Information and Technology Law (cyber law notes chapter-7)

BASIC CONCEPT OF INFORMATION TECHNOLOGY

CONCEPT OF ICT:

Information and Communications Technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage, and audiovisual systems, that enable users to access, store, transmit, and manipulate information.

Some of the key concepts of Information and Communication Technology (ICT), such as those relating to networks and security:

       Understand what hardware is, know about factors that affect computer performance and know about the peripheral devices.

·        Understand what software is and give examples of common applications software and operating system software.

·        Understand what Information and Communication Technology (ICT) is and give examples of its practical applications in everyday life.

·        Understand health and safety and environmental issues in relation to using computers.

·        Recognize the important security issues associated with using computers.

       Recognize the important legal issues in relation to copyright and data protection associated with using computers.

IMPORTANCE OF ICT:

Information and Communications Technology (1CT) has an important role in the world since we are now in the information age era. With CT, the company can make the business easier to happen with the client, supplier, and distributor. It is also very important in our daily lives. The lack of appropriate information at the right time will result in low productivity, low-quality research work, and waste of time to pursue information and even to do research which actually others had done or in other countries. Nowadays ICT cannot be separated from our daily needs.

ICT has a great impact in our daily lives. For example, we can read our local newspaper using the online newspaper. Another example is we still can get connected with our family, relatives, or colleagues even if we are abroad by using electronic mail, yahoo messenger, call conference, or video conference.

Digital computers and networking have changed our economy concept to the economy with no boundary in time and space because of ICT. It brings a lot of advantages for economic development enabling millions of transactions to happen in an easy and fast way.

ICT is one of the economic development pillars to gain a national competitive advantage. It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. Lt provides wider knowledge and can help in gaining and accessing information.

ICT has become an integral part of everyday life for many people. It increases its importance in people's lives and it is expected that this trend will continue, to the extent that ICT 1literacy will become a functional requirement for people's work, social, and personal lives.

The use of ICT in education adds value in teaching and learning, by enhancing the effectiveness of learning, or by adding a dimension to learning that was not previously available. ICT may also be a significant motivational factor in students learning and can support students' engagement with collaborative learning.

Information and Communications Technology (ICT) is basically our society's efforts to teach its current and emerging citizens valuable knowledge and skills around computing and communications devices, software that operates them, applications that run on them and systems that are built with them.

As a matter of fact, we are living in a constantly evolving digital world. ICT has an impact on nearly every aspect of our lives - from working to socializing, learning to playing. The digital age has transformed the way young people communicate, network, seek help, access information and learn. We must recognize that young people are now an online population and access is through a variety of means such as computers, TV and mobile phones.

It is in this premise that educational technology and e-learning is taught in or out of the classroom since educational technology is used by learners and educators in homes, schools, businesses, and other settings.

GLOBALIZATION: REVOLUTION OF ICT:

Globalization, digitization, and Information & Communication Technology are integrally connected in this new millennium. Globalization and technology share a causal relationship, each gaining from and building on the other. Digitization, the "bones and sinews" of globalization, has taken our lives out of the temporal and into the imaginary and unseen. Reality is no longer defined in terms of things we can see, feel, and measure; now reality is defined by ideas and by the ability of people to generate and communicate ideas. an outcome of technology, whose global impact is measured by its usefulness.

CONCEPT OF HACKING& TYPES OF HACKING:

Hacking is a broad term that refers to someone gaining access to digital files or systems without permission, usually with a nefarious intent in mind like stealing information or installing malware.

Examples of Different Types of Hacking

Hackers use brute force, security exploits, social engineering, and other means to gain access to systems without proper permission.

What they do with that access, however, can vary greatly depending on their motivations.

Here's a look at some of the different kinds of hacks and hackers to be aware of

1. Ethical Hacking

Did you know that not all hacking is illegal?

Ethical hackers are experts who work in agreement with organizations, companies, and brands in order to uncover security vulnerabilities.

Essentially, an ethical hacker will try to gain access to a network, computer, or system the same way a criminal hacker would- only if they're able, they aren't looking to cause any damage. Instead, they'll report the vulnerabilities so they can be properly patched and fixed before a malicious hacker finds them.

2. Hacktivism

Hacktivism, a combination of the words "hacker" and activism", is a form of hacking that usually isn't motivated by monetary gain.

In these cases, a religious, environmental, or other activist may gain access to a system in order to promote their own cause (or hinder the opposition).

For example, a hacktivist group might target an oppressive government regime with a DDoS attack to knock its systems offline, destroy a firewall that's used to oppress the free speech of citizens or seek to disrupt financial networks used by terrorists.

These activities are a form of cybercrime and are illegal, regardless of their motivations.

3. Identity Theft

A more common and classic motivation for hacking into a system would be to steal personal information for identity theft, including social security numbers, credit cards, bank accounts, and more.

This kind of sensitive data can be stolen in a number of different ways including:

  1.        Phishing
  2.        Social engineering
  3.        Password cracking
  4.        Keyloggers & other malware          

4. Malware Hacking

Installing malware on a victim's computer can be a key part of identity theft, but malware can have other nefarious consequences that have nothing to do with stealing your information.

For example, a hacker could recruit your computer to a botnet using Zombieware. This would have minimal impact on you, personally, but it means they could use your computer as part of a larger-scale attack on a high-value target.

A hacker might also infect your computer with ransomware to extort money out of you in exchange for your own personal files.

5. International Espionage

It's extremely common for governments to attempt to spy or gather intelligence on rival governments using hacking techniques.

Espionage to this degree could be conducted quietly in order to collect data, or it could be more malicious - for example, foreign hackers could leak internal government documents and communications to the public.

 6. Corporate Espionage

Similarly, some companies and corporations will choose to conduct espionage against their business rivals.

Though highly illegal and far from acceptable business practice, a company could try to break into a competitor's network or database to steal confidential information, business plans, communications, financial data, and more

It's also not unheard of for companies to conduct more serious attacks to cripple their competitor's websites or databases and cause financial or brand damage.

7. Ego Hacking

Finally, some hackers like to break into websites, computers, and systems simply to prove that they can.

In certain hacker communities, accomplishing difficult hacks bypassing tight security is worn as a badge of honor

 

Post a Comment

0 Comments