Jumaat, 29 April 2011

CHAPTER 2 - COMPUTER SYSTEMS

1.0  System concept

1.1  Define Computer Systems.


Computer is an electronic device, operating under the control of instructions stored its own memory,
  • that can accept data (input),
  • process the data according to specified rules (process),
  • produce results (output),
  • and store the results for future use (storage).
Meaning of input, process, output and storage.
  1. Input - input is any data and instructions entered into the memory of a computer. There are four types of input which are: text, graphics, audio, and video.
  2. Input device - Input device is any hardware component that allows users to enter data and intructions into a computer. Eg: keyboard, mouse, scanner, barcode reader. Also pointing device: mouse, joystick, trackball, touch screen, pointing stick and graphic tablets.'
  3. CPU/central processing unit - CPU is an electronic component on a computer's motherboard that interprets and carries out the basic instructions that operate the computer. Eg: intel pentium IV, AMD Athlon, G4.
  4. Output - output is data that has been processed into a useful form, called information.
  5. Output device - Eg: speaker, monitor, LCD projector, p\printer, plotter.
  6. Storage - storage is a location in which data, instructions, and information are saved for future use. Eg: CD ROM, diskette, hard disk.

Ahad, 3 April 2011

2.9 FRAUD, COPYRIGHT INFRINGEMENT, THEFT, and ATTACKS.


a) Computer fraud is the crime of obtaining money by deceiving (to trick) people through the use of                computers. There are many forms of computer frauds which include

  • e-mail hoaxes (hoax- an attempt to make people believe something that is not true)
  • program fraud
  • investment schemes
  • sales promotion
  • claim of expertise on certain fields
b) Copyright infringement is defined as a violation (an action to break the law) of the rights secured by a copyright. Copyright is the legal right to be the only producer seller of a book, song and film. Infringement of copyright occurs when you break the copyright laws such as copying movies, software or CD's illegally - selling pirate software. Piracy is the crime of illegally copying and selling books, tapes, videos, computer programs.

c)Computer theft is the defined as the unauthorized used of another person's property. Example of computer thefts are

  • transfer of payment to the wrong accounts
  • get online materials with no cost
  • tap (memasuki) into the data transmission lines
d)Computer attack is defined as any activities taken to disrupt (causing problems so that something cannot continue normally) the equipment of computers systems, change processing  controls and corrupt stored data. Corrupt - when data on a computer becomes corrupt, it is spoilt and cannot be properly used because it has become changed in wrong ways.

Computers attack can be in the forms of

  • Physical attack that disrupt the computer facilities or transmission lines.
  • An electronic attack that

Sabtu, 2 April 2011

COMPUTER CRIMES

2.8 Need for cyber law

In today's highly digitalized world, almost everyone is affected by cyber law. Let us take a few examples: 
  • Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form.
  • Government forms including income tax returns, company law forms etc are now filled in electronic forms.
  • most people are using email, cell phones and SMS message for communication.

Examples of cyber abuse on the users
  • sending a computer virus via e-mail.
  • harassment through e-mail.
  • hacking into school's database to charge your examination results.
Why we need cyberlaw
  1. Criminal activities can be brought to justice. If any criminal happen to customers, they can bring who.
  2. Cyber Laws are made to force people to be good, because individuals are more controlled by their passion and alone can't make them good, so laws were created to scare people in being 'good'.
  3. Customer is made to feel secure because bank protects their money.
  4. To give protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal tranmission of data or messages over computers, hacking and cracking of computer systems and networks.
2.7  PROCESS OF FILTERING to control access to controversial contents.

The method of choice to limit access on the Internet is to filter either by

  • keyword blocking.This method uses a list of banned word objects terms such as xxx, sex and nude. As the page is downloading, the filter searches for any these words. If found, it will blocked the page completely, stop downloading the page, block the banned words and even shut down the browser.
  • Site blocking. This method use software to list the web sites that will be blocked by using software. The software also prevents user from being access the web sites on list.
  • Web rating system. Web sites are rating in terms of nudity, sex violence and language. The web sites rates can be done by setting the browser to only accept pages with certain level of ratings.