0% found this document useful (0 votes)
82 views61 pages

CYBERCRIME

The document discusses the history of computers and computer systems. It covers the three generations of computers from 1937 to present. It also discusses hardware, software, computer systems, input and output devices, storage, and social media ethical issues.

Uploaded by

Sarah Jane Diaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views61 pages

CYBERCRIME

The document discusses the history of computers and computer systems. It covers the three generations of computers from 1937 to present. It also discusses hardware, software, computer systems, input and output devices, storage, and social media ethical issues.

Uploaded by

Sarah Jane Diaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 61

CDIN 329

Introduction to Cybercrime
and Environmental laws
and Protection
LEARNING OUTCOMES

At the end of the unit, the students should be able to:


a) Discuss the historical development of computer and
internet.
b) Summarize the advantages and risks of information
and communication technologies.
c) Enumerate the different ethical issues that users of
social networking sites face.
THE COMPUTER AND THE
COMPUTER SYSTEMS
History of the Computer

• 19th century English


mathematics professor
named Charles Babbage
designed the Analytical
Engine
THREE GENERATIONS OF COMPUTERS
First generation: 1937 — 1946
- In 1937 the first electronic digital computer was built by Dr. John
V. Atanasoff and Clifford Berry. It was called the Atanasoff-Berry
Computer (ABC).
- In 1943 an electronic computer name the Colossus was built for
the military.
- Other developments continued until in 1946 the first general—
purpose digital computer, the Electronic Numerical Integrator
and Computer (ENIAC) was built. It is said that this computer
weighed 30 tons, and had 18,000 vacuum tubes which was used
for processing.
Atanasoff-Berry Computer
Colossus
ENIAC
THREE GENERATIONS OF COMPUTERS…
Second generation: 1947 — 1962
- This generation of computers used transistors instead of vacuum
tubes which were more reliable. In 1951 the first computer for
commercial use was introduced to the public; the Universal
Automatic Computer (UNIVAC 1).
- In 1953 the International Business Machine (IBM) 650 and 700
series computers made their mark in the computer world.
During this generation of computers over 100 computer
programming languages were developed, computers had
memory and operating systems.
UNIVAC 1
(IBM) 650 and 700
Third generation: 1963 - present
- The invention of integrated circuit brought us the
third generation of computers.
- In1980 Microsoft Disk Operating System (MS-
Dos) was born and in 1981 IBM introduced the
personal computer (PC) for home and office use.
- Three years later Apple gave us the Macintosh
computer with its icon driven interface and the
90s gave us Windows operating system.
What does Computer mean?
COMPUTER is a machine or
device that performs
processes, calculations and
operations based on
instructions provided by a
software or hardware
program.
Hardware
• refers to the computer's tangible
components or delivery systems
that store and run the written
instructions provided by the
software.
Software
• The entire collection of programs,
procedures, and routines involved
with the operation of a computer
system is referred to as software.
Types of Software

1. System Software
• The interface, or intermediary, is system software. It
allows you to connect with other devices as well as
hardware. Device software is divided into five categories.
They are designed to automate the relationship between
software, hardware, and the user by controlling and
coordinating the roles and procedures of computer
hardware.
Types of System Software

1. Operating system (OS)


2. Device Drivers
3. Firmware
4. Programming language translators
5. Utilities
2. Application Software

• A computer program that performs a particular


purpose, whether educational, personal, or business-
related. It is also known as productivity program or
an end-use program. Consider system software to be
a cake, and program software to be the icing on top.
When dealing with applications, it is the device
software (frosting) that you, the user, see up front.
The application software includes:

1. Presentation Software
2. Web Browsers
3. Multimedia Software
4. Education and Reference Software
5. Graphics Software
6. Spreadsheet software
7. Database software
8. Word Processing Software
9. Simulation Software
• Freeware
• Shareware
• Open Source
• Closed Source
Computer System
• Is a system that can process a collection
of inputs and produce a set of outputs.
• A combination of hardware and software
is used to do this. It is equipped with data
input modules. After that, the data is
interpreted in a specific manner.
The Four (4) Categories of Computer System

1. Input - any hardware component that allows the user to enter


data into the computer.
2. Processing - Within the device components that transfer and
process data. This includes the motherboard, as well as the
processor and memory chips.
3. Output - Components that provide the production results to
consumers, such as a monitor and printer.
4. Storage - Components such as hard drives that hold software
and data before they are required.
INPUT
g. Microphone
a. Keyboard
h. Webcam
b. Computer mouse
i. Game controller
c. Graphic tablet
j. Light pen
d. Touchscreen
k. Scanner
e. Barcode reader
I. Digital camera
f. Image scanner
OUTPUT

a. Monitor f. Floppy disk drive


b. Printer g. Flash drive
c. Projector h. Disk drive
d. Speaker I Smartphone or Tablet
e. Storage j. CD/DVD drive
devices
The Different Technologies Used To Input Data
1. Keyboard Entry - allows the user to type details. The
keyboard transforms human-readable data into electrical
signals. The system unit receives and processes these
signals.

Categories of Keyboards :
a. Traditional keyboards
b. Laptop keyboards
c. Virtual keyboards
The Different Technologies Used To Input Data…

2. Pointing Devices -By accepting physical


motions or expressions, these provide a
natural interaction with the device object.

Mouse - This is used to guide a pointer on the


board.
The Different Technologies Used To Input Data…
Touch Screen - Touching the screen with a finger or a pen-like
interface helps users to choose actions or commands.

Game Controllers - These are devices that provide input to


computer games.
Four (4) Specialized Game Controllers
a. Joysticks
b. Gaming mouse
c. Gamepads
d. Motion-sensing devices
The Different Technologies Used To Input Data…
Stylus -A stylus is a pen-like interface that is often used on tablets and
smartphones.

3. Scanning Devices - Translate scanned text and photographs into a


format that can be processed by the machine unit.

4. Image Capturing Devices - A capture system can take still photographs


or videos in motion.

5. Audio-Input Devices - These translate sounds into a format that the


system device can understand.
The Different Technologies Used To Produce an Output

1. Monitors - Also known as display screens, monitors


display text and icon in digital images.
2. Printers - These devices take the information that has
been processed by the system unit and print it out.
3. Audio-Output Systems - These devices convert audio
data from a computer into audible signals that people
can hear.
Storage Medium (Storage Media)

- receive messages in the form of data from the


computer system through software
commands.
- Based on the data's business value, regulatory
effects, and other considerations, the
commands specify the form of storage media
used to store it.
Storage
1. Primary Storage - Data and program
instructions for data processing are stored .Main
storage is referred to as RAM.
2. Secondary Storage - Hard disk drives, solid
state drives, CDs, DVDs, and network and cloud-
based computing are also examples of secondary
storage.
Common storage media:
1. Hard Drive- This medium comes with the
computer and is always inside the computer. It
stores all the programs that the computer needs
to work. In addition users store their data and
information on the hard drive.
2. Floppy disk- a portable storage medium. You put it
into the computer save information on it, take it
out and take it with you wherever you go.
3. CD & DVD- hold much more information than a
floppy disk and considered also as a portable storage.
You can only save information but you cannot erase
it.

4. USB Flash drive- very easy to carry around and it


also holds more data than a floppy disk.
Internet
• Simply called “net”.
• The Internet Timeline begins in 1962, before the
word 'Internet' is invented.
• The online world then took on a more
recognizable form in 1990, when computer
scientist Tim Berners Lee invented the World
Wide Web.
• Vint Cerf. Widely known as a "Father of the
Internet," Cerf is the co-designer of the TCP/IP
protocols and the architecture of the Internet.

• In December 1997, President Bill Clinton


presented the U.S. National Medal of Technology
to Cerf and his colleague, Robert E. Kahn, for
founding and developing the Internet.
THE SOCIAL MEDIA
SOCIAL MEDIA

• The means of interactions among


people in which they create, share,
and/or exchange information and
ideas in virtual communities and
networks.
Social Networking Ethical Issues
1. Cyberbullying

• Harassment, torment,
ridicule, or threats directed
at a minor by another
minor or a group of minors
over the Internet or by
phone.
• Females and 15-to 16-year-
olds are most likely to be
victims.
2. Cyber Stalking

• Is a form of cyber bullying


that consists of a long-term
pattern of unwelcome,
continuous pursuit and
disruptive activity (involving
the use of an electronic
communications device)
directed at another user,
causing fear and anxiety in the
victim.
3. Encounters with Sexual
Predators-

• By incorporating sex talk and


then planning to visit youth
in person for sexual
encounters, sexual offenders
use online messaging to
build trust and faith in their
victims, who are usually
teenagers.
4. Uploading of Inappropriate
Material
• Most social networking sites have
terms of service agreements,
privacy policies, or material codes
of ethics that summarize the
platform's core legal, aspects.
• Non-consensual posts that
contain private images or videos
of people without their consent
are often referred to as "revenge
porn."
TOP 10 SOCIAL MEDIA PLATFORMS PER MONTHLY ACTIVE USERS (MAU)
COMPUTER PRIVACY AND CYBERSECURITY

• Cyber security awareness encourages basic


knowledge of cyber vulnerabilities and risks,
as well as cyber hygiene and effective solution
options.
• When people are faced with cyber threats, it
educates them on best practices and
preventive steps.
Measures To Protect Computer Security

1. Restricting Access- Biometric scanning systems and


passwords, as well as code words and phrases, may be
used to limit access.

2. Encrypting Data- Unauthorized access is a risk of


information is transmitted over a network or stored
on a computer server.
- The alternative is cryptography
3. Anticipating disasters- companies and
individuals can prepare for disasters by
implementing a disaster response strategy.

4. Preventing Data Loss- Data backups can be


performed on a regular basis to avoid data
failure.
Trustworthy Computing

• A form of computing that provides secure,


Private, and consistent computing
experiences.
Four Pillars of Trustworthy:

 1 pillar: Security
st

Invest in the knowledge and technologies


needed to provide a secure environment.
 2 pillar: Privacy
nd

Make privacy a top priority in


product design, production, and
testing.
 3 Pillar: Reliability
rd

Build a device that can continue to


deliver service in the midst of
internal or external disruptions
 4th Pillar: Business Integrity

Be sensitive by accepting blame for


issues and taking steps to resolve
them.
2. Establish Security Policy
A security strategy lays out an organization's security criteria, as well
as the safeguards and sanctions that must be in place to fulfill such
requirements

Documented protocols should be in place for the following:

a. Using an electronic framework (password guidelines).


b. Using e-mail attachments.
c. Using cellular computers to view company e-mail, store classified
data, and run sensitive applications.
3. Educate Employees, Contractors, and Part-Time
Workers

- They must be trained about the value of security


in order to be motivated to comprehend and
adhere to security policies.
4. Install Detection System

• An intrusion detection system (IDS)


detects system and network resources
and operations using software and/or
hardware.
5. Create Response Plan

• A contingency strategy should be


formulated well ahead of any incident
and approved by both the legal
department and senior management of
the organization.
The following items should be included in the
response plan:

1. Incident Notification
2. Evidence Protection And Activity Logs
3. Incident Containment
4. Eradication
5. Incident Follow-Up
Internet

• called simply "the Net," is a worldwide


system of computer networks – a network
of networks in which users at any computer
can, if they have permission, get to users at
other computers).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy