2021年8月18日星期三

Notes STPM F6 ICT: ICT and Multimedia Applications and Governance (Chapter 2)


Chapter 2会学到的topic:
1. Applications and Impact of ICT and Multimedia in Different Industries.
2. Contribution of ICT and Multimedia
3. Purpose of Acts in ICT and Multimedia
4. Ethical and Social Issues in Cyberspace
5. Types of Threat to ICT
 
#topic名是我自己从syllabus摘取的,方便知道这个chapter学什么。

Chapter 3 (更新中):https://itsjyzhere.blogspot.com/2021/09/notes-f6-stpm-ict-sem-1-multimedia.html

有问题可联系:mithizwen@gmail.com

PDF版本可到以下网址export自取:https://adorable-consonant-b52.notion.site/ICT-and-Multimedia-Applications-and-Gorvenance-f68f18a7f2fa4c0c8a7437471a2abd12
-----------------------------------------------------------------------------------------------

Candidates should be able to:

(a)      describe the application and impact of ICT and multimedia as an enabler in agriculture, manufacturing, e-government, Internet banking, and e-commerce that contribute towards the socio-economic development;
(b)      describe ICT and multimedia as an industry that contributes towards business opportunity and job creation;
(c)      describe the purpose of acts that govern the usage of ICT and multimedia in Malaysia: Communication and Multimedia Act 1998, Computer Crimes Act 1997, Telemedicine Act 1997 and Digital Signature Act 1997;
(d)      discuss the ethical and social issues in cyberspace of ICT and multimedia: privacy, obscenity, defamation, Internet and information security, Internet and computer crime; 
(e)      describe the types of threat to information, computer, and network security: viruses, natural disasters, cybercrime, and intrusive Internet.
-------------------------------------------------------------------------------
#以下topic的笔记请当答题思路的参考,因为没有固定的答案,更多是看合理性。建议答题的时候想自己经历过的经验,用自己的句子回答。

#以下提到的application和impact当参考就好,不是绝对答案。

Agriculture (E-Agriculture)

  • Focuses on the enhancement of agricultural and rural development through improved information and communication processes.
  • Application:
    • Get information about weather conditions in which crops should be harvested or cultivated.
    • Get information about seeds and new fertilizers that are important for crops.
    • Get familiar to many fatal diseases that are responsible for the destruction of crops and their possible solutions.
    • Get up-to-date information of import and export ratio, stock market,rise and decline of GDP.
  • Impact:
    • Improve productivity
    • Save time
#建议答题时加上人称,是谁用,例如farmer。

Manufacturing

  • Application :
    • Manufacture the products in bulk with less effort and time waste. The accuracy of each product made is exactly the way it was designed on the computer.
    • Computers in manufacturing manage raw materials, suppliers, costs, and inventory.
    • Computers in industry are used to design new and better machines, test them in the computer before they are manufactured.
    • Computer Integrated Manufacturing (CIM) :
      -Some industries are fully automated, meaning all the processes are being done by robots under computer control such as in manufacturing, book publishing, and in some electronic fabrication.
    • Computer-aided manufacturing (CAM) :
      -A programming tool that helps produce better products faster and cheaper with precision and accuracy.
      -Automobiles and other vehicles read manufactured using computer-aided and robots.
    • Automation:
      -Where devices carry out tasks without human input. -Exp: Robotic Arms in car factories
  • Impact:
    • Less cost
    • More accuracy
    • Improve productivity
#比较容易记的是robot。

E-government

  • The application of ICT to government functions and procedures with the purpose of increasing efficiency, transparency, and citizen participation.
  • Application:
    • Online payment (tax, bill, etc.)
    • Complaint and suggestions to the government
    • Provide information about the government's policy
    • Apply services provided by the government
  • Impact:
    • Allows for higher levels of effectiveness and efficiency in governmental tasks
    • Improvement of processes and procedures
    • Increases the quality of public services
    • Improves the use of information in the decision-making processes
    • Allows for better communication among different governmental offices.
    • Developing transparency, government accountability, and reducing corruption
#也可以配合当下情况,online apply for vaccine

Internet banking

  • Application:
    • Check account balance
    • Online payment
    • Online transfer funds
    • Check recent transactions
  • Impact:
    • Save Time
    • Improve productivity
#这个应该不难吧....

E-commerce

  • Application of ICT in business and commerce.
  • Application:
    • Connect sellers and customers.
    • Allow effective management of customer orders, deliveries, returns, and payments of purchased goods
  • Impact:
    • Makes a business more efficient, effective, and promptly responds to customers' needs.
    • Assist business activities including design, manufacturing, R&D, distribution and sales, and feedback.
#网络购物应该都有经历过吧?用自己的购物体验去回答就好了~

-------------------------------------------------------------------------------------
#这个topic关于ICT as an industry所贡献的商业机会和职业创造。同样的,是很flexible的一个,所以以下内容当作参考

Business opportunity

  • Benefits:
    • Speed-Data can be stored, processed and searched extremely fast.
    • Volume-Vast quantities of data can be stored in small amounts of space.
    • Less paper work-Computers remove the need for huge quantities of paperwork.
    • Connectivity-Can share data or hold meetings in different countries
  • Exp:
    • Outsourcing & Open Source Tech
    • Internet Marketing
    • Mobile Application Development
    • Financial Sector (ICT)
    • Government Sector
    • Infrastructure Projects in ICT

Job Creation

  • Network Managers/Technicians -make sure computers on the network run smoothly and are secure.
  • Web Design -create websites and keep them up-to-date.
  • System Analyst -responsible for designing new ICT systems
  • Computer Programmers -create all the software that be used on the computer
  • Computer Engineers -build high-tech computers.
-------------------------------------------------------------------------------------
#同样的当参考。历年考题很少问到cyber law(很teory的那种),大概知道每个act的作用是什么。

Communication and Multimedia Act 1998

  • Provide a generic set of regulatory provisions based on generic definitions of market and service activities and services.
  • To regulate communications over networked electronic media, including telecommunication networks, traditional broadcasting, and online services, in anticipation of convergence.
  • Creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services.
  • Offences:
    • Sharing of offensive and menacing content. 
    • Provides any obscene communication for commercial purposes to any person.
  • Effects:
    • Ensures the information is secure, the network is safe, reliable and the service is affordable all over Malaysia.
    • Ensures a high level of user confidence in the information and communication technology industry.

Computer Crimes Act 1997

  • Created several offenses relating to the misuse of computers.
  • To prevent computer crimes such as hacking, virus planting, and the cracking of passwords.
  • Protection against the misuse of computers and computer criminal activities is ensured by the Act.
  • Offences:
    • Unauthorized access to computer material.
    • Unauthorized modification of the contents of any computer.
    • Illegal transmission of data or messages over computers.
    • Hacking or cracking of computer systems and networks.
  • Effect:
    • Users can protect their rights to privacy and build trust in the computer system.
    • Enable government to track the illegal activities ,thus reducing cyber crimes cases.

Telemedicine Act 1997

  • Enacted to regulate and control the practice of telemedicine and other connected matters.
  • It covers who can practice telemedicine, how to apply to practice telemedicine and the setting of telemedicine practice standards.

//Telemedicine:
-uses information and communication technology to provide medical services from a distance.
-Includes:
~transmitting medical images for a doctor’s analysis
~remote monitoring for chronic disease management
~real-time videoconferencing or electronic consultations between patient and doctor.

Digital Signature Act 1997

  • Secure electronic communication especially on the Internet.
  • To regulate the use of digital signature and to provide for additional matters connected to its use in Malaysia.
  • Facilitates e-business and e-commerce activities by using the digital signature instead of a conventional handwritten signature in legal and commercial transactions.
  • Sets out a mandatory licensing scheme for CA (being the issuers of digital certificates), recognised repositories, and recognised date/time stamp authority.
  • An identity verification standard using encryption techniques to protect against e-mail forgery.
  • The encrypted code consists of the user's name and a hash of all the parts of the message.
  • Effects:
    • Ensure nobody can eavesdrop, intercept or temper with the transmitted data.
    • Ensure a more secure and a safer electronic communication.

#我尽量缩减了,但是毕竟关于法律法规,用词是比较难记....找资料时也难。虽然如此,不要太担心考题,很少会问这几个act的用处(但不代表可以忽略)。如果看回往年的考题,关于cyber crime出的都比较简单,答案看合不合理的类型。完全跟着syllabus出很少...

#也可以参考这个:http://ictf6.blogspot.com/2012/07/the-purpose-of-acts-that-govern-usage.html
-------------------------------------------------------------------------------------

#里面提到的issues和ways都当作参考,不是绝对答案。

Privacy

  • Relates to any rights you have to control your personal information and how it’s used.
  • Issues:
    • Identity theft
    • Stealing of personal information
    • Data usage by advertising companies.
  • Ways to protect privacy:
    • Limit what you share on social media and online in general.
    • Change password frequently.
    • Guard your IC number.
    • Safeguard your data and devices. Do not access unknown networks.
    • Understand how the information you’re giving away could be used.

Obscenity

  • Any statement or act which strongly offends the prevalent morality of the time.
  • Behaviour, art, or language that is sexual and offends or shocks people.
  • Refers to a narrow category of pornography that violates contemporary community standards and has no serious literary, artistic, political, or scientific value.
  • Issues:
    • Pornographic websites, pornographic online magazines
    • Download and transmit pornographic pictures on the Internet
    • The offender may even part messages using filthy language.
//猥亵,淫秽的言语or行为。

Defamation

  • A false statement related to someone's reputation is published with fault, often as a result of malice or negligence.
  • Using the internet as a tool to defame and malign another person.
  • Types:
    • Libel (written defamation)
    • Slander (Verbal defamation)
//诽谤

Internet and Information Security

  • Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
  • Issues:
    • Computer system intrusion.
    • Unauthorized access to, or use of, systems, software, or data.
    • Unauthorized changes to systems, software, or data
  • Ways to protect:
    • Encrypt your data.
    • Backup ypur data.
    • Install anti-malware software.
    • Use firewall.

Internet and Computer Crime

  • Refers to any crime that involves a computer and a network.
  • Issues:
    • Improperly accessing a computer, system, or network
    • Modifying, damaging, using, disclosing, copying, or taking programs or data
    • Introducing a virus or other contaminant into a computer system
    • Using a computer in a scheme to defraud
    • Interfering with someone else's computer access or use
  • Ways to protect:
    • Keep software and OS updated
    • Use up-to-date anti-virus software
    • Use strong passwords
    • Never open attachments in spam emails
    • Do not click on links in untrusted websites and emails
#其实这个topic挺容易的。考题常出的方式,给你一个issue的描写,问什么方法去防范。没有很难回答吧,万能答案如password,firewall,do not share personal information这些。
-------------------------------------------------------------------------------------
#注意这个topic有很多extra notes,可以根据学校笔记选择要记的东西

Viruses

  • A program written to alter the way a computer operates, without the permission or knowledge of the user.
  • A virus replicates and executes itself, usually doing damage to your computer in the process.
  • Can cause significant operational issues and data loss.
  • Other similar threats:
    • Worm
      • A specific type of virus.
      • Unlike a typical virus, its goal isn't to alter system files but to replicate them so many times that it consumes hard disk space or memory.
      • Worm victims will notice their computers running slower or crashing.
    • Trojan
      • Programs that masquerade as normal, safe applications, but their mission is to allow a hacker remote access to your computer.
      • In turn, the infected computer can be used as part of a denial of service attack and data theft can occur.
      • Can gain access to sensitive data and then modify, block, or delete the data.
      • Not designed to self-replicate.
#曾经出过两张图片显示不同的malware特性,然后根据图片,写出它们的types。


Natural Disasters

  • A natural event that causes great damage or loss of life.
  • Causes damage to buildings and computer hardware can result in data loss.
  • Exp:
    • Earthquakes
    • Floods
    • Tsunamis

Cyber Crime

  • Criminal activity that either targets or uses a computer, a computer network, or a networked device.
  • Exp:
    • Cyberstalking.
    • Cyberbullying.
    • Email and internet fraud.
    • Identity fraud (where personal information is stolen and used).
    • Theft of financial or card payment data.
    • Theft and sale of corporate data.

Intrusive Internet

  • Spam

    • Electronic junk mail.
    • Comes in the form of an advertisement
    • Causes time-wasting, has the ability to consume precious network bandwidth.
  • Cookies

    • To gather information about you without your authorization.
    • May causes privacy issues.
    • Cookies themselves are not harmful, can't infect computers with viruses or malware, but cyber attacks can hijack cookies and access to your browsing sessions.
  • Malware (Malicious software)

    • Refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems.
    • Examples:
      -viruses
      -worms
      -Trojan viruses
      -spyware
      -adware
      -ransomware.

      //malware可以说是很多threat的统称。
  • Spyware

    • Malicious software that runs secretly on a computer and reports back to a remote user.
    • Infection ways: Shareware and freeware downloads, peer-to-peer file sharing
    • Targets sensitive information.
    • To gather a user's information by monitoring Internet activity and transmitting that to an attacker.
    • Exp: keylogger (records your keystrokes to reveal passwords and personal information)
  • Adware

    • Observe a user's internet browsing habits.
    • To determine the type of ads a user may be most likely to view or interact with.
    • It automatically generates target-specific ads in order to bring in revenue for the person or company that created it.
  • Phishing

    • A type of cybercrime in which criminals pose as a trustworthy source online to lure victims into handing over personal information such as usernames, passwords, or credit card numbers.
    • Sending forged email directing the recipient to a fake website.
    • Makes a fake website looks like a real website.
    • To attract people to share personal or financial data.
      //制作假链接,但跟真的链接很像。受害者点进假链接后,在假网站做的东西都会被对方知道。常见是假的bank website链接。
  • Pharming

    • Implanting malicious software on a victim's computer that redirects the user to another web page even types the correct address.
#由于曾经出过图片的考题方式,我建议大家去看一下相关影片,更方便大家想象这些threat是怎样的
--------------------------------------------------------------------------------
关于chapter 2,考题很喜欢问example的方式,当然也有很teory的问题。像这种类型的题目,答题的时候更多是看合理没有。

没有评论:

发表评论