BASIC CONCEPT OF INFORMATION TECHNOLOGY
CONCEPT OF ICT:
Information and Communications Technology (ICT) is an
extensional term for information technology (IT) that stresses the role of
unified communications and the integration of telecommunications (telephone
lines and wireless signals) and computers, as well as necessary enterprise
software, middleware, storage, and audiovisual systems, that enable users to
access, store, transmit, and manipulate information.
Some of the key concepts of Information and Communication
Technology (ICT), such as those relating to networks and security:
•
Understand what hardware
is, know about factors that affect computer performance and know about the
peripheral devices.
·
Understand what software is
and give examples of common applications software and operating system
software.
·
Understand what Information
and Communication Technology (ICT) is and give examples of its practical
applications in everyday life.
·
Understand health and
safety and environmental issues in relation to using computers.
·
Recognize the important
security issues associated with using computers.
•
Recognize the important
legal issues in relation to copyright and data protection associated with using
computers.
IMPORTANCE OF ICT:
Information and Communications Technology (1CT) has an
important role in the world since we are now in the information age era. With
CT, the company can make the business easier to happen with the client,
supplier, and distributor. It is also very important in our daily lives. The
lack of appropriate information at the right time will result in low
productivity, low-quality research work, and waste of time to pursue
information and even to do research which actually others had done or in other
countries. Nowadays ICT cannot be separated from our daily needs.
ICT has a great impact in our daily lives. For example, we
can read our local newspaper using the online newspaper. Another example is we
still can get connected with our family, relatives, or colleagues even if we
are abroad by using electronic mail, yahoo messenger, call conference, or
video conference.
Digital computers and networking have changed our economy
concept to the economy with no boundary in time and space because of ICT. It
brings a lot of advantages for economic development enabling millions of
transactions to happen in an easy and fast way.
ICT is one of the economic development pillars to gain a national competitive advantage. It can improve the quality of human life
because it can be used as a learning and education media, the mass communication
media in promoting and campaigning practical and important issues, such as the
health and social area. Lt provides wider knowledge and can help in gaining and
accessing information.
ICT has become an integral part of everyday life for many
people. It increases its importance in people's lives and it is expected that
this trend will continue, to the extent that ICT 1literacy will become a
functional requirement for people's work, social, and personal lives.
The use of ICT in education adds value in teaching and
learning, by enhancing the effectiveness of learning, or by adding a dimension
to learning that was not previously available. ICT may also be a significant
motivational factor in students learning and can support students' engagement
with collaborative learning.
Information and Communications Technology (ICT) is basically
our society's efforts to teach its current and emerging citizens valuable
knowledge and skills around computing and communications devices, software that
operates them, applications that run on them and systems that are built with
them.
As a matter of fact, we are living in a constantly evolving
digital world. ICT has an impact on nearly every aspect of our lives - from
working to socializing, learning to playing. The digital age has transformed
the way young people communicate, network, seek help, access information and
learn. We must recognize that young people are now an online population and
access is through a variety of means such as computers, TV and mobile phones.
It is in this premise that educational technology and
e-learning is taught in or out of the classroom since educational technology is
used by learners and educators in homes, schools, businesses, and other
settings.
GLOBALIZATION: REVOLUTION OF ICT:
Globalization, digitization, and Information &
Communication Technology are integrally connected in this new millennium.
Globalization and technology share a causal relationship, each gaining from and
building on the other. Digitization, the "bones and sinews" of
globalization, has taken our lives out of the temporal and into the imaginary
and unseen. Reality is no longer defined in terms of things we can see, feel,
and measure; now reality is defined by ideas and by the ability of people to
generate and communicate ideas. an outcome of technology, whose global impact
is measured by its usefulness.
CONCEPT OF HACKING& TYPES OF HACKING:
Hacking is a broad term that refers to someone gaining
access to digital files or systems without permission, usually with a nefarious
intent in mind like stealing information or installing malware.
Examples of Different Types of Hacking
Hackers use brute force, security exploits, social
engineering, and other means to gain access to systems without proper permission.
What they do with that access, however, can vary greatly
depending on their motivations.
Here's a look at some of the different kinds of hacks and
hackers to be aware of
1. Ethical Hacking
Did you know that not all hacking is illegal?
Ethical hackers are experts who work in agreement with
organizations, companies, and brands in order to uncover security
vulnerabilities.
Essentially, an ethical hacker will try to gain access to a
network, computer, or system the same way a criminal hacker would- only if
they're able, they aren't looking to cause any damage. Instead, they'll report
the vulnerabilities so they can be properly patched and fixed before a
malicious hacker finds them.
2. Hacktivism
Hacktivism, a combination of the words "hacker"
and activism", is a form of hacking that usually isn't motivated by
monetary gain.
In these cases, a religious, environmental, or other activist may gain access to a system in order to promote their own cause (or
hinder the opposition).
For example, a hacktivist group might target an oppressive
government regime with a DDoS attack to knock its systems offline, destroy a
firewall that's used to oppress the free speech of citizens or seek to disrupt
financial networks used by terrorists.
These activities are a form of cybercrime and are illegal,
regardless of their motivations.
3. Identity Theft
A more common and classic motivation for hacking into a
system would be to steal personal information for identity theft, including
social security numbers, credit cards, bank accounts, and more.
This kind of sensitive data can be stolen in a number of
different ways including:
- • Phishing
- • Social engineering
- • Password cracking
- • Keyloggers & other malware
4. Malware Hacking
Installing malware on a victim's computer can be a key part
of identity theft, but malware can have other nefarious consequences that have
nothing to do with stealing your information.
For example, a hacker could recruit your computer to a
botnet using Zombieware. This would have minimal impact on you, personally, but
it means they could use your computer as part of a larger-scale attack on a
high-value target.
A hacker might also infect your computer with ransomware to
extort money out of you in exchange for your own personal files.
5. International Espionage
It's extremely common for governments to attempt to spy or
gather intelligence on rival governments using hacking techniques.
Espionage to this degree could be conducted quietly in order
to collect data, or it could be more malicious - for example, foreign hackers
could leak internal government documents and communications to the public.
Similarly, some companies and corporations will choose to
conduct espionage against their business rivals.
Though highly illegal and far from acceptable business
practice, a company could try to break into a competitor's network or database
to steal confidential information, business plans, communications, financial
data, and more
It's also not unheard of for companies to conduct more
serious attacks to cripple their competitor's websites or databases and cause
financial or brand damage.
7. Ego Hacking
Finally, some hackers like to break into websites,
computers, and systems simply to prove that they can.
In certain hacker communities, accomplishing difficult
hacks bypassing tight security is worn as a badge of honor
0 Comments