SCSP 1513 SECTION 07 TECHNOLOGY INFORMATION AND SYSTEM
- Slides: 23
SCSP 1513 SECTION 07 TECHNOLOGY INFORMATION AND SYSTEM EN HAIRUDDIN BIN ABDUL MAJID GROUP 6: IDZNI BIN MOHAMED RASHID MUHAMMAD FIRDAUS BIN NOR AZMAN TOON SHU HUI CHOY WAN LING
IDENTIFY THE MOST SIGNIFICANT CONCERNS FOR EFFECTIVE IMPLEMENTATION OF COMPUTER TECHNOLOGY
INTRODUCTION • The world is facing many cases in misusing the IT • Current Issue: 1. 2. 3. 4. 5. Paedophile Online Scam Gamble Privacy Hacking Lack of Time Management
DEEP AND DARK WEB
WHAT HOW TYPE OF USERS LEVEL EXAMPLE CASES
WHAT IS DEEP & DARK WEB INTERNET IS DIVIDED IN TWO PARTS: SUPERCIAL INTERNET UNDERNEATH WEB (DARK & DEEP WEB) (SURFACE WEB) GOOGLE, BING, FIREFOX ESTIMATED: 1. 2 BILLION DOCUMENT (DEEP&DARK WEB) HIDDEN WIKI, SILK ROAD, DUCK GO ESTIMATED: 500 BILLION DOCUMENT
DEEP WEB • Isn’t INDEXED or NORMALLY VISIBLE or ACCESSIBLE from search engine. • Include DARK WEB. • Has PRIVATE DATABASED not for public : > Universities students and staff data. > Government information. > Organizations. DARK WEB • Specific collections of website that PUBLIC VISIBLE but hide our IP addresses.
HOW TO VISIT • THE ONION ROUTER • IS A BROWSING TOOLS TO SURF THE ANONYMOUSLY WEB • USED OTHER PC NETWORK TO HIDE THEIR IP ADDRESSES
2 MAIN TYPES OF UNDERNEATH WEB USERS THE JEDI USERS HOME USERS ACTIVIST THE SITH USERS DRUG DEALERS ARM DEALERS PEDIFILE R WHISTLEBLOWERS TRAITOR JOURNALIST MILLITARY & LAW ENFORCEMENT THEIF PLAGARI ST
LEVEL OF WEBSITE 1 Surface web 2 BERGIE WEB 3 4 DEEP WEB CHARTER WEB 5 MARIANA’S WEB 6 LA LIBERTE’ 7 LA ZION WEB
HUMAN TRAFFICKING HITMAN THE DANGEROUS ISIS RECRUITERS RED ROOMS EXPLOSIVES TUTORIAL CHILD PORNOGRAPHER BUYING DRUGS
COMPUTER VIRUS
A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer program and inserting its own code.
PHASES OF COMPUTER VIRUSES Dormant Phase Propagatio n Phase Triggering Phase Execution Phase
EXAMPLE OF MALWARE • Iloveyou • Mellisa • Mydoom • Sasser • Code Red
PRIVACY AND SECURITY
CONCLUSION Some ways to solve the above problems: • Self-discipline • Parents can use some software to get to know their children’s online activity • Download free network security software (to block the harmful website and set the time limit for surfing the Internet)
- Niveles de concreción curricular
- The prince 1513
- Spanish requirement of 1513
- Cliente ligero scsp acceso
- Cliente ligero scsp
- Ptb soket özellikleri
- Information technology system
- Section 4 biologists tools and technology
- Conclusion of ict
- Comparison of media literacy and information literacy
- Introduction to information technology
- Current and future trends of media and information ppt
- Cobit control objectives
- Control objectives for information and related technology
- Enterprise and global management in mis
- Btec first engineering teaching and assessment pack
- Accounting information technology and business solutions
- Introduction to media and information literacy ppt
- Introduction of ict
- Information processes and technology past papers
- Ministry of electronics and information technology
- Latest electronics and information technology in odisha
- Chapter 1 information technology the internet and you
- Ist 311