0% found this document useful (0 votes)
6 views16 pages

Lessons 1 2

The document provides an overview of Information and Communications Technology (ICT), its significance in the Philippines, and the evolution of the World Wide Web from Web 1.0 to Web 3.0. It discusses various online platforms, social media types, mobile technologies, cloud computing, and online safety and security practices. Additionally, it outlines netiquette rules and key terms related to internet security and cybercrime.

Uploaded by

gavino.jhenan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views16 pages

Lessons 1 2

The document provides an overview of Information and Communications Technology (ICT), its significance in the Philippines, and the evolution of the World Wide Web from Web 1.0 to Web 3.0. It discusses various online platforms, social media types, mobile technologies, cloud computing, and online safety and security practices. Additionally, it outlines netiquette rules and key terms related to internet security and cybercrime.

Uploaded by

gavino.jhenan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

ICT– Information and Communications Technology

 It deals with the use of different communication technologies such as mobile


phones, telephone, Internet to locate, save, send and edit information
 Is a study of computers as data processing tools. It introduces students to the
fundamental of using computer systems in an internet environment.

ICT in the Philippines

 Philippines is dubbed as the ‘’ICT Hub of Asia” because of huge growth of ICT-
related jobs, one of which is BPO, Business Process Outsourcing, or call centers.
 ICT Department in the Philippines is responsible for the planning, development
and promotion of the country’s information and communications technology (ICT)
agenda in support of national development.

Computer– an electronic device for storing and processing data, typically in binary
form, according to instructions given to it in a variable program.
Internet– is the global system of interconnected computer networks that use the
internet protocol suite (Transmission Control Protocol/Internet Protocol) to link billions of
devices worldwide.

 Means of connecting a computer to any other computer anywhere in the world


via dedicated routers and servers.
 Sometimes called simply ‘’the Net’’, is a worldwide system of computer networks-
a network of networks in which the users at any one computer can get
information from any other computer.
Advertisements

World Wide Web

 An information system on the internet that allows documents to be


connected to other documents by hypertext links, enabling the user to search for
information by moving from one document to another.
 Is an information space where documents and other web resources are
identified by URLs(Uniform Resource Locator), interlinked by hypertext links, and
can be accessed via Internet.
 Invented by Tim-Berners Lee

Web Pages

 Web page is a hypertext document connected to the World Wide Web. It is a


document that is suitable for the World Wide Web.

The different online platforms of World Wide Web:

1. Web 1.0 – refers to the first stage in the World Wide Web, which was entirely
made up of the Web pages connected by hyperlinks.

2. Web 2.0 – is the evolution of Web 1.0 by adding dynamic pages. The user is able
to see a website differently than others.

– Allows users to interact with the page; instead of just reading the page, the user may
be able to comment or create user account.
3. Web 3.0 – this platform is all about Semantic web.

– Aims to have machines (or servers) understand the user’s preferences to be able to
deliver web content.

Static Web Page- is known as a flat page or stationary page in the sense that the page
is ‘’as is’’ and cannot be manipulated by the user. The content is also the same for all
users that is referred to as Web 1.0

Dynamic Web Pages– Web 2.0 is the evolution of web 1.0 by adding dynamic web
pages. The user is able to see website differently than others e.g. social networking
sites, wikis, video sharing sites.

FEATURES OF WEB 2.0

1. Folksonomy- allows user to categorize and classify information using freely


chosen keywords e.g. tagging by FB, Twitter, use tags that start with the sign #,
referred to as hashtag.
2. Rich User Experience – content is dynamic and is responsive to user’s input
3. User Participation- The owner of the website is not the only one who is able to
put content. Others are able to place a content of their own by means of
comments, reviews and evaluation e.g. Lazada, Amazon.
4. Long Tail– services that are offered on demand rather than on a one-time
purchase. This is synonymous to subscribing to a data plan that charges you for
the amount of time you spent in the internet.
5. Software as a service- users will be subscribed to a software only when needed
rather than purchasing them e.g. Google docs used to create and edit word
processing and spread sheet.
6. Mass Participation– diverse information sharing through universal web access.
Web 2.0’s content is based on people from various cultures.

1. Convergence– is the synergy of technological advancements to work on a


similar goal or task. For example, besides using your personal computer to
create word documents, you can now use your smartphone.
2. Social Media– is a website, application, or online channel that enables web
users web users to create , co-create, discuss modify, and exchange user
generated content.

Six types of Social Media:

a) Social Networks – These are sites that allows you to connect with other
people with the same interests or background. Once the user creates
his/her account, he/she can set up a profile, add people, share content,
etc.

Example: Facebook and Google+


b) Bookmarking Sites – Sites that allow you to store and manage links to
various website and resources. Most of the sites allow you to create a tag
to others.

StumbleUpon, Pinterest

c) Social News – Sites that allow users to post their own news items or links to
other news sources. The users can also comment on the post and comments may also
be ranked.

Ex. Reddit and Digg


d) Media Sharing – sites that allow you to upload and share media content like
images, music and video. Eg. Flickr, YouTube, IG

e) Microblogging – focus on short updates from the user. Those that subscribed to the
user will be able to receive these updates.
Ex. Twitter and Plurk.

f) Blogs and Forums – allow user to post their content. Other users are able to
comment on the said topic.
Eg.Blogger, WordPress and Tumblr
3. Mobile Technologies– The popularity of smartphones and tablets has taken a
major rise over the years. This is largely because of the devices capability to do
the tasks that were originally found in PCs. Several of these devices are capable
of using a high-speed internet.

Today the latest model devices use 4G Networking (LTE), which is currently the
fastest.
MOBILE OS

 iOS – use in apple devices such as iPhone and iPad


 Android – an open source OS developed by Google. Being open source means
mobile phone companies use this OS for free.
 Blackberry OS – use in blackberry devices
 Windows phone OS – A closed source and proprietary operating system
developed by Microsoft.
 Symbian– the original smartphone OS. Used by Nokia devices
 WebOS- originally used in smartphone; now in smart TVs.
 Windows Mobile – developed by Microsoft for smartphones and pocket PCs

4. Assistive Media– is a non- profit service designed to help people who have
visual and reading impairments. A database of audio recordings is used to read

to the user.

5. e.g. Yahoo!, Gmail, HotmailCloud computing-distributed computing on


internet or delivery of computing service over the internet.
-Instead of running an e-mail program on your computer, you log in to a Web

e-mail account remotely. The software and storage for your account doesn’t exist

on your computer – it’s on the service’s computer cloud.

It has three components

1. Client computers – clients are the device that the end user interact with
cloud.
2. Distributed Servers – Often servers are in geographically different places, but
server acts as if they are working next to each other. (cellphones and telecom)
3. Datacenters – It is collection of servers where application is placed and is
accessed via Internet.(hardware maintenance, backup and archiving, load
balance, backup power systems)

TYPES OF CLOUDS

PUBLIC CLOUD allows systems and services to be easily accessible to the general
public. Public cloud may be less secured because of its openness.

PRIVATE CLOUD allows systems and services to be accessible within an organization.


It offers increased security because of its private nature.

COMMUNITY CLOUD allows systems and services to be accessible by group of


organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical activities
are performed using private cloud while the non-critical activities are performed using
public cloud.
LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.


TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human

 You need to remember that you are talking to a real person when you are
online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the
person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.

 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not
be doing online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see
them.

Rule no. 3: Know where you are in cyberspace.

 Always take a look around when you enter a new domain when surfing the
web.
 Get a sense of what the discussion group is about before joining.

Rule no. 4: Respect other people’s time and bandwidth.

 Remember people have other things to do besides email. You are not the
center of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.

 Be polite and pleasant to everyone.


 Always check your spelling and grammar before posting.
 · Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge

 Ask questions online.


 Share what you know online.
 Post the answers to your questions online because someone may have the
same question you do.

Rule no. 7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion
groups by putting the group down.

Rule no. 8: Respect other people’s privacy.

 Do not read other people’s mail without their permission.


 Going through other people’s things could cost you, your job or you could
even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

 Do not take advantage of other people just because you have more
knowledge or power than them.
 Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.

 Do not point out mistakes to people online.


 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and
cannot see the person face to face.

Internet security

Security Requirement Triad

Confidentiality
Data confidentiality
Privacy
 Integrity
Data integrity System integrity
 Availability

Threat Consequence Threat Action ( Attack)


Exposure: Sensitive data are directly released to
an unauthorized entity.

Interception: An unauthorized entity directly


accesses sensitive data traveling between
Unauthorized Disclosure authorized sources and destinations.

A circumstance or event whereby an Inference: A threat action whereby an


entity gains access to data for which unauthorized entity indirectly accesses sensitive
the entity is not authorized. data by reasoning from characteristics or
byproducts of communications.

Intrusion: an unauthorized entity gains access


to sensitive data by circumventing a system’s
security protections.
Incapacitation: prevents or interrupts system
operation by disabling a system component.

Corruption: Undesirably alters system operation


Disruption by adversely modifying system functions or data.
A circumstances or even that
interrupts or prevents the correct Obstruction: A threat action that interrupts
operation of system services and delivery of system services by hindering system
functions. operation.
Deception Masquerade: An unauthorized entity gains
A circumstance or event that may access to a system or performs a malicious act
result in an authorized entity receiving by posing as an authorized entity.
false data and believing it to be true.
Falsification: False data deceive an authorized
entity.

Repudiation: An entity deceives another by


falsely denying responsibility for an act.
Usurpation
Misappropriation: An entity assumes
A circumstances or event that results
unauthorized logical or physical control of a
in control of system services or
system resource.
functions by an unauthorized entity.

Misuse: Causes a system component to perform a function or service that is


detrimental to system security.
Types of System Intruders

 Masquerader
 Hackers
 Clandestine user

Parts of Virus

 Infection mechanism
 Trigger
 Pay load

Virus stages

 Dormant phase Virus is idle.


 Propagation phase Virus places an identical copy of itself into other
programs or into certain system areas on the disk.
 Triggering phase Virus is activated to perform the function for which
it was intended. Caused by a variety of system events
 Execution phase Function is performed

Key Terms

Cybercrime (RA 10175) - a crime committed or assisted through the use of the
Internet.

Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its
data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to another in any
means possible.
Worms– a malicious program designed to replicate itself and transfer from one file
folder to another and also transfer to other computers.

Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.

Spyware– a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam– unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and credits card
details.

Pharming- a more complicated way of phishing where it exploits the DNS system.

Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o
your consent is punishable by law.

Fair Use- means that an intellectual property may be used w/o consent as long as it is
used in commentaries, criticism, parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information.

Rogue Security Software– is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates them
into paying money for a fake malware removal tool.

You might also like