EMPOWERMENT
TECHNOLOGY
RENZ ALVIE M. TUBIG
EMPOWERMENT TECHNOLOGY
• Develop the student’s skills and knowledge and
competencies on the ICT current state and its
impact to local and global contexts, tools and
technique
• The methods used in developing technologies and
applications for social good
• How to effectively use the technologies to empower
students, industries, and communities.
Introduction to Information and
Communications Technology
What is Information
and Communications
Technology (ICT)
What is ICT?
It refers to the use of
communication technology such as
laptop, smart phones, tablet,
telephone, internet and etc. to send,
save, and edit information.
What are the functions
of ICT in the
organization?
The functions of ICT in Organization
1. Communication
2. Data Management
3. Marketing
4. Process Improvement
5. Enterprise Resource planning
The functions of ICT in Organization
1. Communication
The availability of high-speed Internet provides
efficient communication.
• Business organization nowadays can send and
receive emails in split second.
• Video conferencing enables virtual collaboration
which makes meetings easier.
• Internet allows user to access the latest
information around the world.
The functions of ICT in Organization
2. Data Management
As technology advances, business have
acquired voluminous data.
• Allows managing data as the most important
resource in the organization to maintain their
competitive advantage.
The functions of ICT in Organization
3. Marketing
This includes the creation of online
advertisement, filtering consumer behavioral patterns
through the use of different social media platform to
determine buying patterns and identify new business
opportunity.
The functions of ICT in Organization
4. Process Improvement
Improves business processes to achieve cost
savings.
• Paperless communication to reduce printing and
duplication costs while achieving reliable data
transfer.
• Virtual collaborations eliminate the travel cost and
increase employee productivity.
The functions of ICT in Organization
5. Enterprise Resource Planning
A management information system that
integrates the vital functions of an organization like
sales, manufacturing, human resources, inventory,
purchasing, and accounting.
Did you know?
160 billion e-mails are spent daily,
most of them are spam e-mails.
What is an ICT System?
What is an ICT System?
It is the combined use of hardware,
software, data, and humans to enable
processes for different purposes.
ICT System
Example:
With the use of an ICT System such as
Inventory System and Purchase Order System, store
managers would not have a hard time to track their
product’s status, or whether the sales for a specific
month went down or up.
ICT System
More examples of ICT Systems that we use today:
• Learning Management Systems (e.g., Moodle,
Blackboard, Canvas) – Used for managing and
delivering educational content and courses.
• Mobile Payment Systems (e.g.,GCash, Pay Maya) –
For conducting transactions via smartphones.
• Public Safety Systems (e.g., 911 systems,
emergency alerts) – Used by governments to
coordinate disaster response and public safety.
The Components of ICT
System
The Components of ICT System
1. Data
2. Procedures
3. Information
4. People
5. Software
6. Hardware
The Components of ICT System
1. Data
considered the raw materials of any
information
these data are processed by the system to
provide the information which is the output generated
by the system
The Components of ICT System
2. Procedures
are processes which determine what needs to
be done
such as sorting, classifying, verifying, printing
and encoding
The Components of ICT System
3. Information
refers to the results from processing data
This is the output derived after processing the
data.
The Components of ICT System
4. People
Provide data and information to the ICT system
They make judgments and decisions based on
the output derived from the system.
The Components of ICT System
5. Software
refers to a computer program used to process
data
The Components of ICT System
6. Hardware
refers to the physical components that make
up the ICT system
Types of an ICT SYstem
Types of an ICT System
1. Information System
2. Control System
3. Communication System
Types of an ICT System
1. Information System
refers to the ICT systems that are set up to
manage data and information.
Example:
• Sports Club Membership System
• Supermarket Inventory System
Types of an ICT System
2. Control System
refers to ICT systems that aim to control
machines.
Example:
• A moving robot arm to weld a car chassis
Types of an ICT System
3. Communication System
refers to the use of ICT to successfully
transport data from one place to another.
Example:
• Video Conferencing System
Activity 1 : ICT across the Fields
Education Business
1. 4.
2. 5.
3. 6.
Healthcare Government
7. 9.
8. 10.
Activity 1 : ICT across the Fields
Education Business
1. allow educators to deliver online courses 4. enable businesses to sell products and
2. upload educational materials services online
3. communicate with students 5. Increases productivity through automation
6. offer businesses secure storage
Healthcare Government
7. ensuring that records are easily accessible 9. allow citizens to access government
8. allow doctors to store, access, and analyze services online
medical images 10. Tools used in elections, such as electronic
voting machines
What are the latest
trends in ICT?
The latest trends in ICT
1. Cloud Computing
2. Social Media
3. Business Intelligence (BI)
4. Data Analytics
5. Internet of Things (IoT)
6. Machine Learning (ML)
The latest trends in ICT
1. Cloud Computing
refers to the use of a network of remote servers
hosted on the Internet to manage, process, and store
data, instead of a local server or a personal computer.
The latest trends in ICT
1. Cloud Computing
Simply put, the cloud is the Internet—more
specifically, it's all of the things you can access
remotely over the Internet. When something is in the
cloud, it means it's stored on Internet servers instead
of your computer's hard drive
The latest trends in ICT
2. Social Media
these websites are used for social networking
where the users create virtual communities and
special interest groups to share information resources
in the form of messages, video, audio, and blogs.
Facebook and Instagram are some of the most
popular social media platforms around the globe.
The latest trends in ICT
3. Business Intelligence (BI)
this cover data analytics, data mining, big data
and the processes and procedures which support data
collection, sharing and reporting to make better
decisions.
Business intelligence is the strategies and
technologies used by companies to analyze data and
business information.
The latest trends in ICT
3. Business Intelligence (BI)
In more simple terms, it allows businesses to
learn about any process or trend affecting
performance, why things are happening, and what is
likely to occur in the future.
The latest trends in ICT
4. Data Analytics
Market research is carried out by businesses to
determine the behavioral patterns of the consumers.
The results are carefully tallied and develop an
algorithm that will determine relationship between
data and derived an impactful insights that innovate
the products and services
The latest trends in ICT
4. Data Analytics
A simple example of Data analysis is whenever
we take any decision in our day-to-day life is by
thinking about what happened last time or what will
happen by choosing that particular decision. This is
nothing but analyzing our past or future and making
decisions based on it.
The latest trends in ICT
4. Data Analytics
To differentiate, business intelligence is a tool
to make decisions based on historical data while
analytics provide predictive capabilities.
The latest trends in ICT
5. Internet of Things (IoT)
refers to the network of computing devices that
provide a unique identification (UID) for Internet
connectivity.
physical objects with sensors, processing
ability, software and other technologies that connect
and exchange data with other devices and systems
over the Internet or other communications networks
The latest trends in ICT
6. Machine Learning (ML)
ML is a subset of Artificial Intelligence (AI)
where the system can learn automatically based on
experience.
Siri and Cortana
The latest trends in ICT
6. Machine Learning (ML)
Machine learning is a subfield of artificial
intelligence, which is broadly defined as the capability
of a machine to imitate intelligent human behavior.
Artificial intelligence systems are used to
perform complex tasks in a way that is similar to how
humans solve problems.
Did you know?
45% of the world’s Internet
users are below the age of 25.
Activity 2 : Now with ICT and Then without ICT
ICT has greatly influenced people’s lives. Think about various tasks or processes
that have been transformed by ICT. These can be from personal life, work, or education.
Then create a generalization or conclusion.
WHAT IS IT NOW WITH ICT? WHAT WAS IT THEN WITHOUT ICT?
Example: Sending an email Example: Writing letters by hand
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
Conclusion: with advantage and disadvantage of ICT (5pts)
Lesson 2
Online Safety, Security,
Ethics, and Etiquette
What is Cyber Attack?
What is Cyber Attack?
Cyberattacks are the exploitation of
vulnerabilities that were brought about by
increased Internet connectivity.
Types of Cyberthreats
Types of Cyberthreats
Malware or Malicious Software
Malware Virus
Types of Cyberthreats
Malware or Malicious Software
Malware Virus
often take the form of a piece of code inserted
in an application, program, or system and they’re
deployed by victims themselves.
the virus replicates, spreading copies of itself
from computer to computer
Types of Cyberthreats
Malware or Malicious Software
Trojan malware
Types of Cyberthreats
Malware or Malicious Software
Trojan malware
Also known as a Trojan horse or Trojan horse
virus
disguised as software, applications, or files to
deceive users into downloading it and, unknowingly,
granting control of their devices. Once installed, a
trojan can perform the action it was designed for.
Types of Cyberthreats
Malware or Malicious Software
Ransomware
Types of Cyberthreats
Malware or Malicious Software
Ransomware
a type of malware that comes with a ransom. It
locks and encrypts a victim’s device or data and
demands a ransom to restore access.
Types of Cyberthreats
Malware or Malicious Software
Spyware
Types of Cyberthreats
Malware or Malicious Software
Spyware
a type of malware that infiltrates devices
without the owner’s knowledge.
Keyloggers are a popular form of spyware that
can be used to track and log the keys you strike on
your keyboard, capturing any information typed.
Types of Cyberthreats
Malware or Malicious Software
Logic bomb
Types of Cyberthreats
Malware or Malicious Software
Logic Bomb
set of computer instructions that lie dormant
until triggered by a specific event.
once triggered, the logic bomb performs a
malicious task.
Types of Cyberthreats
Phishing
it is a form of cyberattack to obtain sensitive
information like username and password through
malicious emails. The users are asked to click on the
link of trusted third party to enter their personal data.
Types of Cyberthreats
Password Attacks
happens when a third party is trying to gain
access to your systems by cracking a user’s
password. This type of attack does not usually require
any type of malicious code or software to run on the
system.
Types of Cyberthreats
Denial-of-Service (DoS) Attacks
occurs when a malicious actor (hacker) stops
legitimate users from getting into specific computer
systems, devices, services or other digital resources.
Types of Cyberthreats
Man in the Middle (MITM)
this may happen by impersonating the
endpoints in an online information exchange via
smartphone to a website.
Types of Cyberthreats
Malvertising
are done by malicious actors that upload
infected ads to different websites using an advertising
network.
These malicious ads are then disseminated to
sites that match certain keywords and search criteria.
Types of Cyberthreats
Roque Software
malware that pretends as legitimate and
necessary security software that will keep your
system safe.
These alerts advise the user to download
security software, agree to terms or update their
current system to stay protected.
Did you know?
Social Media is hacker’s
favorite target.
Activity 1 : Complete Me!
Complete the sentences by filling in the correct term.
1. M_ _ _ _ _ E – this stands for malicious software
2. _ _ R _ _ - spreading copies of itself from computer to computer
3. _ _ I _ _ I _ _ - The users are asked to click on the link of trusted third party to enter their
personal data.
4. K _ _ _ _ _ _ E _ - used to record the keystroke done by the user.
5. _ A _ S _ _ _ _ - used to gain access to your system
6. _ _ _ M – unwanted emails and can be used to send malicious content
7. C _ _ _ _ T _ _ _ _ T _ - the possibility of a malicious attempt to damage or destroy a system
8. _ A _ _ _ _ _ _ _ _ - a type of malware that comes with a ransom
9. _ _ L _ _ _ _ _ _ I _ _ - done by malicious actors that upload infected ads to different
websites using an advertising network.
10. ______ _____ is hacker’s favorite target.
What is Cyber Security?
What is Cyber Security?
refers to the body of technologies,
processes, and practices designed to protect
networks, computer programs and data from
attack, damage, and unauthorized access.
Things you need to
consider doing to be
safe
Things you need to consider doing to be safe:
Make your password strong and unique.
a mix of uppercase and lowercase letters,
numbers, and special characters
avoid using easily guessable information like
names, birthdays, or common patterns
Things you need to consider doing to be safe:
Turn on Two-Factor Authentication
it provides another layer of security you need to
pass beyond simply having username and password
to get into your accounts.
avoid using easily guessable information like
names, birthdays, or common patterns
Things you need to consider doing to be safe:
Use Passcodes even if they are optional
When it comes to personal devices and user
account, password and passcode are two different
things.
Password – combination of random letters,
special characters, and numbers
Passcode – or PIN restricted to numbers only
and is used as a second authentication mechanism
Things you need to consider doing to be safe:
Use Different Email Addresses for Different Types
of Accounts
requires extra effort but this is a very effective
way in keeping all of your accounts safe.
Things you need to consider doing to be safe:
Clear your Cache
delete browser cookies and clear your browser
history on a regular basis.
order to avoid other users to see your computer
activity such as webpages you visit and the
information you have.
Things you need to consider doing to be safe:
Turn off “Safe Password” feature in Browser
other people who has access to your computer
or device can log in to your accounts and can get your
personals such as passwords and credit card details.
Things you need to consider doing to be safe:
Don’t fall prey to click bait
hackers to have found multiple effective ways
for click bait buttons that will direct you to phishing
sites.
you must definitely think before you click
Things you need to consider doing to be safe:
Don’t fall prey to click bait
A Phishing
click-bait disguised
as a beauty product
ad.
Things you need to consider doing to be safe:
• Do not share your password with anyone.
• Add friends you know in real life.
• Do not visit untrusted websites.
• Add password to your WIFI at home to make it
private.
• Do not give your personal information to anyone
• Think before you click.
• Never post about your future vacation.
• Do not reply or click links from suspicious emails.
TYPES OF RISKS
INFORMATION
First Name Chances are a hacker may already know
plenty of stuff about you, even if you only give
out your first name.
Last Name If sharing your first name has a risk, having
both your first name and last name is riskier.
You will be vulnerable to being searched for
using search engine, which includes image
search. Matching a name with a face is a
modus to several cybercrimes like identity
theft.
TYPES OF RISKS
INFORMATION
Current and They can use this information for verification
Previous purposes.
School(s)
Cellphone Your cellphone number should never be
Number posted over the net. You would not want
random strangers to text or call you, or worse,
pretend that they are someone else.
TYPES OF RISKS
INFORMATION
Name of You may have encountered many websites
Mother and that require your mother’s maiden name as an
Father answer to a secret question whenever you
lose your password.
Name of Strangers may pretend or use their identities
Siblings to dupe you.
Address It would be much easier for criminals to find
you.
Did you know?
Cyber-crime damages will cost
the world $6 trillion annually by 2021,
up from $3 trillion just a year ago.
Activity 2 : Match Me!
We have already discussed cyber threats and
cybersecurity; now choose one type of cyber threat, create
a scenario or use a real-life example and match it with the
appropriate solution or preventive measure.
Cyber Threat:
Scenario:
Solution/Preventive Measures:
What is Computer Ethics?
What is Computer Ethics?
Computer ethics is a set of moral
standards that govern how people use
computers.
Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people in
any way.
2. Thou shalt not interfere with other people’s work.
3. Thou shalt not sneak around in other people’s computer
files.
4. Thou shalt not use computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which
you have not paid.
Commandments of Computer Ethics
7. Thou shalt not use other people’s computer resources
without authorization or
proper compensation.
8. Thou shalt not appropriate other people’s intellectual
output.
9. Thou shalt think about the consequences of the program
you are writing or the
system you are designing.
10.Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans.
What is Copyrights?
Copyright
is a protection given to the owner of the rights
in an original work such as books, musical works,
films, paintings, and other works, and computer
programs.
There are millions of information that we can
get from the internet. Some of this information are
free but others are not. They are protected by a
copyright law.
This original work is called intellectual property
which is protected under Republic Act 8293 known as
the “Intellectual Property Code of the Philippines”.