INFORMATICS MODULE 1 NOTES
INFORMATICS MODULE 1
SYLLABUS
⭕⭕⭕⭕⭕
Overview of Information Technology: Cyber ethics, cyber crime, cyber threats, security, and privacy issues, cyber laws in India, cyber addictions and health issues- guide lines for proper usage of computers
⭕⭕⭕⭕⭕⭕
🔰IT MEANING
Information technology (IT) is the use of computer systems or devices to access information.
1. What is Information Technology ?
➤ Information Technology (IT) is the application of computers and telecommunication technology to obtain, process, store, retrieve & transmit data, in the form of voice, pictures or text or often in the context of a business or other enterprise.
➤ IT can do atleast 3 things:
👉It can process raw data into useful information.
👉It can recycle processed information & use it as data in another processing step.
👉It can pack information in a new form so its easier to understand, more attractive, or more useful.
IT merges computers with communication to make it information technology. Thus there are two main parts to Information technology:
Computer Technology
Communication Technology
Information technology (IT) is the use of technology to manage, process, protect, and exchange information. It's a broad field that includes the use of computers, telecommunication systems, consumer electronics, and broadcasting.
IT is used in many ways, including:
👉Business operations
IT is used to build communications networks, create and maintain databases, and troubleshoot computer and mobile device issues.
👉Data management
IT is used to gather, analyze, and present data in real-time, which can help with decision-making, forecasting, risk management, and performance management.
👉Cybersecurity
IT is used to protect systems, networks, and data from malicious actors. Cyber security has evolved to include sophisticated defense systems that use artificial intelligence (AI), machine learning, and behavioral analytics.
👉Personal use
IT is used for many personal tasks, such as using a spreadsheet to track exenvironment
.
🔰CYBER ETHICS🔰
Cyber ethics, or cybersecurity ethics, is a set of moral rules and guidelines for behavior in the online environment
A branch of ethics that explores the moral and ethical issues that arise in cyberspace.
Cyber ethics are important because they help ensure the security and integrity of digital systems and programs. They also help protect data from cyber attackers who want to steal it and use it for malicious purposes.
Some ethical considerations in cybersecurity include:
👉Privacy: Ensuring that privacy is respected when handling data
👉Fairness: Ensuring that data is handled fairly
👉Transparency: Ensuring that the system is transparent so that users can understand how it works
👉Accountability: Ensuring that there is accountability when responding to threats
👉Confidentiality: Ensuring that sensitive data is handled with the utmost confidentiality
🔰🔰🔰
CYBER CRIME
Cybercrime is illegal activity involving computers, the internet, or network devices.
Cybercrime
Cyber crime encompasses (surround) any criminal act done with the help of computer or any electronic device with the help of internet is cyber crime
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.
• Cybercrime may also be referred to as computer crime.
There are many types of cybercrime, including:
👉Hacking
Unauthorized access to a computer system or account to compromise computer resources
👉Online financial fraud
Unauthorized access to computer systems to cause financial gain for the cyber criminal or financial loss for the victim
👉Cyberstalking
Tracking a victim's online activity or using social media to monitor their whereabouts
👉Social engineering
Criminals contact a victim directly, usually by phone or email, to gain their confidence and obtain information like passwords or bank information
👉Phishing
Emails that contain links to websites that are affected by malware or to fake online banking websites
👉Spam
Unsolicited commercial messages sent via email, SMS, MMS, or other electronic messaging media
👉Ransomware
A type of computer malware that encrypts a victim's files and storage media, holding the data hostage until the victim pays a ransom to decrypt the device
👉Software piracy
Unauthorized reproduction, distribution, and use of software
👉Cyber terrorism
Targeted attacks on military installations, power plants, air traffic control, banks, and other systems
🔰🔰🔰
CYBER SECURITY & PRIVACY ISSUES
🔰🔰
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users through ransomware; or interrupting normal business processes.
🔰Privacy issues in cybersecurity include:
👉Data sharing
Users may not be aware of how their data is shared across online services, or how it's used.
👉Lack of transparency
Privacy policies for web applications may be difficult to understand.
👉Social media
Social media posts may reveal more personal information than users realize.
👉Cybercrime
Attackers may steal user data to commit fraud, compromise systems, or sell it on underground markets.
👉Phishing
Phishing websites can threaten users' financial and privacy security.
👉Surveillance
People may be concerned about constant surveillance of their data, especially with the Internet of Things.
👉Artificial intelligence
AI can collect large amounts of data, and there are ethical concerns about how that data is used.
👉Confidentiality
Security professionals handle personal information that should be kept confidential.
👉Cyber espionage
Cyber espionage can lead to intellectual property theft, financial losses, and reputational damage.
Organizations can help protect user privacy by:
Ensuring that personal data is protected and used in compliance with data protection laws
Developing incident response plans and cyber legal playbooks
Conducting gap assessments to identify weaknesses
🔰CYBER LAW IN INDIA🔰
The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000.
Cyber law is important because it protects individuals, organizations, and governments from cyber threats. Cyber law is applicable to almost all activities in cyberspace, including:
👉Privacy and data protection
Cyber law regulates the collection, storage, and use of personal and sensitive information.
👉Intellectual property protection
Cyber law protects intellectual property like music, movies, software, and written content.
👉Cybersecurity and cybercrime
Cyber law defines and enforces rules to protect against cyberattacks, hacking, and online fraud.
👉E-commerce and online contracts
Cyber law establishes rules for online contracts, electronic signatures, consumer protection, and dispute resolution.
👉Freedom of expression and speech
Cyber law regulates hate speech, defamation, and other harmful online content.
👉Digital signature laws
Cyber law validates the authenticity of digital signatures in electronic documents.
Cyber laws are essential in the digital world and will continue to evolve as technology advances.
The Information Technology Act 2000 has 94 sections focusing on the regulation of electronic exchanges. These sections collectively establish a comprehensive framework for electronic governance, digital signatures, and the legal recognition of electronic records.
🔰🔰
Here are some important sections of cyber law:
*Information Technology Act, 2000 (India)*
1. Section 2(1)(b): Definition of "computer"
2. Section 2(1)(c): Definition of "computer system"
3. Section 4: Legal recognition of electronic records
4. Section 5: Electronic signature
5. Section 6: Regulation of cryptographic techniques
6. Section 43: Penalty for damage to computer, computer system, etc.
7. Section 44: Penalty for failure to furnish information
8. Section 45: Penalty for unauthorized access
9. Section 66: Hacking
10. Section 67: Publishing obscene information
*Data Protection and Privacy*
1. Section 43A: Compensation for failure to protect data
2. Section 72A: Disclosure of information in breach of confidentiality
*Electronic Commerce*
1. Section 4: Legal recognition of electronic records
2. Section 5: Electronic signature
3. Section 6: Regulation of cryptographic techniques
*Cyber Crimes*
1. Section 66: Hacking
2. Section 66B: Receiving stolen computer or communication device
3. Section 66C: Identity theft
4. Section 66D: Cheating by impersonation
5. Section 67: Publishing obscene information
6. Section 67A: Publishing child sex abusive material
*Intermediary Liability*
1. Section 79: Exemption from liability of intermediary
2. Section 79(3): Removal of intermediary liability
*Digital Signature*
1. Section 5: Electronic signature
2. Section 15: Use of digital signature
*Cyber Forensics*
1. Section 69: Monitoring and surveillance
2. Section 69A: Power to issue directions for blocking
*Other Important Sections*
1. Section 70: Protection of critical information infrastructure
2. Section 71: Penalty for misrepresentation
3. Section 72: Breach of confidentiality and privacy
These sections are crucial for understanding cyber law and its implications.
🔰5 Types Of Internet Addiction🔰
Internet addiction is a broad term that covers a range of behaviors and impulse-control problems involving internet, personal computer, and mobile technology. While there is yet no officially accepted criteria to diagnose an internet addiction, researchers have identified five subcategories of specific types of computer and internet addictions.
👉Cybersex AAddiction
A cybersex addiction is one of the more self-explanatory internet addictions. It involves online pornography, adult websites, sexual fantasy/adult chat rooms, and XXX webcam services. An obsession with any of these services can be harmful to one’s ability to form real-world sexual, romantic, or intimate relationships. Treatment options are available for those with cybersex addictions, typically in the form of intervention followed by ongoing inpatient or outpatient therapy.
👉Net Compulsions
Net compulsions concern interactive activities online that can be extremely harmful, such as online gambling, trading stocks, online auctions (such as eBay), and compulsive online shopping. These habits can have a detrimental impact on one’s financial stability and disrupt job-related duties. Spending or losing excessive amounts of money can also cause stress in one’s relationships. With instant and easy access to online casinos and stores, it is easy for those who are already susceptible to a gambling or spending addiction to get hooked online.
👉Cyber (Online) Relationship Addiction
Cyber or online relationship addicts are deeply involved with finding and maintaining relationships online, often forgetting and neglecting real-life family and friends. Typically online relationships are formed in chat rooms or different social networking sites but can occur anywhere one can interact with people online. Often people who pursue online relationships do so while concealing their real identity and appearance; this modern phenomena led to the creation of the term “catfish"
👉Compulsive Information Seeking
The internet provides users with a wealth of data and knowledge. For some, the opportunity to find information so easily has turned into an uncontrollable urge to gather and organize data. In some cases information-seeking is a manifestation of pre-existing, obsessive-compulsive tendencies. Compulsive information-seeking can also reduce work productivity and potentially lead to job termination.
👉Computer Or Gaming Addiction
Computer addiction, sometimes referred to as computer gaming addiction, involves online and offline activities that can be done with a computer. As computers became more widely available, games such as Solitaire, Tetris, and Minesweeper were programed into their software.
🔰physical and mental health issues🔰
Cyber addiction can lead to various physical and mental health issues, including:
🔰Physical Health Issues:
1. Sleep Deprivation:
Disrupts sleep patterns, leading to fatigue, decreased concentration, and mood disturbances.
2. Eye Strain and Vision Problems:
Prolonged screen time causes eye fatigue, dryness, and increased risk of myopia.
3. Headaches and Migraines: Excessive screen time triggers headaches, migraines, and tension headaches.
4. Poor Posture and Musculoskeletal Disorders: Prolonged sitting and screen time lead to back, neck, and shoulder pain.
5. Obesity and Sedentary Lifestyle: Decreased physical activity contributes to weight gain, diabetes, and cardiovascular disease.
6. Digestive Problems: Irregular eating habits, poor nutrition, and stress affect digestive health.
🔰Mental Health Issues:
1. Depression: Social isolation, lack of face-to-face interaction, and decreased self-esteem contribute to depression.
2. Anxiety and Stress: Constant notifications, pressure to respond, and fear of missing out (FOMO) increase anxiety.
3. Attention Deficit Hyperactivity Disorder (ADHD): Excessive screen time exacerbates ADHD symptoms.
4. Addiction and Substance Abuse: Cyber addiction increases risk of substance abuse and other addictive behaviors.
5. Social Isolation and Loneliness: Reduced face-to-face interaction leads to feelings of loneliness and disconnection.
6. Suicidal Thoughts and Behaviors: Severe cyber addiction contributes to increased suicidal risk.
🔰Neurological Effects:
1. Brain Atrophy: Excessive screen time affects gray matter volume, leading to cognitive decline.
2. Dopamine Dysregulation: Cyber addiction alters dopamine release, contributing to addiction and impulsivity.
3. Neuroplasticity Changes: Repeated exposure to screens rewire brain connections, affecting cognitive function.
Prevention and Treatment:
1. Set boundaries and limits
2. Practice digital detox
3. Engage in physical activities
4. Seek professional help (therapy, counseling)
5. Use website blockers and monitoring software
6. Establish screen-free zones
🔰GUIDELINES FOR PROPER USE OF COMPUTERS 🔰
Here are some guidelines for using a computer and the internet:
Use strong passwords: Use a password that is at least 15 characters long and includes letters, numbers, and special characters.
Update software: Keep your antivirus software and internet browser up to date. You should also update your computer's operating system with the latest patches.
Be aware of risks: Be alert to unusual computer activity or problems. Beware of links sent via instant messaging and email attachments.
Use a firewall: Install and maintain a firewall on your computer.
Use a pop-up blocker: Use a modern browser with a pop-up blocker.
Don't store sensitive material: Avoid storing sensitive material indefinitely on your computer.
Be respectful: Show others basic respect and kindness by not saying anything online that you would not also say offline.
Be aware of others' time: Be aware of others' time when communicating online.
Consider parental controls: Set up parental controls to restrict access and stop children from viewing content that is not suitable for them.
Don't steal information: Don't intentionally use the computers to retrieve or modify the information of others.
Don't plagiarize: Don't copy information from the internet as it is dishonest and could also be illegal.
Comments
Post a Comment