5403 Assignment 2
5403 Assignment 2
5403 Assignment 2
Use of the Internet has increased dramatically as user demands for more and different
products and services have grown. At the same time, businesses have come to rely more and
more on online advertising, communications, and transactions. Some businesses today even exist
only online. The Internet has shaken the foundations of traditional media, particularly that of
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
books, magazines, newspapers, and other forms of print, and has also sharply changed how the
film, recording, and television industries operate. In fact, change is one of the few constants
connected to the Internet as technology continues its brisk evolution, providing people with new,
different, and often better ways to communicate and conduct business.
The Internet carries many applications and services, most prominently the World Wide
Web, including social media, electronic mail, mobile applications, multiplayer online
games, Internet telephony, file sharing, and streaming media services.
Most servers that provide these services are today hosted in data centers, and content is
often accessed through high-performance
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public
websites or pages that users can access on their local computers and other devices through
the internet. These pages and documents are interconnected by means of hyperlinks that users
click on for information. This information can be in different formats, including text, images,
audio and video
The term World Wide Web isn't synonymous with the internet. Rather, the World Wide
Web is part of the internet.
Paving the way for an internet revolution that has transformed the world in only three
decades, the World Wide Web consists of multiple components that enable users to access
various resources, documents and web pages on the internet. Thus, the WWW is like a vast
electronic book whose pages are stored or hosted on different servers worldwide.
These pages are the primary component or building blocks of the WWW and are linked
through hyperlinks, which provide access from one specific spot in a hypertext or hypermedia
document to another spot within that document or a different one. Hyperlinks are another
defining concept of the WWW and provide its identity as a collection of interconnected
documents.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
Hypertext is a method for instant information cross-referencing that supports
communications on the web. Hypertext makes it easy to link content on one web page to content
on another web page or site. Hypertext and HTTP enable people to access the millions of
websites active on the WWW.
The Hypertext Transfer Protocol (HTTP) is another key component of the WWW. It
enables users to access web pages by standardizing communications and data transfer between
the internet's servers and clients.
Most web documents and pages are created using Hypertext Markup Language (HTML),
a text-based way of describing how content within an HTML file is structured. HTML describes
the structure of web pages using elements or tags and displays the content of these pages through
a web browser.
To access one of these pages, a user and their client machine supply a universal identifier to the
web server via a browser. This identifier may be a uniform resource locator (URL) or uniform
E-mail is defined as the transmission of messages on the Internet. It is one of the most
commonly used features over communications networks that may contain text, files, images, or
other attachments. Generally, it is information that is stored on a computer sent through a
network to a specified individual or group of individuals.
Email messages are conveyed through email servers; it uses multiple protocols within
the TCP/IP suite. For example, SMTP is a protocol, stands for simple mail transfer protocol and
used to send messages whereas other protocols IMAP or POP are used to retrieve messages from
a mail server. If you want to login to your mail account, you just need to enter a valid email
address, password, and the mail servers used to send and receive messages.
Although most of the webmail servers automatically configure your mail account,
therefore, you only required to enter your email address and password. However, you may need
to manually configure each account if you use an email client like Microsoft Outlook or Apple
Mail. In addition, to enter the email address and password, you may also need to enter incoming
and outgoing mail servers and the correct port numbers for each one.
The email was developed to support rich text with custom formatting, and the original email
standard is only capable of supporting plain text messages. In modern times, email
supports HTML (Hypertext markup language), which makes it capable of emails to support the
same formatting as websites. The email that supports HTML can contain links, images, CSS
layouts, and also can send files or "email attachments" along with messages. Most of the mail
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
servers enable users to send several attachments with each message. The attachments were
typically limited to one megabyte in the early days of email. Still, nowadays, many mail servers
are able to support email attachments of 20 megabytes or more in size.
In 1971, as a test e-mail message, Ray Tomlinson sent the first e-mail to himself. This email
was contained the text "something like QWERTYUIOP." However, the e-mail message was still
transmitted through ARPANET, despite sending the e-mail to himself. Most of the electronic
mail was being sent as compared to postal mail till 1996
SOCIAL MEDIA
Social media refers to the means of interactions among people in which they create,
share, and/or exchange information and ideas in virtual communities and networks. The Office
of Communications and Marketing manages the
main Facebook, Twitter, Instagram, LinkedIn and YouTube accounts.
We offer an array of tools, including one-on-one consults with schools, departments and
offices looking to form or maintain an existing social media presence to discuss social media
goals and strategy, as well as offer insights and ideas. Before creating any social media account,
you must submit the Account Request Form. Be sure to check with your school’s
communications office for any school specific regulations or branding guidelines
Social media is about conversations, community, connecting with the audience and
building relationships. It is not just a broadcast channel or a sales and marketing tool.
Social media not only allows you to hear what people say about you, but enables you to
respond. Listen first, speak second.
Be compelling, useful, relevant and engaging. Don’t be afraid to try new things, but think
through your efforts before kicking them off.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
Popular Social Media Tools and Platforms:
Blogs: A platform for casual dialogue and discussions on a specific topic or opinion.
Facebook: The world’s largest social network, with more than 1.55 billion monthly active users
(as of the third quarter of 2015). Users create a personal profile, add other users as friends, and
exchange messages, including status updates. Brands create pages and Facebook users can “like”
brands’ pages.
Twitter: A social networking/micro-blogging platform that allows groups and individuals to stay
connected through the exchange of short status messages (140-character limit).
Flickr: An image and video hosting website and online community. Photos can be shared on
Facebook and Twitter and other social networking sites.
Instagram: A free photo and video sharing app that allows users to apply digital filters, frames
and special effects to their photos and then share them on a variety of social networking sites.
LinkedIn: A place where groups of professionals with similar areas of interest can share
information
STREAMING MEDIA
Streaming refers to any media content – live or recorded – delivered to computers and
mobile devices via the internet and played back in real time. Podcasts, webcasts, movies, TV
shows and music videos are common forms of streaming content.
Live streaming is the broadcast of an event over the internet as it happens. Awards
shows, sports, boxing matches, video games and special one-time events are the most popular
types of live streaming with an ever-growing menu of topics.
There are a number of streaming devices available, each with their own unique features.
Whether you want a hands-free option, ample internal storage, something affordable and/or 4K
accessibility, there’s a streaming device for you. Search for reviews by reputable companies and
consider alternate options such as a gaming console or a set-top box from your TV provider.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
Verizon offers the Stream TV, which supports services like Disney+, Hulu, ESPN, Pluto
TV, MLB TV, HBO, STARZ, Prime Video and Netflix. Compatible with 4K Ultra HD content,*
it gives you 4 times the resolution of Full HD with a deeper and wider color range. Built-in
Chromecast allows you to stream select videos, pictures and music from your phone to your TV.
Customize your content by pinning your favorite apps or content to your home screen for easy
browsing. Stream TV is easy to set up, allowing you to jump right into your next binge-watch.
If you have Fios, Fios TV One is a powerful all-in-one with voice remote and seamless
Netflix integration to get to what you want to watch faster – including select shows in 4K quality
FILE SHARING
File sharing is the practice of distributing or providing access to digital media, such as
computer programs, multimedia (audio, images and video), documents or electronic books.
Common methods of storage, transmission and dispersion include removable media, centralized
servers on computer networks, Internet-based hyperlinked documents, and the use of
distributed peer-to-peer networking.
File sharing technologies, such as Bit Torrent, are integral to modern media piracy, as
well as the sharing of scientific data and other free content.
From the early 2000s until the mid-2010s, online video streaming was usually based on
the Adobe Flash Player. After more and more vulnerabilities in Adobe's flash became
known, YouTube switched to HTML5 based video playback in January 2015.
Data synchronization in general can use other approaches to share files, such as distributed file
systems
In addition to file sharing for the purposes of entertainment, academic file sharing has
become a topic of increasing concern, as it is deemed to be a violation of academic integrity at
many schools. Academic file sharing by companies such as Chegg and Course Hero has become
a point of particular controversy in recent years.This has led some institutions to provide explicit
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
guidance to students and faculty regarding academic integrity expectations relating to academic
file sharing.
In 2004, there were an estimated 70 million people participating in online file sharing.
According to a CBS News poll in 2009, 58% of Americans who follow the file-sharing issue,
considered it acceptable "if a person owns the music CD and shares it with a limited number of
friends and acquaintances"; with 18- to 29-year-olds, this percentage reached as much as 70%.
In his survey of file-sharing culture, Caraway (2012) noted that 74.4% of participants
believed musicians should accept file sharing as a means for promotion and distribution. This
file-sharing culture was termed as cyber socialism, whose legalization was not the
expected cyber-utopia.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
Q2 Why cell phones are being considered the good examples of
ICT? Explain and exemplify it in detail.
Ans:
Cell phones are considered a good example of Information and Communication
Technology (ICT) for several reasons:
Connectivity
Cell phones allow users to stay connected to the internet and make calls and send
messages from anywhere in the world, providing seamless communication and access to
information.
Versatility
Cell phones are multi-functional devices that allow users to access a wide range of
applications, such as email, social media, navigation, entertainment, and many more, making
them an all-in-one device for personal and professional use.
Mobility
Cell phones are designed to be portable and can be carried around easily, providing users
with access to information and communication on the go.
Convenience
Cell phones make many tasks much more convenient and faster, such as online shopping,
banking, and accessing educational resources.
Advancements in technology: Cell phones are constantly improving, with new features
and capabilities being added regularly, such as high-resolution cameras, artificial intelligence,
and augmented reality, making them an ever-evolving tool for communication and information.
These features of cell phones make them a prime example of how ICT is changing the
way we communicate and access information, improving our quality of life and efficiency. For
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
instance, a person can use their cell phone to make a video call to a friend or family member
across the world, access the latest news and information from anywhere, and even use
augmented reality apps to virtually try on clothes before making a purchase. These are just a few
examples of the many ways cell phones are being used as a tool for ICT.
Cell phones are considered a good example of ICT and it can be justified by the
following points:
It refers to the combination of manufacturing and industrial services that capture, transmit
and display data and information.
The various services and appliances can be done with ICT such as video conferencing
and distance learning.
Moreover, the mobile phone is a perfect example of an ICT tool because the mobile
phone is a technology used for information and communication
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
Q3 Submit a 3-4 pages’ report on the usefulness and characteristics of ICT in the
field of science.
Ans:
ICT has had a huge impact on research, enhancing data analysis, communication, and
teaching while posing problems including data security and the need for specialized training.
The Characteristics of ICTs Most representative are their ability to improve intellectual
skills, compatibility with other teaching aids, can be used from anywhere, focus on objectives,
reduced storage space and others that are explained below.
Currently there is a confrontation of opinions between teachers and teachers who have
many years of experience and those who start their careers today.
Use of ICT in the classroom or continue with the traditional textbook? That is the
question. And for this reason, we must not miss the opportunity that offers us today, to continue
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
learning and informing us about what can improve the work of the teacher in the classroom and
with students.
ICTs in education
Technological Education is an area introduced in the study of education that focuses its
analysis on the human being and its relationship with the artificial world. A new vision of the
world that tries to answer the problems from the point of view of technology, giving solutions
and proposing answers.
It is in the educational context when the community is positioned in the perspective that
technology is a way of thinking and changing reality, in a more or less right way. For this reason,
if we bet that technology education can intervene in our own culture we can achieve that all this
favors the welfare of the community.
From the first moment we talk about ICT we must keep in mind what they are and what their
characteristics are, once you know their usefulness will be very beneficial to use in any teaching-
learning context.
To talk about ICT as the tools that help to teach, it is necessary to mention fourteen of its main
characteristics, since they are benefits to use in the
Classroom of this new form of teaching that brings the 21st century.
For example, when the holiday periods begin, the child usually switches off during the
time he does not come to the classroom. This disconnection, only subject to some exercise or list
of tasks that must comply, gives way to oversight and a longer time of adaptation period upon
return.
If the student continues in connection through online platforms, blogs or e-mail, among
others; the teacher or the teacher can send these exercises in a more leisurely way and the student
will be able to receive answers to his doubts in a faster way as well as practice.
ICT is the union of beliefs, customs and all those habits that society has adopted as
routine. On the one hand, talking about culture is about the everyday routine of society, about the
benefits that technology brings to the whole community.
On the other hand, it encompasses science, as it is also responsible for giving answers to
the human being of what happens in the world. It is the curiosity to learn that leads man to carry
out scientific research to respond to his concerns, producing the scientific knowledge.
And finally, the technique is responsible for responding to the need for transformation
that man requires to meet his needs. It is the process that is carried out to create the necessary
mechanism to alleviate the need and, after analyzing it from the scientific field, has been
analyzed from a theoretical perspective, such as the creation of services.
Therefore, it is an activity characterized as creative that requires innovations that have not
been created previously.
3- It is a mobilizing teaching
Teaching through ICT gives the possibility that the student can move in different contexts
and different realities. In this way we choose a quality teaching in which the student can interact
with the world and can face different situations.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
For example, before subjects such as geography, the student will be able to contemplate
images and videos of geographic features that he has never seen before. In this way, visualizing
the content, making it more practical, is given the motivation that it needs.
ICTs applied to education are enriched by other scientific aspects, such as the pedagogical
sciences, through innovations in teaching-learning methodologies; of the psychology of the
learning, showing special attention to the stimulus-answer; of sociology, of anthropology and of
philosophy.
5- Focuses on objectives
Teaching through ICT is based on keeping in mind, at all times, the objectives. Achieving
the proposed goals is essential and, therefore, we are faced with a flexible working methodology.
Through the use of ICT, the teaching is individualized, giving the student the possibility
to advance and complete the levels once he has acquired the knowledge, regardless of the pace of
his peers. For there is a possibility that you can repeat the activities or receive adapted exercises.
For example, there is the possibility that the teacher can maintain daily and fast contact
with the family. In addition to answering questions that the students raised when they left the
classroom.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
7- It is changeable
As time goes by, the world is changing and new technologies are also changing.
Therefore, it adapts to the changes of the context itself and of education, based on the sciences
that support them.
8- Possibility of interacting
The new technologies give the possibility to the student to interact, with the world;
especially with the teacher and with their own peers.
Therefore, it is not simply a review and an understanding of the messages or symbols that
are sent. ICTs give the possibility of using auditory and audiovisual resources to promote the
attractiveness and ease in which the student acquires the knowledge.
The use of different channels of representation will give the possibility of faster learning
through expression and communication using cognitive, motor and affective development.
For example, the possibility of obtaining the same information through reading, videos,
music and images; Complement the traditional reading and images of the classic textbooks, since
it gives the possibility to reinforce the information through other channels.
ICTs develop the intellectual skills of children, betting on a fun and dynamic training. For
this reason, the psychology of learning through the interaction between the stimulus and the
response acts with the creation of levels that the student can acquire as he or she learns.
For example, before a grammar exercise, the student will be able to go solving exercises
where he receives scores and will go up in level. The novel "Gamification" will involve the child
to keep him in the game while learning.
For example, there is the possibility of using ICT so that the student can give opinions to
tasks that are proposed to him. These will be registered and can be observed by the other
classmates, in addition to the teacher can use this information in class or keep it as privacy data.
ICT has the possibility that all storage is online, so the space occupied is immaterial.
Therefore, it is easier to be moved from one place to another, since it should not be moved in any
heavy way.
For example, through the internet connection, the student can access the video that has
been seen in the classroom and can carry out the proposed activity by sending it by email.
13- Compatibility
It is compatible with other teaching aids traditionally used in classrooms, such as the use
of blackboards.
Electronic whiteboards are the most innovative material of the school in the 21st century,
because it mixes all the elements that a tool must contain in the classroom, not forgetting the
traditional, it also includes technological advances.
14- Feedback
The new technologies give the possibility of a feedback between students and teachers, in
this way, from any place the student can receive answers to their doubts and qualifications of
their tasks, quickly, without having to go to the classroom for it.
For example, before an objective test, type test, which is carried out as a self-assessment,
students can respond and get the grade of this one at the time. In addition, you can also obtain
information about this note and send to the teacher the question that you consider necessary to do
at that moment.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
CONCLUSIONS
Using the new technologies in the classroom constitutes a list of benefits for students
that, as we can see, are numerous.
Continuing the training away from ordinary classrooms is undoubtedly a personal benefit
for the teacher, as a group, for students, as they can make learning a fun and entertaining activity
in which all can participate and Better results are obtained.
We are talking about a mobilizing education, light, adapted to all students, complete,
disruptive, shared and fast; since its characteristics are not scarce.
The student can, from his home, continue to learn using tools that, until now, have been
playful and away from school, such as the computer or television, among many others.
Ans:
Structured programming (sometimes known as modular programming) is a programming
paradigm that facilitates the creation of programs with readable code and reusable components.
All modern programming languages support structured programming, but the mechanisms of
support, like the syntax of the programming languages, varies. Where modules or elements of
code can be reused from a library, it may also be possible to build structured code using modules
written in different languages, as long as they can obey a common module interface or
application program interface specification. However, when modules are reused, it's possible to
compromise data security and governance, so it's important to define and enforce a privacy
policy controlling the use of modules that bring with them implicit data access rights.
None of the constructs sequence selection and repetition consists of more than three boxes.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
If we visualize any one of the three constructs (discussed previously) as they are used, then a
third characteristic is evident.
Including this main goal as our main principle there are some more principle that are used for
the structured programming listed as:
Standardization
Abstraction
Expressive Power
Orthogonality
Minimality
Other constructs that possess the same single entry at the start single exit at the end
property are if then else and while do.
(b) Abreaction
(c)Expressive Power
As we have already seen in section 6.5, 2.2 that the go to statement has very less
expressive power because one statement of go to may have 3-4 types of meanings. That why
we require some mechanism for repetition and either a while statement or recursion are
sufficient to provide this facility. Many languages provide both a while statement and a do
while statement most languages also support recursion.
(d) Orthogonality
When designing a set facilities a good design principle is to create features that are
each as different from each other as possible. If this is so we can more easily satisfy the goal of
a minimum number of functions while at the same time ensuring that the facilities are
sufficiently powerful for all our needs.
(e) Minimality:
MODULAR PROGRAMMING
Cohesive, loosely coupled components are easy to understand, reuse, and replace.
Example
Modern computers are built around a printed circuit called a motherboard. Computer chips
(integrated circuits or ICs) are mounted on the motherboard. An IC can be viewed as a
component. An IC such as a CPU has a well-defined purpose: to execute machine language
programs. An IC's input and output pins give it a well-defined interface to the motherboard and
thus to the other ICs.
Motherboards also provide expansion slots. Expansion cards can be plugged into these slots to
add new functionality to the computer such as enhanced graphics and sound. We can view the
expansion cards as components, too.
Example
Example
Example
UML component diagrams model systems from the perspective of components (components),
interfaces (lollipops and sockets), and dependencies:
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
1. Single Responsibility Principle: Each module should have only one responsibility or do only
one thing.
2. Open-Closed Principle: Modules should be open for extension but closed for modification.
New functionality can be added to a system by adding new modules or components, rather than
modifying existing ones.
3. Liskov Substitution Principle: Any module or component should be able to be replaced by any
other module or component that provides the same function, without affecting the correctness of
the system.
4. Interface Segregation Principle: A module should only depend on the interfaces that it
requires, rather than depending on interfaces that it doesn't need or use.
6. Don't Repeat Yourself (DRY): Each piece of information in a system should have a single,
authoritative, and unambiguous representation.
These principles encourage the creation of small, focused modules, enable code reuse,
enhance flexibility, simplify development and maintenance, reduce errors, speed up the testing
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
phase, and allow for improved performance. Modular programming is essential in modern
software development and has real-world applications in various industries.
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
1. Mobile technology
2. Security Issues
MOBILE TECHNOLOGY
Mobile technology is technology that goes where the user goes. It consists of portable
two-way communications devices, computing devices and the networking technology that
connects them.
The communications networks that connect these devices are loosely termed wireless
technologies. They enable mobile devices to share voice, data and applications (mobile apps).
Mobile technology is pervasive and growing. The number of smartphone users has
climbed beyond 3 billion and the global mobile workforce is expected to reach 1.87 billion
by 2022
Cellular networks
Radio networks using distributed cell towers that enable mobile devices (cell phones) to switch
frequencies automatically and communicate without interruption across large geographic areas.
The same basic switching capability enables cellular networks to accommodate many users
across a limited number of radio frequencies.
4G networking
The current cellular service standard for most wireless communication. It uses packet switching
technology, which organizes data into parts or packets for transmission and reassembles the
information at the destination. 4G – “G” for generation is reported to be 10x faster than 3G —
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
and 5G, faster still, is coming. 5G uses a set of aggregated frequency bands to unlock bandwidth
and is approximately 20x faster than 4G.
Wi-Fi
Radio waves that connect devices to the internet through localized routers called hotspots. Short
for wireless fidelity, Wi-Fi networks are like cell towers for internet access, but they don’t
automatically pass service without establishing a Wi-Fi connection. Most mobile devices allow
for automatic switching between Wi-Fi and cellular networks depending upon availability and
user preference.
Bluetooth
We use mobile phones for almost everything now. Gone are the days when we used them
for only calling. Now, our lives revolve around it. They come in use for communicating through
voice, messages, and mails. We can also surf the internet using a phone. Most importantly, we
also click photos and record videos through our mobile’s camera.
The phones of this age are known as smartphones. They are no less than a computer and
sometimes even more. You can video call people using this phone, and also manage your official
documents. You get the chance to use social media and play music through it.
Moreover, we see how mobile phones have replaced computers and laptops. We carry out
all the tasks through mobile phones which we initially did use our computers. We can even make
PowerPoint presentations on our phones and use it as a calculator to ease our work.
SECURITY ISSUES
Now that we have acknowledged the amount of data that business collects about people,
what are the risks and challenges associated with keeping that information secure? Businesses
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
stand to lose consumer confidence and respect if they allow unauthorized access to customer
data. For this reason, businesses take information security and cyber-security seriously. Despite
the importance of protecting customer data, breaches and hacks seem to be more and more
common. Is this a result of inadequate security measures on the part of the businesses, or are
hackers getting better at accessing so-called “secure networks”? The answer is probably both.
In this section you’ll learn about some of the ongoing security issues businesses face in trying to
safeguard their (and their customers’) electronic communications and data.
It has been estimated that businesses expend more than 5% of their annual IT budgets
protecting themselves against disrupted operations and theft due to information theft. A February
2018 report by McAfee estimates that cyber-crime costs the world over $800 billion or 0.08% of
global GDP. Among the reasons given for the growing cost of cyber-crime are:
The increased number of new users online (these tend to be from low-income countries
with weak cyber-security) The increased ease of committing cyber-crime, with the growth of
Cyber-crime-as-a-Service An expanding number of cyber-crime “centers” that now include
Brazil, India, North Korea, and Vietnam A growing financial sophistication among top-tier cyber
criminals that, among other things, makes monetization easier
According to the McAfee report, “Monetization of stolen data, which has always been
a problem for cyber-criminals, seems to have become
less difficult because of improvements in cyber-crime black markets and the use of digital
currencies” Cyber-crime can take on many faces from data breaches to malicious program that
attack a company’s network and disrupt service or corrupt sensitive corporate data. We will
examine just a few of the ways that criminals are using technology to wreak havoc on business
operations.
1. Phishing
Phishing scammers lure their targets into a false sense of security by spoofing the
familiar, trusted logos of established, legitimate companies. Or they pretend to be a friend or
family member. Phishing scammers make it seem like they need your information or someone
else’s, quickly – or something bad will happen. They might say your account will be frozen,
you’ll fail to get a tax refund, and your boss will get mad, even that a family member will be hurt
or you could be arrested. They tell lies to get to you to give them information.
To protect yourself and your company’s information, the U.S. Federal Trade Commission
recommends the following precautions:
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
Be cautious about opening attachments or clicking on links in emails. Even your friend or
family members’ accounts could be hacked. Files and links can contain malware that can weaken
your computer’s security.
Do your own typing. If a company or organization you know sends you a link or phone
number, don’t click. Use your favorite search engine to look up the website or phone number
yourself. Even though a link or phone number in an email may look like the real deal, scammers
can hide the true destination.
Make the call if you’re not sure. Do not respond to any emails that request personal or
financial information. Phishers use pressure tactics and prey on fear. If you think a company,
friend or family member really does need personal information from you, pick up the phone and
call them yourself using the number on their website or in your address book, not the one in the
email.
Back up your files to an external hard drive or cloud storage. Back up your files regularly
to protect yourself against viruses or a ransomware attack.
Keep your security up to date. Use security software you trust, and make sure you set it to
update automatically.
2. Denial of Service
A denial-of-service (DoS) attack occurs when legitimate users are unable to access
information systems, devices, or other network resources due to the actions of a malicious cyber
threat actor. Services affected may include email, websites, online accounts (e.g., banking), or
other services that rely on the affected computer or network. A denial-of-service is accomplished
by flooding the targeted host or network with traffic until the target cannot respond or simply
crashes, preventing access for legitimate users. DoS attacks can cost an organization both time
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
and money while their resources and services are inaccessible. In 2012, not one, not two, but a
whopping six U.S. banks were targeted by a string of DoS attacks. The victims were no small-
town banks either: They included Bank of America, JP Morgan Chase, U.S. Bancorp, Citigroup
and PNC Bank.
3. Malware
Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is
activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can:
4. Emotet
The Cybersecurity and Infrastructure Security Agency (CISA) describes Emoted as “an
advanced, modular banking Trojan that primarily functions as a downloader or dropper of other
banking Trojans. Emotet continues to be among the most costly and destructive malware.”
A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party
transaction. After interrupting the traffic, they can filter and steal data, according to Cisco.
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers
insert themselves between the visitor and the network, and then use malware to install software
and use data maliciously
6. SQL Injection
A Structured Query Language (SQL) injection is a type of cyber-attack that results from
inserting malicious code into a server that uses SQL. When infected, the server releases
Course: Basics of ICT (5403)
Level: B.Ed. (2.5 Years) Semester: Autumn, 2022
information. Submitting the malicious code can be as simple as entering it into a vulnerable
website search box.
7. Password Attacks
With the right password, a cyber-attacker has access to a wealth of information. Social
engineering is a type of password attack that Data Insider defines as “a strategy cyber attacker’s
use that relies heavily on human interaction and often involves tricking people into breaking
standard security practices.” Other types of password attacks include accessing a password
database or outright guessing.
These are just a few of the security issues associated with information technology. Such risks
illustrate the need for increased cybersecurity to protect computer systems from theft or damage
to their hardware, software or electronic data, as well as from disruption or misdirection of the
services they provide. The field is of growing importance due to increasing reliance on computer
systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth
of “smart” devices, including smartphones, televisions and the various devices that constitute
the Internet of Things. Due to its complexity, both in terms of politics and technology, it is one
of the major challenges of the contemporary world.