’ and countries’ cultural and economic identity; Hackers write or use ready-made computer programs to attack the target computer. Insecurity in the conduct of online business transactions. 2. Types of hackers There are generally 10-types of Hackers 2. BUSINESS WEBSITE 1. White Hat Hackers: White hat hackers are the one who is authorized or the certified hackers who Is a website that’s devoted to representing a specific business. It should be branded like the business (same logo and work for the government and organizations by performing penetration testing and identifying positioning) and communicate types of products and / or services offers. loopholes in their cybersecurity. 2. Black Hat Hackers: They are often called Crackers. Black Hat Hackers can gain the unauthorized 3. ENTERTAINMENT WEBSITE access of your system and destroy your vital data. 3. Gray Hat Hackers: Gray hat hackers fall somewhere in the category between white hat and black Primarily, the entertainment website is intended to entertain its visitors, so it is based on providing entertainment hat hackers. They are not legally authorized hackers information, pictures, and interactive online services. 4. Script Kiddies: They are the most dangerous people in terms of hackers. 5. Green Hat Hackers: They are also amateurs in the world of hacking but they are bit different from 4. PORTFOLIO WEBSITE script kiddies 6. Blue Hat Hackers: They are much like the white hat hackers Sites devoted to shown examples of past work. Service providers who want to show potential clients the quality of 7. Red Hat Hackers: They are also known as the eagle-eyed hackers the work they provide can use a portfolio. 8. State/Nation Sponsored Hackers: State or Nation sponsored hackers are those who are appointed by the government 5. MEDIA WEBSITE 9. Hacktivist: These are also called the online versions of the activists 10. Malicious Insider or Whistleblower: A malicious insider or a whistleblower could be an employee Collect news or stories or other reporting. There are some overlap here with entertainment website, but media of a company or a government agency with a grudge or a strategic employee websites are more likely to include reporting pieces in addition to or instead of content meant purely for entertainment. 3. Cyber Fraud/Online Fraud: 6. BROCHURE WEBSITE Internet fraud involves using online services and software with access to the internet to defraud or take advantage A simplified form of business websites. For businesses that know they need an online presence, but don’t want to of victims. The term "internet fraud" generally covers cybercrime activity that takes place over the internet or on invest a lot into it (maybe you are confident youll continue to get most of your business from other sources) email, including crimes like identity theft, phishing, and other hacking activities designed to scam people out of money. 4 MARY ANGELINE G. GOMEZ (BSHM 4B) Cyber fraud is an increasingly prevalent issue in the digital age. In the Philippines, this form of deception is COMPUTER VIRUSES: criminalized under various statutes, notably the Cybercrime Prevention Act of 2012 (Republic Act No. 10175), and the Electronic Commerce Act of 2000 (Republic Act No. 8792). TROJANS: The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. A Trojan Horse Virus is a type of malware that downloads The net is a boon for people to conduct business effectively, very quickly. Net is also an open invitation to fraudsters onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use and online frauds are becoming increasingly out of control. social engineering to hide malicious code within legitimate software to try and gain users' system access with their software. Types of attack: HISTORY OF THE TROJAN HORSE 1. Spoofing of phishing websites and email security alerts - Fraudsters create authentic looking websites that are actually nothing but a spoof. The purpose of these websites is to make the user enter personal information. The original story of the Trojan horse can be found in the Aeneid by Virgil and the Odyssey by Homer. In 2. Virus hoax emails - It is a sad fact of life that there are those who enjoy exploiting the concerns of others. the story, the enemies of the city of Troy were able to get inside the city gates using a horse they pretended Many emailed warnings about viruses are hoaxes, designed purely to cause con-cern and disrupt businesses. was a gift. The soldiers hid inside the huge wooden horse and once inside, they climbed out and let the 3. Lottery Frauds - These are letters or emails, which inform the recipient that he/ she has won a prize in a lottery. other soldiers in. 4. Credit Card Fraud - Online Transaction has become a normal thing in day to-day life. Knowingly or unknowingly passing credit card information over internet can land you in trouble. There are a few elements of the story that make the term “Trojan horse” an appropriate name for these types of cyber-attacks: 4. Cyber Theft: The Trojan horse was a unique solution to the target’s defenses. Stealing of financial and/or personal information through the use of computers for making its fraudulent or other illegal use. The Trojan horse appeared to be a legitimate gift Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and The soldiers in the Trojan horse controlled the city’s defense system. other benefits. WORMS: Programs that multiply like viruses but spread from computer to computer. Identity Theft: Identity theft occurs when someone appropriates another’s personal information without their knowledge to commit theft or fraud. Identity theft is a vehicle for perpetrating other types of fraud To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a schemes. Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems. Theft of Internet Hours Once a computer worm has breached your computer’s defenses it can perform several malicious actions: Theft of computer system (Hardware) Drop other malware like spyware or ransomware 5. Cyber Terrorism Consume bandwidth Cyber terrorism is an attractive option for modern terrorists for several reasons. Delete files Overload networks 1. It is cheaper than traditional terrorist methods. Steal data 2. Cyberterrorism is more anonymous than traditional terrorist methods. Open a backdoor 3. The variety and number of targets are enormous. Deplete hard drive space 4. Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists. 5. Cyber terrorism has the potential to affect directly a larger number of people. Logical bombs are event dependent programs. This implies that these programs are created to do 6. Flowing of Virus, Trojan horse, Worm & Logical Bombs. something only when a certain event (known as a trigger event) occurs. A logic bomb is a set of instructions in a program carrying a malicious payload that can attack an operating system, program, or network. It only goes off after certain conditions are met. A simple example of these conditions is a specific date or time. A more complex example is when an organization fires an employee and logs their dismissal in their system. 5 MARY ANGELINE G. GOMEZ (BSHM 4B) 7. Cyber Pornography 11. Spamming ‘Pornography’ is “describing or showing sexual acts in order to cause sexual excitement through books, films, etc.” Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people This includes pornographic websites; pornographic material produced using computers and use of internet to who would not otherwise choose to receive it. Most spam is commercial advertising. For ex. get-rich-quick schemes. download and transmit pornographic videos, pictures, photos, writings etc. There are more than 420 million individual pornographic webpages today. Child pornog-raphy is a very unfortunate reality of the Internet. The Stealth Polymorphic Armored Multi- Partite Virus Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. HOW DOES A MULTIPARTITE VIRUS INFECT A DEVICE? 8. Defamation Two different kinds of infectors are used in the attack Defamation can be understood as the intentional in-fringement of another person’s right to his good name. Defamation can be understood as tarnishing the image, respect or dignity of any person in front of right thinking members of the society. Two types of defamation: 1. Libel 2. Slander 9. Cyber Stalking Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using Internet services. (OR Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.) Stalking in General terms 1. Following the victim 2. Making harassing phone calls 3. Killing the victims pet 12. Denial of service attacks 4. Vandalizing victims property 5. Leaving written messages or objects Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. 10. E-mail & IRC related crimes: Examples include attempts to “flood” a network, thereby preventing legiti-mate network traffic attempts to 1. Email spoofing disrupt connections between two machines, thereby preventing access to a service attempts to prevent a particular 2. Email Spamming: individual from access-ing a service attempts to disrupt service to a specific system or per-son. 3. Email bombing 4. Sending threatening emails 13. Forgery 5. Defamatory emails 6. Email fraudsEmail Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated 7. IRC relatedInternet Relay Chat computers, printers and scanners.Also impersonate an-other person is considered forgery Forgery is a criminal act that takes place when a person falsifies something with the intent to deceive another person or entity. 6 MARY ANGELINE G. GOMEZ (BSHM 4B) 14. Piracy IPR Violations: These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also under trademark laws.Cyber Squatters registers domain name identical to pop-ular service provider’s domain so as to attract their users and get benefit from it 15. E-commerce/Investment Frauds Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities. Merchandise or services that were purchased or contracted by individuals online are never delivered. The fraud attributable to the mis-representation of a product advertised for sale through an internet auction site or the non-delivery of products purchased through an Internet auction site. Investors are enticed to invest in this fraudulent scheme by the prom-ises of abnormally high profits. 16. Sale of illegal articles This would include trade of narcotics, weapons and wild-life etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication.Research shows that number of people employed in this criminal area. Daily peoples receiving so many emails with offer of banned or illegal products for sale. 17. Online gambling There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. 18. Physically damaging a computer system Physically damaging a computer system: Physically damaging a computer or its peripherals either by shock, fire or excess electric Supply etc. 19. Breach of privacy and confidentiality Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records, sexu-al preferences, financial status etc. Confidentiality means non disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected 7

Use Quizgecko on...
Browser
Browser