Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views79 pages

Viii

Uploaded by

Sanjeev Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views79 pages

Viii

Uploaded by

Sanjeev Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 79

ICT, Social Media & IT

ICT, Social Media & IT


ICT- Information and Communication Technology
 Access information through telecommunication.
 It is extension of IT
 Focuses on Communication technology.
 Its includes Internet, wireless network, cell phones and
other communication mediums.
ICT, Social Media & IT
The social impact of ICT:
 ICT positive impacts
 Access to Information
 Increase in access to information and services
 Cheaper communication such as VoIP, instant messaging.
 New opportunity for leisure and entertainment
 Obtain goods and services
 Improve access to education
 Distance learning and on-line tutorials
 New ways of learning- interactive multi-media and virtual reality
 New job opportunities- flexible and mobile working, virtual office jobs in
communication industry.
 Connecting people
 Social networking – communicate with each other
 Make friends irrespective of profession and geography
ICT, Social Media & IT
Negative impacts
 Job loss
 Manual operation to automation
 Robots replacing people on an assembly line
 Job export
 Replace by smaller no of worker- barcode
 Reduced personal interaction
 Habit to interacts with each other by social media
 Other people feel isolated and unhappy
 Reduced physical activity
 Adopts a more sedentary lifestyle
 Create many problem like obesity, heart disease, diabetes, eyestrain any
injury.
 Lack of physical exercise
ICT, Social Media & IT
 Positive impact on organization
 Communication
 Cost savings like VoIP over normal telephone, email/messaging over post, video
conferencing over meeting.
 Access to larger and worldwide market
 Online payment
 24 hours opening
 Easy communication response
 Better customer relationship
 Faster product development
 Information management
 Data mining of customer information
 Improve stock control Less wastage , better cash flow
 Manager have better information
 Security
 Reduce security system- encryption(store and send)
 Data protection
 Physical security- fingerprint, iris or facial recognition
ICT, Social Media & IT
Negative impact on organization
 Cost
 Hardware and software is expensive
 Specialist staff to run
 Cost-benefit analysis
 Competition
 It a good thing
 Expose to greater competition
 Competing for customer, donation or other funding
 Lose to other organization by less cost products
 Security
 Data must be kept secure
 Require protection from attack like viruses, malware
ICT, Social Media & IT
Positive impact on Education
 Distance learning
 Simulation to perform ‘impossible experiments’
 Provides individual learning program
By creating education society
 Increases access to information
 Increases opportunity for education
 Improve communication
 Allow people to participate in a wider, even worldwide
society
ICT, Social Media & IT
Negative impact on Education
 Larger cost involved
 Poorer students education establishments
 Students and teachers sometimes get hooked to the
technology aspects
Social media
Computer-mediated technologies that facilitate the creation and
sharing of information, ideas, career interests and other forms of
expression via virtual communities and networks.
There are some common features
 Social media are interactive Web 2.0 Internet-based
applications.
 User-generated content, such as text posts or comments,
digital photos or videos, and data generated through all
online interactions, are the lifeblood of social media.
 Users create service-specific profiles for the website or
app that are designed and maintained by the social media
organization.
 Social media facilitate the development of online social
networks by connecting a user's profile with those of
other individuals or groups.
Social media
 Examples
 Facebook
 Users can add other users as "friends", exchange messages, post status
updates and digital photos, share digital videos and links, use various
software applications ("apps"), and receive notifications when others
update their profiles or make posts.
 The Facebook website was launched on February 4, 2004, by
Mark Zuckerberg, along with fellow Harvard College students and
roommates, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and
Chris Hughes
 Twitter
 Twitter is an online news and social networking service where users post
and interact with messages, "tweets," restricted to 140 characters.
 Registered users can post tweets, but those who are unregistered can
only read them.
 Twitter was created in March 2006 by Jack Dorsey, Noah Glass,
Biz Stone, and Evan Williams and launched in July
Social media
Instagram
 Instagram is a mobile photo-sharing application
and service that allows users to share pictures and
videos either publicly or privately on the service
 as well as through a variety of other social

networking platforms, such as Facebook, Twitter,


Tumblr, and Flickr.
 It was created by Kevin Systrom and Mike Krieger,

and launched in October 2010 as a free mobile app


exclusively for the iOS mobile operating system
 A version for Android devices was released two

years later, in April 2012


Social media
 Tumblr
 Tumblr is a microblogging and social networking website
founded by David Karp in 2007, and owned by Yahoo! since
2013.
 The service allows users to post multimedia and other content
to a short-form blog. Users can follow other users' blogs.
 Bloggers can also make their blogs private.For bloggers, many
of the website's features are accessed from a "dashboard"
interface.
 Wikipedia
 Wikipedia is a free online encyclopedia with the aim to allow
anyone to edit articles.
 Wikipedia is the largest and most popular general reference
work on the Internet and is ranked among the ten most popular
websites.
 Wikipedia is owned by the nonprofit Wikimedia Foundation
 Wikipedia was launched on January 15, 2001, by Jimmy Wales
and Larry Sanger
Social media
 LinkedIn
 LinkedIn is a business- and employment-oriented social networking
service that operates via websites and mobile apps.
 Founded on December 28, 2002 by Reid Hoffman and launched on
May 5, 2003, it is mainly used for professional networking, including
employers posting jobs and job seekers posting their CVs.
 Reddit
 Reddit was founded by University of Virginia roommates Steve
Huffman and Alexis Ohanian in 2005.
 An American social news aggregation, web content rating, and
discussion website.
 Content entries are organized by areas of interest called
"subreddits".
 Subreddit topics include news, science, gaming, movies, music,
books, fitness, food, image-sharing, and many others.
 Reddit's registered community members can submit content such as
text posts or direct links.
Social media
 Pinterest
 Pinterest is a web and mobile application company that operates a
photo sharing and categorizing website.
 Pinterest CEO Ben Silbermann summarized the company as a "catalog of
ideas," rather than as a social network, that inspires users to "go out and
do that thing.“
 Users can upload, save, sort, and manage images—known as pins—and
other media content (e.g., videos) through collections known as
pinboards.
 You can go to original website by click on the images.
 Google+
 Google+ (pronounced and sometimes written as Google Plus) is an
interest-based social network that is owned and operated by Google.
 Use to replicate offline interaction of human.
 The service, Google's fourth foray into social networking, experienced
strong growth in its initial years, although usage statistics have varied,
depending on how the service is defined.
 Three Google executives have overseen the service, which has
undergone substantial changes leading to a redesign in November 2015.
Impact of Social media
 Social media has had a tremendous impact on our culture,
in business, on the world-at-large. Social media websites
are some of the most popular haunts on the Internet. They
have revolutionized the way people communicate and
socialize on the Web.
 Positive impact of Social media
 Impact on Business
 Companies are using social media to advertise their products, build

customer loyalty and many other functions.


 Compared to television advertisements, radio, prints ads and other

expensive forms of marketing, social media presence is a cheap and


effective means to enhance brand image and popularity.
 Interactions and feedback from customers help businesses to

understand the market, and fine-tune their products and strategies.


 You can connect to your targeted consumers for free, the only cost is

energy and time.


Impact of Social media
 Effect on Socialization
 Social networks offer the opportunity for people to re-connect with

their old friends and acquaintances, make new friends, trade ideas,
share content and pictures, and many other activities.
 Users can stay abreast of the latest global and local developments,

and participate in campaigns and activities of their choice.


 Professionals use social media sites like LinkedIn to enhance their

career and business prospects.


 Students can collaborate with their peers to improve their academic

proficiency and communication skills.


 You can learn about different cultures and societies by connecting

with people in other countries.


 Impact on Politics
 Every politician worth his salt needs to jump on the social media
bandwagon.
 This is because social websites have played an important role in many
elections around the world, including in the U.S., Iran, and India.
 They have also served to rally people for a cause, and have inspired
mass movements and political unrests in many countries.
Impact of Social media
 Idea sharing
 Social networking provides academic research to
everyone with online access, allowing people
access to previously unavailable resources.
 Social media sites inform and empower individuals
to change themselves and their communities.
 Another positive impact of social networking
sites is to unite people on a huge platform for the
achievement of some specific objective. This is
very important to bring the positive change in
society.
Impact of Social media
 Negative Effects of Social Media
 Unfortunately, there are a few downsides too to social
networking. Many introverts and socially reclusive users
place too much emphasis on virtual interaction, and
ignore the real world outside.
 Cyber Bullying and Online Harassment
 If you are not careful, unscrupulous people can target
you for cyber bullying and harassment on social sites.
 School children, young girls, and women can fall prey to
online attacks which can create tension and distress.
 If you are a victim of cyber bullying, do not take it lying
down, but try to take appropriate legal action against the
attacker.
 Impact on Productivity
 Many companies have blocked social networks on their office Internet
as addicted employees can distract themselves on such sites, instead
of focusing on work.
 In fact, studies show that British companies have lost billions of
dollars per year in productivity because of social media addiction
among employees.
 Impact on Privacy
 If you are not careful, what you post on the Net can come back to
haunt you. Revealing personal information on social sites can make
users vulnerable to crimes like identity theft, stalking, etc.
 Many companies perform a background check on the Internet before
hiring an employee. If a prospective employee has posted something
embarrassing on social media, it can drastically affect their chances
of getting the job.
 The same holds true for our relationships too, as our loved ones and
friends may get to know if we post something undesirable on social
networks.
E-Commerce
E-Commerce or Electronics Commerce is a
methodology of modern business which addresses
the need of business organizations, vendors and
customers to reduce cost and improve the quality
of goods and services while increasing the speed of
delivery. E-commerce refers to paperless exchange
of business information using following ways.
 Electronic Data Exchange (EDI)
 Electronic Mail (e-mail)
 Electronic Bulletin Boards
 Electronic Fund Transfer (EFT)
 Other Network-based technologies
E-Commerce
 Features
 E-Commerce provides following features
 Non-Cash Payment − E-Commerce enables use of credit cards, debit cards,
smart cards, electronic fund transfer via bank's website and other modes of
electronics payment.
 24x7 Service availability − E-commerce automates business of enterprises
and services provided by them to customers are available anytime,
anywhere. Here 24x7 refers to 24 hours of each seven days of a week.
 Advertising / Marketing − E-commerce increases the reach of advertising
of products and services of businesses. It helps in better marketing
management of products / services.
 Improved Sales − Using E-Commerce, orders for the products can be
generated any time, any where without any human intervention. By this way,
dependencies to buy a product reduce at large and sales increases.
 Support − E-Commerce provides various ways to provide pre sales and post
sales assistance to provide better services to customers.
 Inventory Management − Using E-Commerce, inventory management of
products becomes automated. Reports get generated instantly when
required. Product inventory management becomes very efficient and easy to
maintain.
 Communication improvement − E-Commerce provides ways for faster,
efficient, reliable communication with customers and partners.
E-Commerce advantages and disadvantages
 E-Commerce advantages can be broadly classified in three major categories:
 Advantages to Organizations
 Advantages to Consumers
 Advantages to Society
 Advantages to Organizations
 Using E-Commerce, organization can expand their market to national and
international markets with minimum capital investment. An organization can
easily locate more customers, best suppliers and suitable business partners
across the globe.
 E-Commerce helps organization to reduce the cost to create process,
distribute, retrieve and manage the paper based information by digitizing the
information.
 E-commerce improves the brand image of the company.
 E-commerce helps organization to provide better customer services.
 E-Commerce helps to simplify the business processes and make them faster
and efficient.
 E-Commerce reduces paper work a lot.
 E-Commerce increased the productivity of the organization. It supports "pull"
type supply management. In "pull" type supply management, a business
process starts when a request comes from a customer and it uses just-in-time
manufacturing way.
E-Commerce advantages and disadvantages
 Advantages to Customers
 24x7 support. Customer can do transactions for the product or enquiry
about any product/services provided by a company any time, any where
from any location. Here 24x7 refers to 24 hours of each seven days of a
week.
 E-Commerce application provides user more options and quicker
delivery of products.
 E-Commerce application provides user more options to compare and
select the cheaper and better option.
 A customer can put review comments about a product and can see what
others are buying or see the review comments of other customers
before making a final buy.
 E-Commerce provides option of virtual auctions.
 Readily available information. A customer can see the relevant detailed
information within seconds rather than waiting for days or weeks.
 E-Commerce increases competition among the organizations and as
result organizations provides substantial discounts to customers.
E-Commerce advantages and disadvantages
Advantages to Society
Customers need not to travel to shop a product
thus less traffic on road and low air pollution.
E-Commerce helps reducing cost of products so
less affluent people can also afford the products.
E-Commerce has enabled access to services and
products to rural areas as well which are
otherwise not available to them.
E-Commerce helps government to deliver public
services like health care, education, social
services at reduced cost and in improved way.
E-Commerce advantages and disadvantages
E-Commerce disadvantages can be broadly classified in two major
categories:
 Technical disadvantages
 Non-Technical disadvantages

Technical Disadvantages
 There can be lack of system security, reliability or standards owing to
poor implementation of E-Commerce.
 Software development industry is still evolving and keeps changing
rapidly.
 In many countries, network bandwidth might cause an issue as there is
insufficient telecommunication bandwidth available.
 Special types of web server or other software might be required by the
vendor setting the e-commerce environment apart from network
servers.
 Sometimes, it becomes difficult to integrate E-Commerce software or
website with the existing application or databases.
 There could be software/hardware compatibility issue as some E-
Commerce software may be incompatible with some operating system or
E-Commerce advantages and disadvantages
Non-Technical Disadvantages
Initial cost: The cost of creating / building E-Commerce
application in-house may be very high. There could be delay in
launching the E-Commerce application due to mistakes, lack of
experience.
User resistance: User may not trust the site being unknown
faceless seller. Such mistrust makes it difficult to make user
switch from physical stores to online/virtual stores.
Security/ Privacy: Difficult to ensure security or privacy on
online transactions.
Lack of touch or feel of products during online shopping.
E-Commerce applications are still evolving and changing rapidly.
Internet access is still not cheaper and is inconvenient to use for
many potential customers like one living in remote villages.
E-Banking
 Online banking, also known as internet banking, e-banking or
virtual banking, is an electronic payment system that enables
customers of a bank or other financial institution to conduct a range
of financial transactions through the financial institution's website.
The online banking system will typically connect to or be part of the
core banking system operated by a bank and is in contrast to
branch banking which was the traditional way customers accessed
banking services.
 Popular services covered under e-banking
 Automated Teller Machines(ATM)
 Credit Cards
 Debit Cards
 Smart Cards
 Electronic Funds Transfer (EFT) System
 Cheques Truncation Payment System
 Mobile Banking
 Internet Banking
 Telephone Banking
E-Banking advantages
The operation cost per unit services is lower for the
banks.
Customers are no longer required to wait in those
long and crowded queues of the banks.
Low incidence of errors increases the number of
users/customers of E-Banking
The customers can obtain funds at any time from
ATM machines.
The credit cards and debit cards enables the
Customers to obtain discounts from retail outlets.
Transactions of transferring of funds from one person
account to another person’s account became much
more faster and convenient.
E-learning
 Understanding eLearning is simple. eLearning is learning utilizing
electronic technologies to access educational curriculum outside of a
traditional classroom. In most cases, it refers to a course, program or
degree delivered completely online.
 There are many terms used to describe learning that is delivered online,
via the internet, ranging from Distance Education, to computerized
electronic learning, online learning, internet learning and many others. We
define eLearning as courses that are specifically delivered via the internet
to somewhere other than the classroom where the professor is teaching. It
is not a course delivered via a DVD or CD-ROM, video tape or over a
television channel.
 Simply put, e-learning is everywhere, and it certainly comes with some
pretty awesome advantages – such as:

1. Scalable – E-learning enables us to quickly create and communicate new


policies, training, ideas, and concepts. Be it for entertainment or formal
education, e-learning is nimble!
2. Capacity and Consistency – Using e-learning allows educators to achieve
a great degree of coverage for their target audience, and it ensures that
the message is communicated in a consistent fashion. This results in all
learners receiving the same training.
E-learning
3. High Learning Retention – Blended learning approaches result in a higher
knowledge retention rate. It also helps that coursework can be refreshed and
updated whenever needed.
4. Time and Money Savings – This one is pretty well known, and a staple of
any well-done e-learning program. E-learning reduces time away from the
workplace, eliminates the need for travel, and removes the need for
classroom-based training.
5. Activity and ROI Measurements – If you are using a learning management
system to deliver your e-learning, then tracking learner progress is a piece-of-
cake, and reporting on this activity is just as simple.
6. Reduction of the Carbon Footprint – By leveraging e-learning for online
testing and quizzing, the need for printing out paper-based assessments is
reduced, in fact it’s practically eliminated altogether!
7. Flexible – Using e-learning, you can give employees and students the
freedom to learn at their own convenience, and at a pace that is right for
them. Staff can be trained in remote locations and in a consistent fashion as
anyone receiving on-site training.
NEPTEL Portal, TED Talks
E-group
 A group (often termed as a community, e-group or club) is a feature
in many social network services which allows users to create, post,
comment to and read from their own interest- and niche-specific
forums, often within the realm of virtual communities.
 Groups, which may allow for open or closed access, invitation and/or
joining by other users outside the group, are formed to provide mini-
networks within the larger, more diverse social network service.
 Much like electronic mailing lists, they are also owned and maintained
by owners, moderators, or managers, which possess the capability of
editing posts to discussion threads and regulating member behavior
within the group.
 However, unlike traditional Internet forums and mailing lists, groups in
social networking services allow owners and moderators alike to share
account credentials between groups without having to log into each
and every group
 CERN Network
Virtual school
Virtual school refers to an institution that is
not "brick and mortar" bound. All student
services and courses are conducted through
Internet technology. The virtual school
differs from the traditional school through the
physical medium that links administrators,
teachers, and students.
Virtual school examples: NIOS, INACOL,
African Virtual School, Alabama Association
of School Boards
Electronic governance or e-governance
Electronic governance or e-governance is
the application of information and
communication technology (ICT) for
delivering government services.
Through e-governance, government services
will be made available to citizens in a
convenient, efficient and transparent manner.
Generally four basic models are available –
government-to-citizen (customer),
government-to-employees, government-to-
government and government-to-business.
Computer Security Threads
 There are many types of computer security threats in this
world. Some are pretty harmful while some are totally
harmless although annoying. There are also some which does
not do any damage to your computer, but has the capability to
empty the numbers in your bank account.
 It’s a dangerous world out there in the World Wide Web. Just
as your mother may have told you to never talk to strangers,
the same advice holds true for the virtual world. You may
know to be wary of giving strangers your business bank
account details. But can you be sure the website you’re
logging into is that of your bank and not a forgery created by a
cybercriminal?
 Cybercriminals use many different methods to lure you into
parting with your confidential personal or business
information. As a small company doing business on the web,
you need to be aware of these methods so you can be extra
vigilant when online.
Malware
Malware, short for malicious software, consists of
programming (code, scripts, active content, and
other software) designed to disrupt or deny
operation, gather information that leads to loss of
privacy or exploitation, gain unauthorized access
to system resources, and other abusive behavior.
The expression is a general term used by computer
professionals to mean a variety of forms of hostile,
intrusive, or annoying software or program code.
Malware is not the same as defective software
— software that has a legitimate purpose but
contains harmful bugs(programming errors).
Types of Malware
Virus: Like its living counterpart, a computer virus
infects your computer, taking control over some or all of
its functions. The virus destroys data or looks for things
like passwords, credit card numbers, or other sensitive
data. This information is often sent to another computer.
A virus can also use your computer to relay spam email
or pornography or to coordinate attacks against websites
on the Internet.
Types of Malware
Adware
 Adware, or advertising-supported software, is any software package
which automatically plays,
 displays, or downloads advertisements to a computer. These
advertisements can be in the form of a pop- up. The object of the
Adware is to generate revenue for its author. Adware, by itself, is
harmless; however, some adware may come with integrated spyware
such as keyloggers and other privacy-invasive software.
 Advertising functions are integrated into or bundled with the software,
which is often designed to note what Internet sites the user visits and
to present advertising pertinent to the types of goods or services
featured there. Adware is usually seen by the developer as a way to
recover development costs, and in some cases it may allow the
software to be provided to the user free of charge or at a reduced
price. The income derived from presenting advertisements to the user
may allow or motivate the developer to continue to develop, maintain
and upgrade the software product. Conversely, the advertisements may
be seen by the user as interruptions or annoyances, or as distractions
from the task at hand.
Types of Malware
Rootkit:
 According to TechTarget, a rootkit is a collection of tools
that are used to obtain administrator-level access to a
computer or a network of computers. A rootkit could be
installed on your computer by a cybercriminal exploiting a
vulnerability or security hole in a legitimate application on
your PC and may contain spyware that monitors and
records keystrokes.
 Rootkits gained notoriety when, in 2005, a security blogger
discovered that a copy-protection tool inside music CDs
from Sony BMG Music Entertainment was secretly installing
a rootkit when users copied the CD onto their computers. At
the time, security expert Bruce Schneier warned that the
rootkit could allow a hacker to “gain and maintain access to
your system and you wouldn’t know it.”
Types of Malware
Keyloggers:
 Records everything you type on your PC in order to glean
your log-in names, passwords, and other sensitive
information, and send it on to the source of the keylogging
program. Many times keyloggers are used by corporations
and parents to acquire computer usage information.
 Rogue security software
 This is software designed to appear like legitimate security
software and misleads users into believing their computer is
infected with a virus, with the intent of tricking them into
paying money for a fake malware removal tool. The fake
malware removal tool can even introduce real malware onto
the computer
Types of Malware
Ransomware
Ransomware is a form of malware that essentially
holds a computer system captive while demanding a
ransom. The malware restricts user access to the
computer either by encrypting files on the hard drive
or locking down the system and displaying messages
that are intended to force the user to pay the malware
creator to remove the restrictions and regain access
to their computer. Ransomware typically spreads like
a normal computer worm (see below) ending up on a
computer via a downloaded file or through some other
vulnerability in a network service.
Types of Malware
Browser Hijacker:
When your homepage changes to one that looks like
those in the images inserted next, you may have been
infected with one form or another of a Browser Hijacker.
This dangerous Malware will redirect your normal
search activity and give you the results the developers
want you to see. Its intention is to make money off your
web surfing. Using this homepage and not removing the
Malware lets the source developers capture your surfing
interests. This is especially dangerous when banking or
shopping online. These homepages can look harmless,
but in every case they allow other more infectious
Types of Malware
Trojans horse
 In broad terms, a Trojan horse is any program that invites the
user to run it, concealing a harmful or malicious payload. The
payload may take effect immediately and can lead to many
undesirable effects, such as deleting the user's files or further
installing malicious or undesirable software. Trojan horses known
as droppers are used to start off a worm outbreak, by "injecting“
the worm into users' local networks.
 One of the most common ways that spyware is distributed is as a
Trojan horse, bundled with a piece of desirable software that the
user downloads from the Internet. When the user installs the
software, the spyware is installed alongside. Spyware authors
who attempt to act in a legal fashion may include an end-user
license agreement that states the behavior of the spyware in
loose terms, which the users are unlikely to read or understand
Types of Malware
Spyware
 Spyware is a type of malware that functions by spying on
user activity without their knowledge. These spying
capabilities can include activity monitoring, collecting
keystrokes, data harvesting (account information, logins,
financial data), and more.
 Spyware often has additional capabilities as well, ranging
from modifying security settings of software or browsers to
interfering with network connections. Spyware spreads by
exploiting software vulnerabilities, bundling itself with
legitimate software, or in Trojans.
 And if stealing your information isn’t bad enough, Spyware is
also known to cause PC slowdown, especially when there is
more than one program running on your system – which is
usually the case with a system that’s infected.
Worms
A computer worm is very similar to a virus. The
design is the same but, unlike a virus, a worm is
capable of moving from system to system without any
human action. Worms replicate themselves on your
system, attaching themselves to different files and
looking for pathways between computers, such as a
computer network that shares common file storage
areas. Like viruses, worms are often associated with
causing damage to computer systems.
Worms work to “eat” the system operating files and
data files until the drive is empty.
Computer Virus Computer Worm

How does it infect a It inserts itself into a It exploits a


computer system? file or executable weakness in an
program. application or
operating system by
replicating itself.
How can it spread? It has to rely on users It can use a network
transferring infected to replicate itself to
files/programs to other computer
other computer systems without user
systems. intervention.
Does it infect files? Yes, it deletes or Usually not. Worms
modifies files. usually only
Sometimes a virus monopolize the CPU
also changes the and memory.
location of files
whose speed is virus is slower than worm is faster than
more? worm. virus. E.g.The code
red worm affected 3
lack PCs in just 14
Hrs.
Dependency Need host program to Independent(any file
Security Attacks
Some common internet security attacks are:-
Phishing
Phishing is the attempt to obtain sensitive
information such as usernames, passwords,
and credit card details (and, indirectly,
money), often for malicious reasons, by
disguising as a trustworthy entity in an
electronic communication. The word is a
neologism created as a homophone of fishing
due to the similarity of using a bait in an
attempt to catch a victim.
Security Attacks
Eavesdropping
Eavesdropping is the unauthorized real-time interception of a
private communication, such as a phone call, instant
message, videoconference or fax transmission. The term
eavesdrop derives from the practice of actually standing
under the eaves of a house, listening to conversations inside.
Cyberbullying
Cyberbullying is bullying that takes place using electronic
technology. Electronic technology includes devices and
equipment such as cell phones, computers, and tablets as
well as communication tools including social media sites, text
messages, chat, and websites.
Examples of cyberbullying include mean text messages or
emails, rumors sent by email or posted on social networking
sites, and embarrassing pictures, videos, websites, or fake
Security Attacks
Spoofing
Spoofing, in general, is a fraudulent or malicious practice
in which communication is sent from an unknown source
disguised as a source known to the receiver. Spoofing is
most prevalent in communication mechanisms that lack a
high level of security.
Email spoofing is one of the best known spoofs. Since
core SMTP fails to offer authentication, it is simple to
forge and impersonate emails. Spoofed emails may
request personal information and may appear to be from
a known sender. Such emails request the recipient to
reply with an account number for verification. The email
spoofer then uses this account number for identity theft
purposes, such as accessing the victim's bank account,
changing contact details and so on.
Security Attacks
Snooping
Snooping, in a security context, is
unauthorized access to another person's or
company's data. The practice is similar to
eavesdropping but is not necessarily limited
to gaining access to data during its
transmission. Snooping can include casual
observance of an e-mail that appears on
another's computer screen or watching what
someone else is typing. More sophisticated
snooping uses software programs to remotely
monitor activity on a computer or network
Security Attacks
Cyberstalking
Cyberstalking is the use of the Internet or
other electronic means to stalk or harass an
individual, group, or organization. It may
include false accusations, defamation, slander
and libel. It may also include monitoring,
identity theft, threats, vandalism, solicitation
for sex, or gathering information that may be
used to threaten, embarrass or harass.
Security Attacks
Trolling
Trolling is “the act of being a troll”. In Internet
slang, a troll is a person who sows discord on the
Internet by starting arguments or upsetting people,
by posting inflammatory, extraneous, or off-topic
messages in an online community (such as a
newsgroup, forum, chat room, or blog) with the
intent of provoking readers into an emotional
response or of otherwise disrupting normal, on-
topic discussion, often for the troll's amusement.
Troll can occur anywhere that has open area where
people can freely post their thoughts and opinions.
Virus Detection and Removal
Antivirus software is practically a requirement for
anyone using the Windows operating system. While
it's true you can avoid computer viruses if you
practice safe habits, the truth is that the people who
write computer viruses are always looking for new
ways to infect machines. There are several different
antivirus programs on the market -- some are free
and some you have to purchase. Keep in mind that
free versions often lack some of the nicer features
you'll find in commercial products. Examples are
avast!, Avira, AVG Anti-Virus, BitDefender,
LinuxShield, McAfee VirusScan, NOD32 etc.
Digital Certificate
A digital certificate (also known as a public
key certificate or identity certificate) is an
electronic document which uses a digital
signature to bind together a public key or
password required for decode and encoded
document with an authentic identity such as
the name of a person or an organization, their
phone numbers or address, and so forth. The
certificate can be used to verify that a public
key belongs to an authorized individual or
organization.
Digital Signature
A digital signature is a mathematical scheme for
demonstrating the authenticity of digital messages or
documents. A valid digital signature gives a recipient
reason to believe that the message was created by a
known sender (authentication), that the sender cannot
deny having sent the message (non-repudiation), and
that the message was not altered in transit (integrity).
To protect the integrity of the signature, PKI requires
that the keys be created, conducted, and saved in a
secure manner, and often requires the services of a
reliable Certificate Authority (CA). Digital signature
providers, like DocuSign, meet PKI requirements for
safe digital signing.
Password
A password is a string of characters used to verify
the identity of a user during the authentication
process. Passwords are typically used in conjuncture
with a username; they are designed to be known only
to the user and allow that user to gain access to a
device, application or website. Passwords can vary in
length and can contain letters, numbers and special
characters. Other terms that can be used
interchangeably are passphrase for when the
password uses more than one word, and passcode
and passkey for when the password uses only
numbers instead of a mix of characters, such as a
personal identification number.
Cookie
An cookie (also called web cookie, Internet cookie,
browser cookie, or simply cookie) is a small piece of
data sent from a website and stored on the user's
computer by the user's web browser while the user is
browsing. Cookies were designed to be a reliable
mechanism for websites to remember stateful information
(such as items added in the shopping cart in an online
store) or to record the user's browsing activity (including
clicking particular buttons, logging in, or recording which
pages were visited in the past). They can also be used to
remember arbitrary pieces of information that the user
previously entered into form fields such as names,
addresses, passwords, and credit card numbers.
Firewall
A firewall is a network security system designed
to prevent unauthorized access to or from a
private network. Firewalls can be implemented in
both hardware and software, or a combination of
both. Network firewalls are frequently used to
prevent unauthorized Internet users from
accessing private networks connected to the
Internet, especially intranets. All messages
entering or leaving the intranet pass through the
firewall, which examines each message and
blocks those that do not meet the specified
security criteria.
Hacker
 A hacker is a term that first started being used in the 1960s
and described a programmer or someone who hacked
computer code. Later the term evolved into an individual
who had an advanced understanding of computers,
networking, programming, or hardware, but did not have
any malicious intents.
 In 1981, Ian Murphy, also known as "Captain Zap", became
the first hacker to be convicted of hacking. He hacked into
the AT&T computer network and modified the billing rates
system, changing the internal clocks so that cheaper late-
night rates were billed to customers during mid-day hours.
 Today, a malicious hacker is usually referred to as a
malicious user, black hat, or criminal hacker, which
describes any individual who illegally breaks into computer
systems to damage or steal information.
Cracker
A cracker is someone who breaks into someone
else's computer system, often on a network;
bypasses passwords or licenses in computer
programs; or in other ways intentionally breaches
computer security. A cracker can be doing this for
profit, maliciously, for some altruistic purpose or
cause, or because the challenge is there. Some
breaking-and-entering has been done ostensibly
to point out weaknesses in a site's security
system.
The term "cracker" is not to be confused with
"hacker". Hackers generally deplore cracking.
Cyberspace
Cyberspace can be defined as an intricate environment
that involves interactions between people, software,
and services. It is maintained by the worldwide
distribution of information and communication
technology devices and networks.
 For example, an object in cyberspace refers to a block
of data floating around a computer system or network.
With the advent of the Internet, cyberspace now
extends to the global network of computers. So, after
sending an e-mail to your friend, you could say you sent
the message to her through cyberspace. However, use
this term sparingly, as it is a popular newbie term and
is well overused.
Cyber Security
Cybersecurity denotes the technologies and procedures
intended to safeguard computers, networks, and data
from unlawful admittance, weaknesses, and attacks
transported through the Internet by cyber delinquents.
Ensuring cyber security requires coordinated efforts
throughout an information system.
Elements of cyber security include:
 Application security
 Information security
 Network security
 Disaster recovery / business continuity planning
 Operational security
 End-user education
Cybercrime
Cybercrime, also called computer crime, is any
illegal activity that involves a computer or network-
connected device, such as a mobile phone.
Cyber crime encompasses any criminal act dealing
with computers and networks (called hacking).
Additionally, cyber crime also includes traditional
crimes conducted through the Internet. For
example; hate crimes, telemarketing and Internet
fraud, identity theft, and credit card account thefts
are considered to be cyber crimes when the illegal
activities are committed through the use of a
computer and the Internet.
Cybercrime divided into three categories
The Department of Justice divides cybercrime
into three categories: crimes in which the
computing device is the target, for example,
to gain network access; crimes in which the
computer is used as a weapon, for example,
to launch a denial of service (DoS) attack; and
crimes in which the computer is used as an
accessory to a crime, for example, using a
computer to store illegally-obtained data.
Cyber Laws in India
The parliament of India has passed its first cyberlaw, the
information technology act 2000. The Government of India
enacted The Information Technology Act with some major
objectives which are as follows −
 To deliver lawful recognition for transactions through
electronic data interchange (EDI) and other means of
electronic communication, commonly referred to as
electronic commerce or E-Commerce. The aim was to use
replacements of paper-based methods of communication and
storage of information.
 To facilitate electronic filing of documents with the
Government agencies and further to amend the Indian Penal
Code, the Indian Evidence Act, 1872, the Bankers' Books
Evidence Act, 1891 and the Reserve Bank of India Act, 1934
and for matters connected therewith or incidental thereto.
Cyber Laws in India
 The Information Technology Act, 2000, was thus passed as
the Act No.21 of 2000. The I. T. Act got the President’s assent
on June 9, 2000 and it was made effective from October 17,
2000. By adopting this Cyber Legislation, India became the
12th nation in the world to adopt a Cyber Law regime.
 The IT Act, 2000 offers and its various perspective as
follows:-
 Creating a Secure Cyber Ecosystem
 Creating an Assurance Framework
 Encouraging Open Standards
 Strengthening the Regulatory Framework
 Creating Mechanisms for IT Security
 Securing E-governance Services
 Protecting Critical Information Infrastructure
Salient Features of I.T Act
The salient features of the I.T Act are as follows −
 Digital signature has been replaced with electronic signature to
make it a more technology neutral act.
 It elaborates on offenses, penalties, and breaches.
 It outlines the Justice Dispensation Systems for cyber-crimes.
 It defines in a new section that cyber café is any facility from where
the access to the internet is offered by any person in the ordinary
course of business to the members of the public.
 It provides for the constitution of the Cyber Regulations Advisory
Committee.
 It is based on The Indian Penal Code, 1860, The Indian Evidence Act,
1872, The Bankers' Books Evidence Act, 1891, The Reserve Bank of
India Act, 1934, etc.
 It adds a provision to Section 81, which states that the provisions of
the Act shall have overriding effect. The provision states that
nothing contained in the Act shall restrict any person from
exercising any right conferred under the Copyright Act, 1957.
Scheme of I.T Act
The following points define the scheme of the I.T. Act −
 The I.T. Act contains 13 chapters and 90 sections.
 The last four sections namely sections 91 to 94 in the I.T. Act 2000 deals with
the amendments to the Indian Penal Code 1860, The Indian Evidence Act
1872, The Bankers’ Books Evidence Act 1891 and the Reserve Bank of India
Act 1934 were deleted.
 It commences with Preliminary aspect in Chapter 1, which deals with the
short, title, extent, commencement and application of the Act in Section 1.
Section 2 provides Definition.
 Chapter 2 deals with the authentication of electronic records, digital
signatures, electronic signatures, etc.
 Chapter 11 deals with offences and penalties. A series of offences have been
provided along with punishment in this part of The Act.
 Thereafter the provisions about due diligence, role of intermediaries and
some miscellaneous provisions are been stated.
 The Act is embedded with two schedules. The First Schedule deals with
Documents or Transactions to which the Act shall not apply. The Second
Schedule deals with electronic signature or electronic authentication
technique and procedure. The Third and Fourth Schedule are omitted.
Amendments Brought in the I.T Act
 The I.T. Act has brought amendment in four statutes vide section 91-
94. These changes have been provided in schedule 1-4.
 The first schedule contains the amendments in the Penal Code. It has
widened the scope of the term "document" to bring within its ambit
electronic documents.
 The second schedule deals with amendments to the India Evidence
Act. It pertains to the inclusion of electronic document in the
definition of evidence.
 The third schedule amends the Banker's Books Evidence Act. This
amendment brings about change in the definition of "Banker's-book".
It includes printouts of data stored in a floppy, disc, tape or any other
form of electromagnetic data storage device. Similar change has been
brought about in the expression "Certified-copy" to include such
printouts within its purview.
 The fourth schedule amends the Reserve Bank of India Act. It pertains
to the regulation of fund transfer through electronic means between
the banks or between the banks and other financial institution.
Digital Signature to Electronic Signature
Digital Signature was the term defined in
the old I.T. Act, 2000. Electronic Signature
is the term defined by the amended act (I.T.
Act, 2008). The concept of Electronic
Signature is broader than Digital Signature.
Section 3 of the Act delivers for the
verification of Electronic Records by affixing
Digital Signature.
As per the amendment, verification of
electronic record by electronic signature or
electronic authentication technique shall be
considered reliable.
Digital Signature
A digital signature is a technique to validate
the legitimacy of a digital message or a
document. A valid digital signature provides
the surety to the recipient that the message
was generated by a known sender, such that
the sender cannot deny having sent the
message. Digital signatures are mostly used
for software distribution, financial
transactions, and in other cases where there
is a risk of forgery.
Electronic Signature
An electronic signature or e-signature, indicates
either that a person who demands to have
created a message is the one who created it.
A signature can be defined as a schematic
script related with a person. A signature on a
document is a sign that the person accepts the
purposes recorded in the document. In many
engineering companies digital seals are also
required for another layer of authentication and
security. Digital seals and signatures are same
as handwritten signatures and stamped seals.
Offences Under The It Act 2000
The offences included in the I.T. Act 2000 are as follows −
 Tampering with the computer source documents.
 Hacking with computer system.
 Publishing of information which is obscene in electronic form.
 Power of Controller to give directions.
 Directions of Controller to a subscriber to extend facilities to
decrypt information.
 Protected system.
 Penalty for misrepresentation.
 Penalty for breach of confidentiality and privacy.
 Penalty for publishing Digital Signature Certificate false in certain
particulars.
 Publication for fraudulent purpose.
 Act to apply for offence or contravention committed outside India
Confiscation.
 Penalties or confiscation not to interfere with other punishments.

Offences Under The It Act
Section Offence Punishment

Imprisonment up to 3 years or fine up to


65 Tampering with Computer Source Code
Rs 2 lakhs
Imprisonment up to 3 years or fine up to
66 Computer Related Offences
Rs 5 lakhs

Sending offensive messages through


66-A Imprisonment up to 3 years and fine
Communication service, etc...

Dishonestly receiving stolen computer Imprisonment up to 3 years and/or fine


66-B
resource or communication device up to Rs. 1 lakh

Imprisonment of either description up to


66-C Identity Theft
3 years and/or fine up to Rs. 1 lakh

Cheating by Personation by using Imprisonment of either description up to


66-D
computer resource 3 years and /or fine up to Rs. 1 lakh
Imprisonment up to 3 years and /or fine up to Rs. 2
66-E Violation of Privacy
lakh

66-F Cyber Terrorism Imprisonment extend to imprisonment for Life

On first Conviction, imprisonment up to 3 years and/or


Publishing or transmitting obscene material in electronic fine up to Rs. 5 lakh On Subsequent Conviction
67
form imprisonment up to 5 years and/or fine up to Rs. 10
lakh

On first Conviction imprisonment up to 5 years and/or


Publishing or transmitting of material containing sexually fine up to Rs. 10 lakh On Subsequent Conviction
67-A
explicit act, etc... in electronic form imprisonment up to 7 years and/or fine up to Rs. 10
lakh

On first Conviction imprisonment of either description


Publishing or transmitting of material depicting children up to 5 years and/or fine up to Rs. 10 lakh On
67-B
in sexually explicit act etc., in electronic form Subsequent Conviction imprisonment of either
description up to 7 years and/or fine up to Rs. 10 lakh

Intermediary intentionally or knowingly contravening the


67-C directions about Preservation and retention of Imprisonment up to 3 years and fine
information

Imprisonment up to 2 years and/or fine up to Rs. 1


68 Failure to comply with the directions given by Controller
lakh

Failure to assist the agency referred to in sub section (3)


69 in regard interception or monitoring or decryption of any Imprisonment up to 7 years and fine
information through any computer resource
Failure of the intermediary to comply with the direction issued for
69-A blocking for public access of any information through any computer Imprisonment up to 7 years and fine
resource

Intermediary who intentionally or knowingly contravenes the


69-B provisions of sub-section (2) in regard monitor and collect traffic data Imprisonment up to 3 years and fine
or information through any computer resource for cybersecurity

Any person who secures access or attempts to secure access to the Imprisonment of either description up
70
protected system in contravention of provision of Sec. 70 to 10 years and fine

Indian Computer Emergency Response Team to serve as national


agency for incident response. Any service provider, intermediaries, Imprisonment up to 1 year and/or fine
70-B
data centres, etc., who fails to prove the information called for or up to Rs. 1 lakh
comply with the direction issued by the ICERT.

Imprisonment up to 2 years and/ or


71 Misrepresentation to the Controller to the Certifying Authority
fine up to Rs. 1 lakh.
Imprisonment up to 2 years and/or fine
72 Breach of Confidentiality and privacy
up to Rs. 1 lakh.
Imprisonment up to 3 years and/or fine
72-A Disclosure of information in breach of lawful contract
up to Rs. 5 lakh.
Imprisonment up to 2 years and/or fine
73 Publishing electronic Signature Certificate false in certain particulars
up to Rs. 1 lakh
Imprisonment up to 2 years and/or fine
74 Publication for fraudulent purpose
up to Rs. 1 lakh

You might also like