0% found this document useful (0 votes)
41 views25 pages

1 - Ict and Crime

The document discusses various aspects of ICT and crime, particularly focusing on computer crimes, cybercrime, and cyber warfare. It outlines different types of cybercrimes, such as identity theft, hacking, and cyberstalking, as well as preventive measures individuals and organizations can take to protect against these threats. Additionally, it highlights the significance of cybersecurity and the legal implications surrounding cyber activities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views25 pages

1 - Ict and Crime

The document discusses various aspects of ICT and crime, particularly focusing on computer crimes, cybercrime, and cyber warfare. It outlines different types of cybercrimes, such as identity theft, hacking, and cyberstalking, as well as preventive measures individuals and organizations can take to protect against these threats. Additionally, it highlights the significance of cybersecurity and the legal implications surrounding cyber activities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

1/18/2023

ICT AND CRIME


Where there are ways to make money, there will be criminals just waiting to take advantage.
The growth of the Internet has provided criminals with a whole host of different methods to try
to relieve you of your hard earned cash.

Computer crime is defined as 'criminal activity directly related to the


ICT AND CRIME use of computers'. It could be done in order to:
 steal money
 steal data or information
Mr. Edmund E.K  steal someone's identity
edmundeberhard2018@gmail.com  damage or disrupt someone's system for revenge
+255 656 144 795  cause general havoc for fun
 copy software / films / music to avoid paying for it.

Computer crimes are criminal activities, which involve the use of information Computer crime, or Cybercrime, refers to any crime that involves a computer and
technology to gain an illegal or an unauthorized access to a computer system with a network.
intent of damaging, deleting or altering computer data.
The computer may have been used in the commission of a crime, or it may be the
Computer crimes also include the activities such as electronic frauds, misuse of target.
devices, identity theft and data as well as system interference.
Cybercrime
Computer crimes may not necessarily involve damage to physical property. They encompasses any criminal act dealing with computers and networks (called hacking).
rather include the manipulation of confidential data and critical information. Additionally, cybercrime also includes traditional crimes conducted through
the Internet. For example; hate crimes, telemarketing and Internet fraud, identity
Computer crimes involve activities of software theft, wherein the privacy of the users theft, and credit card account thefts are considered to be cyber crimes when the
is hampered. These criminal activities involve the breach of human and information illegal activities are committed through the use of a computer and the Internet.
privacy, as also the theft and illegal alteration of system critical information.
Netcrime is criminal exploitation of the Internet
The different types of computer crimes have necessitated the introduction and use of cyber-
newer and more effective security measures. A prefix that means "computer" or "computer network,"

1
1/18/2023

Cyber terrorism can be defined as an act of terrorism committed through the use of
cyberspace or computer resources such, a simple propaganda in the Internet, that
there will be bomb attacks during the holidays can be considered cyber terrorism. Cyberwarfare is any virtual conflict initiated as a politically motivated attack
on an enemy's computer and information systems. Waged via the Internet, these
Cyberextortion is a form of cyberterrorism in which a website, e-mail server, or attacks disable financial and organizational systems by stealing or altering
computer system is subjected to repeated denial of service or other attacks by classified data to undermine networks, websites and services.
malicious hackers, who demand money in return for promising to stop the attacks.
Cyberwarfare is also known as cyber warfare or cyber war
Cyber warfare is a term used to describe the use of the Internet to wage war in the
virtual world, often with real effects in the physical world. Although generally cyber
warfare refers to attacks from one sovereign state on another in cyberspace, it may Cyberwarfare refers to politically motivated hacking to conduct sabotage and
also be used to describe attacks between corporations, from terrorist organizations, espionage.
or simply attacks by individuals called hackers, who are perceived as being warlike in
their intent. In recent years, cyber warfare has become an issue of much concern
among the major nations on the planet, and virtually every national military now has a
branch dedicated to both conducting and defending against cyber warfare.

Cybersecurity refers to the technologies and processes designed to protect computers,


Cyberwarfare involves the following attack methods:
networks and data from unauthorized access, vulnerabilities and attacks delivered via
Sabotage: Military and financial computer systems are at risk for the the Internet by cyber criminals.

disruption of normal operations and equipment, such as communications, Cyber law is the area of law that deals with the Internet's relationship to technological
and electronic elements, including computers, software, hardware and information
fuel, power and transportation infrastructures. systems (IS).
 Espionage and/or security breaches: These illegal exploitation methods are
Cyberspace The notional environment in which communication over computer
used to disable networks, software, computers or the Internet to steal or networks occurs: I stayed in cyberspace for just a few minutes
Cyberattack an attempt by hackers to damage or destroy a computer network or
acquire classified information from rival institutions or individuals for system.
military, political or financial gain.
Organized crime and often criminal organizations are terms which
categorise transnational, national, or local groupings of highly centralized enterprises
run by criminals, who intend to engage in illegal activity, most commonly
for monetary profit.

2
1/18/2023

Cybercrimes against persons: Cybercrimes committed against persons include various


crimes like transmission of child-pornography, harassment of any one with the use of a
computer such as e-mail. The trafficking, distribution, posting, and dissemination of
obscene material including pornography
Cybercrimes can be basically divided into 3 major categories:
Cybercrimes against property: The second category of Cyber-crimes is that
1. Cybercrimes against persons. of Cybercrimes against all forms of property. These crimes include computer
2. Cybercrimes against property. vandalism (destruction of others' property), transmission of harmful
3. Cybercrimes against government. programmes.

A Mumbai-based upstart engineering company lost a say and much


money in the business when the rival company, an industry major, stole the
technical database from their computers with the help of a corporate cyberspy.

Cybercrimes against government:


CRIMINAL ACTIVITIES FACILITATED BY ICT
The third category of Cyber-crimes relate to Cybercrimes against Government. Hacking:
Cyberterrorism is one distinct kind of crime in this category. The growth of internet
The activity of breaking into a computer system to gain an unauthorized access is
has shown that the medium of Cyberspace is being used by individuals and groups to
threaten the international governments as also to terrorise the citizens of a country. known as hacking. The act of defeating the security capabilities of a computer system
This crime manifests itself into terrorism when an individual "cracks" into a in order to obtain an illegal access to the information stored on the computer system is
government or military maintained website.
called hacking. The unauthorized revelation of passwords with intent to gain an

unauthorized access to the private communication of an organization of a user is one of

the widely known computer crimes.

3
1/18/2023

Phishing: Computer Viruses:


is the act of attempting to acquire sensitive information like usernames, passwords and Computer viruses are computer programs that can replicate themselves and
harm the computer systems on a network without the knowledge of the
credit card details by disguising as a trustworthy source. Phishing is carried out through system users. Viruses spread to other computers through network file system,
emails or by luring the users to enter personal information through fake websites. through the network, Internet or by the means of removable devices like USB
drives and CDs. Computer viruses are after all, forms of malicious codes
Criminals often use websites that have a look and feel of some popular website, which
written with an aim to harm a computer system and destroy information.
makes the users feel safe to enter their details there. Writing computer viruses is a criminal activity as virus infections can crash
computer systems, thereby destroying great amounts of critical data.

Cyberstalking: Identity Theft:


The use of communication technology, mainly the Internet, to torture
This is one of the most serious frauds as it involves stealing money and
other individuals is known as cyberstalking. False accusations,
transmission of threats and damage to data and equipment fall under obtaining other benefits through the use of a false identity. It is the act of
the class of cyberstalking activities. Cyberstalkers often target the users
pretending to be someone else by using someone else's identity as one's own.
by means of chat rooms, online forums and social networking websites
to gather user information and harass the users on the basis of the Financial identity theft involves the use of a false identity to obtain goods and
information gathered. Obscene emails, abusive phone calls and other
services and a commercial identity theft is the using of someone else's business
such serious effects of cyberstalking have made it a type of computer
crime. express or implied physical threats that creates fear through the name or credit card details for commercial purposes. Identity cloning is the use
use of computer technology such as email, phones, text messages,
of another user's information to pose as a false user. Illegal migration, terrorism
webcams, websites or videos.
and blackmail are often made possible by means of identity theft.

4
1/18/2023

Software Piracy
A term used to describe the act of illegally using, copying or distributing Junk mail

software without purchasing the software or having the legal rights. The Unsolicited mail sent out usually by direct marketing ordirect mail firms. Used

majority of software purchased today is purchased as a one-site license, mainly for introducing new products, books and magazines, investment

meaning that only one computer may have that software installed on it at opportunities, merchandise catalogs, etc., junk mail is big business in

one time. Copying that software to multiple computers or sharing it with industrialized countries especially the US, UK, and Canada. Unsolicited

your friend without multiple licenses is considered illegal and is email is called spam.

considered software piracy.

DDoS (DoS) Attacks


Unauthorized Electronic Funds Transfer (Fraudulent) Transactions (DoS attack) In computing, a denial-of-service attack or distributed denial-of-
Remember that an unauthorized fraudulent transaction only occurs when you service attack is an attempt to make a machine or network resource
unavailable to its intended users
have no knowledge of who used your card, you never authorized anyone to use
your card, and you received no benefit from the transaction. You will be Sometimes a cracker uses a network of zombie computers to sabotage a
specific Web site or server. The idea is pretty simple -- a cracker tells all the
required to sign and submit the Unauthorized Electronic Funds Transfer computers on his botnet to contact a specific server or Web site repeatedly.
Transaction form to certify to that fact. The sudden increase in traffic can cause the site to load very slowly for
legitimate users. Sometimes the traffic is enough to shut the site down
completely. We call this kind of an attack a Distributed Denial of
Service (DDoS) attack

5
1/18/2023

Other types of cybercrimes


Child Pornography Assault by Threat – threatening a person with fear for their lives or the lives of their
Using the Internet to transmit child pornography, the use of computer families or persons whose safety they are responsible for (such as employees or
communities) through the use of a computer network such as email, videos, or
networks to create, distribute, or access materials that sexually exploit
phones.
underage children. Cyber Contraband – transferring illegal items through the internet (such as
encryption technology) that is banned in some locations.
Cyberlaundering – electronic transfer of illegally-obtained monies with the goal of
Drug Trafficking hiding its source and possibly its destination.
Delivering, distributing, or dispensing a controlled substance by means of the Cyberterrorism – premeditated, usually politically-motivated violence committed
Internet. against civilians through the use of, or with the help of, computer techology.
Cybertheft – using a computer to steal. This includes activities related to: breaking
and entering, DNS cache poisoning, embezzlement and unlawful appropriation,
espionage, identity theft, fraud, malicious hacking, plagiarism, and piracy.

How to prevent Cyber crimes:


Prevention is always better than cure. It is always better to take certain
precaution while operating the net. One should make them his part of cyber
life.
6) Always keep a watch on the sites that your children are accessing to prevent any
kind of harassment or depravation in children.
One should keep in mind of the following things-
1) To prevent cyber stalking avoid disclosing any information pertaining to 7) It is better to use a security programme that gives control over the cookies and
oneself. This is as good as disclosing your identity to strangers in public send information back to the site as leaving the cookies unguarded might prove
place. fatal.
2) Always avoid sending any photograph online particularly to strangers
and chat friends as there have been incidents of misuse of the photographs. 8) Web site owners should watch traffic and check any irregularity on the site.
3) Always use latest and up date anti virus software to guard against virus Putting host-based intrusion detection devices on servers may do this.
attacks.
4) Always keep back up volumes so that one may not suffer data loss in case 9) Use of firewalls may be beneficial.
of virus contamination
5) Never send your credit card number to any site that is not secured, to
guard against frauds.

6
1/18/2023

10)Use Strong Passwords


Use different user ID / password combinations for different accounts and
avoid writing them down. Make the passwords more complicated by combining 14) Install the latest operating system updates
letters, numbers, special characters (minimum 10 characters in total) and Keep your applications and operating system (e.g. Windows, Mac, Linux) current
change them on a regular basis. with the latest system updates. Turn on automatic updates to prevent potential
attacks on older software.
11)Use Cryptography (Encryption) techniques can be employed to encrypt 15) Protect your Data
information using an algorithm commonly called a cipher to mask information in Use encryption for your most sensitive files such as tax returns or financial
storage or transit. records, make regular back-ups of all your important data, and store it in another
12)Be Social-Media Savvy location.
Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, MSN, 16) Secure your wireless network
etc.) are set to private. Check your security settings. Be careful what information Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not
you post online. Once it is on the Internet, it is there forever! properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot
13)Secure your Mobile Devices Spots”, are also vulnerable. Avoid conducting financial or corporate transactions
Be aware that your mobile device is vulnerable to viruses and hackers. Download on these networks.
applications from trusted sources.

17. Protect your e-identity 19. Avoid being scammed


Be cautious when giving out personal information such as your name, address, Always think before you click on a link or file of unknown origin. Don’t feel
phone number or financial information on the Internet. Make sure that websites pressured by any emails. Check the source of the message. When in doubt, verify
are secure (e.g. when making online purchases) or that you’ve enabled privacy the source. Never reply to emails that ask you to verify your information or
settings (e.g. when accessing/using social networking sites). confirm your user ID or password.

18.Educate employees. 20.Call the right person for help

Employees are your first line of defense against cybercriminals — but they’re Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child

also your biggest security hole. Negligent employees are the most common exploitation) or if you suspect a computer crime, identity theft or a commercial

cause of data breaches. scam, report this to your local police. If you need help with maintenance or
software installation on your computer, consult with your service provider or a
certified computer technician.

7
1/18/2023

Between January of 2012, and April of 2013, AlexseyBelan is alleged to have intruded the
WANTED CYBER CRIMINALS BY US computer networks of three major United States-based e-commerce companies in Nevada and
California. He is alleged to have stolen their user databases which he then exported and made
readily accessible on his server. Belan allegedly stole the user data and the encrypted passwords
ALEXSEY BELAN of millions of accounts and then negotiated the sales of the databases.
Computer Intrusion; Aggravated Identity Theft; Two separate federal arrest warrants for Belan have been issued. One was issued on September
Fraud in Connection With a Computer 12, 2012, in the United States District Court, District of Nevada, Las Vegas, Nevada, after Belan
REWARD: The FBI is offering a reward of up to was charged with obtaining information by computer from a protected computer; possession of
$100,000 for information leading to the arrest of fifteen or more unauthorized access devices; and aggravated identity theft. The second warrant
AlexseyBelan. was issued on June 6, 2013, in the United States District Court, Northern District of California,
San Francisco, California, after Belan was charged with two counts of fraud in connection with a
computer and two counts of aggravated identity theft.
Belan has Russian citizenship and is known to hold a Russian passport. He speaks Russian and
may travel to Russia, Greece, Latvia, the Maldives, and Thailand. He may wear eyeglasses and
dye his brown hair red or blond. He was last known to be in Athens, Greece.

PeterisSahurovs is wanted for his alleged involvement in an international cybercrime scheme that took place from
February of 2010 to September of 2010. The scheme utilized a computer virus that involved the online sale of
fraudulent computer security programs that defrauded Internet users of more than $2 million.
It is alleged that in February of 2010, Sahurovs contacted an online newspaper claiming to work for an online
advertising agency that represented a hotel chain that was seeking to place advertisements on the paper's
PETERIS SAHUROVS website. Sahurovs utilized fraudulent references and bank accounts to deceive the newspaper into believing he
Wire Fraud; Conspiracy to Commit Wire Fraud; represented a legitimate advertising agency.
Sahurovs provided electronic files containing the fictitious hotel advertisements to the newspaper, which began
Unauthorized Access to a Protected Computer running the advertisements on its website. He then replaced the hotel advertisements with a file containing a
malicious computer code, or malware, which infected the computers of people who visited the website and
REWARD: The FBI is offering a reward of up to required them to purchase antivirus software for $49.95 to regain control of their computers. If the users
$50,000 for information leading to the arrest of Peteris did not purchase the software, their computers immediately became inundated with pop-ups containing fraudulent
Sahurovs. "security alerts," and all information, data and files stored on the computers became inaccessible.
Sahurovs allegedly conducted the same fraudulent advertising and infection scheme against numerous online
businesses.
On May 17, 2011, Sahurovs was indicted by a Federal Grand Jury in the United States District Court, District of
Minnesota, for wire fraud, conspiracy to commit wire fraud, and unauthorized access to a protected computer. The
same day, a federal warrant was issued for Sahurovs' arrest.
Sahurovs is thought to be in Rezekne, Latvia. He may also visit Kiev, Ukraine. He is known to use the following
screen names: "PIOTREK," PIOTREK89" and "SAGADE."

8
1/18/2023

Artem Semenov is wanted for his alleged participation in an Eastern European cyber
ARTEM SEMENOV crime ring, operating out of New York, which is known for recruiting money mules to
Conspiracy to Commit Bank Fraud; open bank accounts, cashing out money received through unauthorized money
Conspiracy to Possess False Identification transfers, and then transferring the money overseas. An arrest warrant was issued for
Documents; False Use of Passport Semenov in the Southern District of New York on September 29, 2010, after he was
REWARD: The FBI is offering a reward charged with conspiracy to commit bank fraud; conspiracy to possess false
of up to $50,000 for information leading to identification documents; and false use of passport.
the arrest of Artem Semenov. Semenov speaks both Russian and English, although his English may not be that good.
He tends to stay close to Russian communities. He may enjoy frequenting casinos and
playing poker. He may travel to Las Vegas, Nevada.

Exercise:
1. You should be able to explain criminal activities facilitated by ICT
2. Are you aware on ICT crimes? Give out examples of ICT crimes occurred
3. Can you explain the intervention measures against ICT crimes
4. Try to find the meaning of the following words
 Cyberspace Service
 Cyberspace Company
 Cyberspace Technologies
 Cyberspace Game
 Cyberspace Jobs
 cybershop
 cyberslacker
 cybersphere
 cyberspying

9
1/18/2023

Review questions
1. Explain at least five areas where computers are used
2. Discuss how a computer is used in:
a. Reservation systems
b. Banking THE UNITED REPUBLIC OF TANZANIA

c. Law enforcement THE CYBERCRIMES ACT, 2015

3. How computers enable organization to have paperless office


4. Discuss the devices required in order to conduct a video
conference
5. Explain the term virtual reality giving examples of devices used
6. What is biometric analysis?
Mr. Yusuf D 37

10
1/18/2023

Information Security
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized
access, use. Or Simply the process of keeping information secure
Information security: Is the collection of technologies, standards, policies and
management practices that are applied to information to keep it secure.

Information System are interrelated components working together to collect,


process, store, and disseminate information to support decision making.

Information System a computer system or set of components for collecting,


creating, storing, processing, and distributing information.

Information system (IS) is a formal, sociotechnical, organizational system


designed to collect, process, store, and distribute information.
Mr. Yusuf D

42

COMPONENTS OF INFORMATION SYSTEM 2. Software: The term software refers to computer programs and the manuals

(if any) that support them. Computer programs are machine-readable


1. Hardware: The term hardware refers to machinery. This category includes
instructions that direct the circuitry within the hardware parts of the system to
the computer itself, which is often referred to as the central processing unit
function in ways that produce useful information from data. Programs are
(CPU), and all of its support equipments. Among the support equipments are
generally stored on some input / output medium,often a disk or tape.
input and output devices, storage devices and communications devices.

11
1/18/2023

5. People: Every system needs people if it is to be useful. Often the most over-
3. Data: Data are facts that are used by programs to produce useful
looked element of the system are the people, probably the component that
information. Like programs, data are generally stored in machine-readable most influence the success or failure of information systems.
form on disk or tape until the computer needs them.

4. Procedures: Procedures are the policies that govern the

operation of a computer system. "Procedures are to people what

software is to hardware" is a common analogy that is used to

illustrate the role of procedures in a system.

WAYS OF PROTECTING INFORMATION SYSTEMS  Never trust disks from other people. Anytime you receive a file on any type
of media check it first for viruses!
 Save your work  Perform regular maintenance. Learn how to use the utilities that diagnose
 Make a backup. your system for problems. It is a good idea to run a disk-scanning program,
 Keep a copy of your data offsite. Diligently backing up your data is good defragment your hard drive, or whatever else your system might need.
practice but keep a copy of your data offsite. If there were a fire or other These utilities can prevent little problems from becoming big problems, and
disaster your onsite data backup could be lost as well will keep your system running at top speed.
 Never open email attachments by habit. If your email reader  Apply Physical security,
has an option to automatically open attachments you should  Set Firewalls
disable that feature. Always run any attachments and  Apply Encryption,
downloaded files through a virus scanner first.  Use Biometric security,

12
1/18/2023

 Use Anti-virus and anti-spyware software and Update your software. Physical threats
Make sure you have the latest updates for your software - especially for Besides people, there are plenty of other ways that data can be lost or
your virus checking software. Make it a habit to regularly check for updates damaged.
and enable automatic updates for software that offers that feature. Here are a few more to think about.
• Educate users,
• Use User IDs & passwords and methods for ensuring 1. Fire,
passwords remain effective 2. floods
3. lightning damage
Although thankfully a rare occurrence, fires and floods do happen.

Theft of equipment ANOTHER CAUSE OF DATA LOSS TO A COMPUTER


Computers are expensive, attractive items and can be a prime target for Employees
thieves. If your computer is stolen and you haven't made a back up of your If you were asked to take a guess on the most likely cause of data loss, you would
data then all of your hard work will end up walking out of the door with the probably say, 'hacking' or 'theft of equipment'. You would be wrong. The
single biggest cause of loss or damage to data is from employees or data users such as
thief.
yourself.
Scratches on the hard disk Carelessness
The platters inside a hard disk spin very quickly whilst a 'head' A vast amount of valuable data is lost due to sheer carelessness.
hovers less than a hair's width above them, reading the data. - not saving work as it is being created and then the software crashes or the machine
If you don't shut your machine down properly this head crashes shuts down. Hands up - how many of you are guilty of this?
onto the spinning platter causing scratches. - saving over a file by accident. Another daft thing of which we are all guilty of.
- Deleting a file by accident - woops!
If a scratch occurs just at the point your data is stored, it can be - not saving files with sensible file names, and no matter how hard you try, you can't
damaged and you might not be able to access it. find them again when you need them.

13
1/18/2023

 Data theft PHYSICAL SECURITY


Occasionally an employee might be tempted to steal company data. They may Computer physical security is a methodology for safeguarding computer
have been offered money by another company to get hold of the data - this is systems, peripherals and all assets that form these systems
called 'industrial espionage'
Physical protection
The employee might want to steal data because they are planning to set up
As you have seen, there are many different ways that you or a business can
their own rival business shortly. lose valuable data. With a little bit of planning and thought however, the risks
Data Damage can be reduced or even eliminated.
An employee might hold a grudge against their employee, maybe
they don't like their boss or maybe they have heard they are about
to lose their job.
It has been known for people in this situation to damage or
destroy files to 'get their own back'.

PASSWORD
a password is a set of secret characters or words utilized to gain access to a
There are many things you can do to make your equipment more secure:
computer, web page, network resource, or data. Passwords help ensure that
- Lock the room when not in use computers or data can only be accessed by those who have been granted the
- Use swipe cards or keypads to activate locks right to view or access them.

- Bolt computers to the desk


Strong password - Term used to describe a password that is an effective
- Use special pens to mark your postcode onto the computer case password that would be difficult to break. Often a strong password has
- Keep windows shut - especially if on the ground floor. Use bars. between six and ten characters, numbers and other characters, and upper and
lowercase. Below is an example of a strong password.
- CCTV video cameras (Closed-circuit television)
- In large firms, security guards

14
1/18/2023

Weak password - A password that is not an effective password because it's 8. Same password or similar passwords should not be used in other applications.
easy to remember. Examples of a weak password are names, birth dates, 9. Do not use series like abc or 123 or 321.
phone numbers, easy guessable word, etc. Below is an example of a weak HOW TO CREATE USER ACCOUNT
password.  Click start
 Click Control panel
A good password should be. Or characteristics of a good password  Click or Open User Accounts.
1. It should not be found in a dictionary.  Click your account name.
2. It should contain special characters and numbers.  Click Create a password.
3. It should contain a mix of upper and lower case letters.  In Type a new password and Type the new password again to confirm,
4. There should be at least 8 characters. type the password for your account.
5. It should not be able to be guessed based on user information.  You can also enter descriptive or meaningful text in Type a word or
phrase to use as a password hint to help you remember your
6. It should not be shared with anyone. password.
7. It should not be written down anywhere.  Click Create Password.

ENCRYPTION A very basic encryption technique known as simple substitution, substitution


cipher, or Caesar cipher (named after Julius Caesar) that shifts the letters of
The process of making data unreadable by other humans or computers for the the alphabet over a few characters. For example, as shown below the alphabet
purpose of preventing others from gaining access to its contents. Encrypted has been shifted over four characters.
data is generated using an encryption program such as PGP, encryption
machine, or a simple encryption key and appears as garbage until it is Encrypt key:
a=e, b=f, c=g, d=h, e=i, f=j, g=k, h=l, i=m, j=n, k=o, l=p, m=q, n=r, o=s, p=t, q=u,
decrypted. In order to read or use the data, it must be decrypted, and only
r=v, s=w, t=x, u=y, v=z, w=a, x=b, y=c and z=d.
those who have the correct password or decryption key are able to make the Decrypt key:
data readable again. a=w, b=x, c=y, d=z, e=a, f=b, g=c, h=d, i=e, j=f, k=g, l=h, m=i, n=j, o=k, p=l, q=m,
r=n, s=o, t=p, u=q, v=r, w=s, x=t, y=u and z=v

15
1/18/2023

BIOMETRIC

When referring to computers and security, biometrics is the identification of a


person by the measurement of their biological features. For example, a user
Using this technique a user could encrypt the message: computer hope free identifying themselves to a computer or building by their finger print or voice
is considered a biometrics identification. When compared to a password, this
help for everyone to: gsqtyxiv lsti jvii lipt jsv izivcsri.
type of system is much more difficult to fake since it is unique to the person.
Below is a listing of all known biometric devices.

Types of biometric devices  Finger scanner - Like the picture shown on this page a biometric finger
 Face scanner - Biometric face scanners identify a person by taking scanner identifies the person by their finger print. These can be a secure
measurements of a person face. For example, the distance between the method of identifying a person, however, cheap and less sophisticated
persons chin, eyes, nose, and mouth. These types of scanners can be very finger print scanners can be duped a number of ways. For example, in the
secure assuming they are smart enough to distinguish between a picture of show Myth Busters they were able to fake a finger print using a Gummy
a person and a real person. Bear candy treat.
 Retina or iris scanner - A biometric retina or iris scanner identifies a person
 Hand scanner - Like your finger print, the palm of your hand is by scanning the iris or retina of their eyes. These scanners are more secure
also unique to you. A biometric hand scanner will identify the biometric authentication schemes when compared to the other devices
person by the palm of their hand. because there is no known way to duplicate the retina or iris.

16
1/18/2023

 Voice scanner - Finally, a voice analysis scanner will mathematically break IMPORTANCE OF PROTECTING INFORMATION SYSTEMS
OR Needs for information systems security :
down a person's voice to identify them. These scanners can help improve  Data independence and efficient is maintained- this independence ensures
security but with some less sophisticated scanners can be bypassed using a that the data cannot be redefined or reorganized by any of the programs
that make use of it. In this manner, the data remains accessible, but it is
tape recording. also stable and cannot be corrupted by the applications.
 Data sharing is secured
 Data assurance and reliable is maintained- ensuring that data is not lost
IMPORTANCE OF PHYSICAL SECURITY, PASSWORD AND BIOMETRIC when critical issues rise.
 Data redundancy is overcome
• To help prevent theft and fraud,
 Data security is maintained
• To help prevent loss,  Integrity and consistency is maintained- keeping information uniform as it moves
across a network and between various applications on a computer. Ensuring that
• To help prevent unauthorized access information and programs are changed, altered, or modified only in a specified and
authorized manner - e.g., preventing an adversary from modifying orders given to combat
• They ensure security and confidentiality units so as to shape battlefield events to his advantage.

INFORMATION SYSTEM FAILURE ICT AND EMPLOYMENT


Some causes of computerized information system failures are: Over the last thirty years ICT has changed the world of work beyond
a. Hardware failure
b. Unstable power supply as a result of brownout or blackout and vandalism recognition. Some industries have practically ceased to exist, some have had
c. Network breakdown to change and adapt to take on board new technology and some brand new
d. Natural disaster e.g. floods, fire, tornadoes, hurricane.
e. Software/Program failure industries have developed.
f. Human error e.g. deletion or altering Over the next few pages we will be looking at some examples of how ICT has
g. Other disaster e.g. rivals (business competitors) in business
brought about changes in a selection of jobs. We will also look at some of the
Fault tolerant system: a system which has redundant or duplicate storage, peripheral
devices and software that provide a fail-over capability to backup components in the benefits and some of the negative aspects of ICT and work.
event of system failure.
Mr. Yusuf D 67

17
1/18/2023

A. ICT has changed work patterns


Technology has led to a huge change in working hours. People who
traditionally only worked 9-5, Monday to Friday, may now find that they have
to work evening shifts, night shifts or weekends in order to provide the service
that customers expect. This can leave them feeling tired and stressed. Customers expect goods to be on the supermarket shelves when they want
Customers expect to be able to call their bank or building society in the
evenings, sometimes even at 3am - someone has to be there to answer the them. Lorries have to be driven night and day to ensure this and so route
telephone.
Customers expect to be able to buy their goods online at midnight - someone planners need to be available to replan a route when a delay occurs.
has to be there to ensure that the website is working correctly and that the
servers don't have any problems. With ICT, we are gradually becoming a 24 hours a day society.

New job created Skilled workers needed


Technical staff to maintain and manage the computers and networks . e.g. IT Technology drives much of business these days and so most companies want
Technicians, Computer Programmers, Web Designers, Help-Desk Staff, workers with the basic skills to use it - typing for example or being able to
System administrators, Network administrator, ICT consultants, graphic use email. This is called 'computer literacy' and it is becoming as important
designers as reading and writing in the job market.
Loss of employment This gap between people with computer skills and those with none is part of
Inevitably, since ICT can automate many jobs and do them not only faster but also more the 'DIGITAL DIVIDE'.
accurately, then many of the old jobs have disappeared.
We no longer have typing pools full of secretaries, there is no need for an office full of Flexible employment
clerks to calculate and count out weekly wages, there is no need for printers to manually
Mainly in the internet made it possible for people to “telework” . This involves
typeset the newspaper pages. Many hundreds of thousands of people lost their jobs as
these changes happened.
working outside office and do many jobs in different companies
Job loss is not pleasant; it affects peoples' self worth and creates all kinds of stress and
disruption in families and society in general.
Loss of employment on the following areas: Manufacturing, Secretarial Work,
Accounting Clerks, Newspaper Printing

18
1/18/2023

Retraining
Many people who found that their job had disappeared because of the Review questions
introduction of computers have had to re-train.
They might have been kept on to do the same role but using a computer
rather than doing things by hand. 1. Explain at least three effects of introduction of ICT in
Or if their job disappeared completely, they would probably have had to train workplaces
and learn a whole new set of skills. 2. List three advantages and disadvantages of automated
Training can be given by people within the company or often by an external
production
company.
Training is a large industry in itself because of the demand to keep up with the 3. State advantages of using electronic point-of-sale terminals as
latest developments. opposed to manual entry at a supermarket checkout counter?
Whatever method is used , training is expensive. While the person is learning
to use the new technology, they are not working to full capacity.
Mr. Yusuf D 74

ICT AND CULTURAL INTERACTION For example, it is common to see the western electronic media showing nude
Most notable is the influence of ICT on cultural change. The rapid growth of pictures of people or display of otherwise considered private parts that are not
ICT has not only affected the way we work, but also how we play, think and to be displayed in public. Furthermore, through internet, it is now common to
also a challenge to upholding of ancestral morals and cultural values. ICT has see pornographic materials that affect moral values negatively. The free
also affected the way we talk, our privacy, human rights and our integrity. flowing immoral information has negatively influenced the behaviour of both
Since ICT was brought to us by people with a different culture and moral the young and the old in society. Internet users are also exposed to a form of
perceptions, the electronic media has manifested itself into the new cultural communication called flaming, done through on-line messages that use
remix. derogatory, obscene or dirty language

19
1/18/2023

ICT has provided a platform for western cloth designers and models who ICT HAZARDS
promote western designer wear, cosmetics at the peril of traditional wear and
Health hazards of ICT to human being
outfits that has been discarded as outdated and out of fashion. Western Hip
Hop, and to some extent, a remix Bongo flavour music has at times being void There are various health problems associated with the regular use of
of the local melody, gestures, postures that are from other cultures. computers, such as stress, eyestrain and injuries to the wrists, neck and back.
However, ICT has its advantages in that it has been widely used as an awareness
Employers must take steps to protect employees whose work involves the
campaign platform against bad aspects of the society such as drug abuse, prostitution,
corruption, and other negative social behaviours. ICT has in the other hand provided a regular use of computers
forum for promoting traditional cultural practices and performance to distant people
than it was possible in the traditional society.

Eye Strain Solutions:


Eyes can become strained after staring at a computer screen for a long time,  Use monitors which don't flicker
particularly if working in bad light, in glare or with a flickering screen.  Have blinds at the windows so that the sun doesn't shine directly on the
Fortunately, eyestrain is usually a temporary problem. screen
 Use suitable lights that disperse light evenly and don't shine on the screen
Symptoms include:  Use a screen filter
 Burning or itching eyes  Keep your eyes at least 18 inches from the screen
 Blurring or double vision  Regularly look away from the screen and focus on something in the
distance
 Headache
 Take regular breaks - at least 5 minutes break every hour
 Nausea
 Have regular eye tests and wear glasses if prescribed
 Fatigue

20
1/18/2023

Backache & Neck Pain Repetitive Strain Injury (RSI) is damage to the fingers, wrists and other parts
of the body due to repeated movements over a long period of time.
Many computer users suffer serious back and neck problems. This is probably
due to a poor posture or an awkward position while sitting at a computer. Symptoms:
Some of the things that people can do to help avoid back pain are: In the arms and hands:
- Use a fully adjustable chair. The height of the chair and the seat position Aching
should be easy to change.  pain in arms/wrists even after rest
- Use footrests so that the legs are kept at a more natural angle Weakness
- Use a monitor which is adjustable. Position it so that the neck doesn't have to Swelling
bend Tenderness
- Take regular breaks and walk about. Numbness
- Sit with the back straight and the head up, don't slouch  pins and needles or burning sensation
In the shoulders and neck:
Stiffness
Aching

Causes
Solution
 Typing or using the mouse for long periods of time
 Ensure workstation and chair are the correct height
 Using too much force on your fingers when typing
 Support wrists by using wrist rests
 Using a poorly designed keyboard
 Keep elbows close to your sides
 Workstation or chair is the wrong height so arms are in an unnatural
 Five minute break from typing at least every hour
position

21
1/18/2023

Deep Vein Thrombosis Causes


When you sit for prolonged periods of time the veins that are deep inside your leg can  Sitting for long periods of time
become compressed. This hinders their natural pumping action that is needed to
 long periods of inactivity
return the blood back to your heart. If this compression continues, perhaps because
you are sitting still for a long period of time, the blood can begin to stagnate and form Symptoms
a clot. This clot is known as a Deep Vein Thrombosis (DVT).  Swelling in the affected leg
Whilst a DVT itself is very painful and requires hospital treatment, it can potentially  Localised heat in the affected leg
become life threatening. Small bits of the clot can break off and travel through the
 Pain in the affected leg
blood system. If they lodge in the brain it can result in stroke, if they lodge in the
lungs they are called a pulmonary embolus. Either of these two can kill you. Prevention
There have been many cases of people developing DVTs after a long plane journey  Take regular breaks
where they have been unable to get up and move about. More recently, there have  Stand up and move around to allow the blood flow in your legs to return to
been cases of office workers developing DVTs when they have sat at their desks for
normal
hours on end.
 Use an adjustable chair and ensure that your feet are firmly on the floor
 Sit with a suitable posture – do not cross your legs for long periods

Stress
Stress brought on through the use of computers is one of the major causes of work - The amount of information that ICT systems can produce is often far too
related illness.
There are many different reasons why people become stressed at work. However,
much for anyone to take in. This results in 'information overload' and people
here is a list of some of the major causes brought about by the use of computers: end up feeling they can't cope and become stressed.
- Many people are afraid of computers, they don't understand them and feel they will
look stupid if they admit that they don't know how to operate one. - Workers can be monitored using ICT systems. Call centre staff are monitored
- People worry that a computer will be able to replace them and they might lose their
to make sure that they don't spend too long on any one call. The number of
jobs.
- Things change so fast in the world of computing that it can be very stressful just products that a check-out person scans during a minute are counted. This
trying to keep up to date with new ideas, techniques and equipment, especially for
older people. feeling of being constantly 'watched' can be very stressful.
- It is getting increasingly hard to separate work and home life. People can be
contacted easily by their bosses or clients. E-mail, the Internet and mobile phones
mean that people continue to work even after they have left the office.

22
1/18/2023

E-Waste: Environmental and Health Hazards


E- Waste are discarded electronic appliances such as mobile phones, hazardous elements found in computers:
computers, and televisions.  Lead (Pb)
Electronic waste, e-waste, e-scrap, or electronic-disposal, waste electrical,
and electronic equipment (WEEE) describes discarded electrical or electronic  Cadmium (Cd)
devices.  Mercury (Hg)
Discarded electronics contain hazardous materials. If disposed improperly,
they pose a potential threat to human health and the environment. E-Waste  Hexavalent Chromium (Cr)
accounts for 40 percent of the lead and 75 percent of the heavy metals found  PVC (Polyvinyl Chloride Plastics)
in landfills. Although safe when used, once electronics are discarded in a
landfill, the acidic conditions provide an environment in which lead and other  Brominated Flame Retardants (Pb)
heavy metals may leak out. If the landfill's liner fails, the groundwater supply
may become contaminated.

Lead
Cadmium
 Lead accumulates in the environment and has high acute and chronic toxic effects
on plants, animals and microorganisms.  Cadmium compounds are classified as toxic with a possible risk of
 Lead is known to cause damage to the central and peripheral nervous systems, irreversible effects on human health.
blood system and kidneys in humans.  Cadmium and cadmium compounds accumulate in the human body, in
 Effects on the endocrine system have been observed, and serious negative effects particular in the kidneys.
on children's brain development are well documented.  Cadmium shows a danger of cumulative effects in the environment due to
 Lead existing in landfilled products has the potential to leach and contaminate its acute and chronic toxicity.
drinking water supplies.  It is found in certain components such as SMD chip resistors, infrared
 Lead is found in soldering of printed circuit boards and other electronic detectors and semiconductors.
components.  Cadmium is lso found in older models of cathode ray tubes (glass panels in
Lead is also found in glass panels in computer monitors (CRTs).
computer monitors) and in plastics as a stabilizer.

23
1/18/2023

Mercury Hexavalent Chromium


 Mercury has been shown to accumulate in living organisms and
concentrate through the food chain, particularly in fish.  Chromium can cause strong allergic reactions, even in small concentrations.
 Negative effects on brain functioning and development have been  It is found in untreated and galvanized steel plates.
attributed to mercury.
 Mercury is found in:
 Thermostats PVC (Polyvinyl Chloride Plastics)
 Position censors
 Relays and switches  The production and burning of PVC products generates dioxins and furans,
 Discharge lamps which contribute to air pollution and respiratory ailments.
 Batteries
 Printed wiring boards  PVC is found in cabling and computer housing.

Brominated Flame Retardants Review questions


 Research has concluded that exposure to these chemicals in early life could
1. Describe ways of protecting info sys
induce neurotoxic effects similar to those caused by other toxic substances
such as some pesticides. 2. Explain the importance of protecting information system
 Exposure to Polybrominated Biphenyls (PBBs) are believed to cause an 3. Describe the effect of ICT on employment
increased risk of cancer of the digestive and lymph systems.
4. Analyze the influence of ICT on cultural change
 PBBs are found in:
 Printed circuit boards 5. Explain the effect of disposing electronic equipment to he environment
 Components such as connectors, plastic covers and cables 6. Describe hazards of ICT to human health
 Plastic covers of TV sets

24
1/18/2023

THE END
WISHES YOU ALL THE BEST IN YOUR STUDIES.

Mr. Yusuf D

97

25

You might also like