0% found this document useful (0 votes)
30 views39 pages

'Intro To IT' With You .

University student

Uploaded by

Lia blue
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views39 pages

'Intro To IT' With You .

University student

Uploaded by

Lia blue
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Intro to IT

Maryam Hussien U21102115


Chapter 1
Our digital planet
IT is the application of computing devices to Create, store, manipulate and exchange data.
It refers to an entire world of combined technologyies tightly integrated to deliver a
service for humanity.

Technology can be away to make an impact, as well as accelerate changes around the
world.
It's not luxury, it's necessity .

Technology changes how we purchase and consume goods such as:


- different marketing strategies.
- impact on health, environment, education, art, science, and engineering.

Digitally native: is the name of new generation that is raised among pervasive environment.

Becoming Computer literate:


- Helps to understand capabilities and imitations of computers, and knowing now to use
computers and safely efficiently.

So it means that you would be able to:


- avoid hackers, protect your self from identity theft.
- Being overwhelmed by sperm, use web effectively, dignose and fix problems.
The Journey to Modern Computers
Generation 0:
1815 Characteristics
Charles Babbage.
Uses
first mechanical computer.

First Generation:
1939-1955
vacuum tubes .
war era mainframes .
Huge, filled whole buildings, high electricity, high failure rate.
- Z1, Kunard Zuse, Germany.
- Colossus, Alan Turing, UK -> crack the Nazi codes "Enigma".
- Mark 1, Howard Aiken, USA.

Second Generation:
1956-1963
Transistors
Big, filled half rooms, faster them 1st, used punch cards as
input/output.

Third Generation:
1964-1970
Integrated circuits.
Lower costs faster, more efficient, smaller size.

Forth Generation:
1971-present
Microprocessors - CPU is a part of the microprocessor in the computer - “intel” .
Moor's low - silicon chips -double every 2years.
Embedded computers a microprocessor used as a component of a larger system that
preform specific tasks, they are operated by a firmware.

Servers is a Central computers that provides services other PCs over the network.
Faster processing power, serves multiple clients simultaneously "at the same time", Large
memory & storing capacity, connected via high speed network connection.

Supercomputer is a group of servers that provide critical mission " climate changes".
Faster & powerful then a server, thousands of cores, super speeds "Tera flops per
second".

The Internet:
Developed 1960s
used for research till 1980s
WWW - 1990s
The Journey of Computing
Institutional computing:
1950
corporate & government

Personal computing:
1975
schools & homes

Interpersonal computing:
1995
internet became Public

Collaborative computing:
2005
smartphones, wed 2.0 sites collaborating & contributing
Chapter 2
Hardware
Storage

All types of drives


USB stick, sd card

Processing devices

Input CPU Output


Enter data And instructions Send data out of the computer

Wifi, Bluetooth, modem

Communication

Binary system: is the system used to store, process and exchange data in computers.
Its language has two symbols ( 1 or 0 )
Bit is the binary digit, smallest unit of information that the computer
Process.
Easy to store, process, read.
It represent numbers, videos, text, photos, instructions.
1 Byte = 8 bits
N bits represent 2^N options
Converting between binary and decimals
I- binary to decimal

0 I 1 O O O 1 0 Binary bits
Same

1 Weight Levert
12864 3216 8 4 2
time

-
6432 - - -

2 -

Value in decimals

So it's 64+32+2= 98

2- decimal to binary
Divide by 2 till we reach 1, the number would be odd or even
odd = 1 , even = 0 even number in binary end with o, odd numbers end

- Convert 186 to binary

1821=93 935=46 421=23 223--11 21=5 5-2=2 2-2=1


Odd even odd odd odd even odd

I 0 I 1 I 0 I

So the binary of 186 is 1011101


Binary to text: codes represent each letter digit, special character.
1- ASCII: each character is a unique 8-bit code, 256 unique codes for 26 letters, lo
digits, special characters.
2- Unicode: supports more them 1000,000 unique characters, uses 32 bits, include
couple of languages.

Other data as binary:


Photo, videos, audio uses digitization.
Those devices are called ADC "analogue to digital convertors".

CPU: Central processing unit, electronic chip, it's boated in the motherboard, measured
in hertz.
1 GHz is equal to I billion clock cycles per second.
Older PCs 32 bits.
New PCs 64 bits.
Embedded systems 8 & 16 bits.

CPUs
1- Single Core: increase speed by increasing char speed but it's limit is overlocking.
2- Multi Core: multiple CPUs on single chip, parallel processing.
3- Cache Memory: internal storage of data in CPU.

CPU compatibility:
All softwares are not compatible with every CPU.
Newer versions can process instructions of older models but not vice Versa.
Memory
Random Access Memory “RAM”:
For primary storage or main memory.
Temporary storage, unique addresses, data can be stored randomly, very fast access,
data erase did power goes off.

Read only memory:


startup instructions, critical data, can't write new information, can't be erased.

Flash memory:
Read/Write/Erase data, data won’t be erased if power goes off.

Storing diverse:
Hard drives:
Secondary storage, stores programs & data, slower than main memory, huge storing
capacity.
Internal or portable.

Cloud storage:
Easy to access as long as you have internet connection, huge storage capacities, online
backup.

Green Computing
Use computer and related resources in an environmentally responsible manner.
Chapter 4
Software
Software is the link between humans and the computer, it's a set of instructions that tells
the computer what to do, how, where to send the result.

Desktop Apps

Applications

I Web Apps

i.
Mobile Apps

Software

Operating systems

System software
I Utility programs
Application software: designed to preform a group of functions for the benefit of the
user.

Desktop Apps: runs stand-alone on a desktop, laptop computer.


Bigger screen, not portable, very limited sensors, not all depend on internet.

Web Apps: accessible via web browsers.


Looks and feels like native app, written in HTML.
Easy access as long as you have internet, don't use CPU from your machine, online
collaborations, no need to update, accessible on wide range of devices, not device
Optimized.

Mobile Apps: designed for smartphones & tablets.


Smaller screen, portable, most apps depend on internet, way to much sensors.
Those apps are developed for a specific mobile operating system “ iOS, Android “

Some sensors:
Accelerometer: speed
Gyroscope: orientation
Magnetometer: directions
Barometer: atmosphere pressure
Proximity: the presence of nearby objects
NFC: near field communication
Software distribution:
Can be pre-installed in the operating system, download apps from digital distribution
platforms "AppStore, Google play, Microsoft Store", using server-side software.

Software revenue models:


Either free or at a cost, in app purchases "freemiums", use advertisements, have to
subsicibe

Software issues:
Compatibility: designed for specifics OS, “cross-platform” is when a software can
run on more than one OS.

Minimum requirements: software won't work or be installed if it doesn't met with it.

Recommended requirements: allow you to enjoy the full capabilities of your


software, such as games.

Software maintenance:

Updating: minor enhancements & bug fixes, done frequently, changing the decimal
points.
Software I → 1.1

Upgrading: significant new features, every year or two, changing the whole version
number.
Win 7- → Win 10
Performance issues:
Network issues: slow connection, if the server is down; web based apps can't run,
far from the network coverage.

Smartphones issues: poor battery, low ram/storage, multiple apps running in the
background.

Fixing software problems:

• Restart the software.


• Shut down and restart your computer.
• Uninstall the software, then reinstall it.
• Free up RAM by closing other open programs.
• Use the Internet to find help.
• Undo any recent hardware or software changes.
• Look for software patches.
• Scan for viruses and malware.

Ways to protect yourself against harmful apps:

• Only download apps from official app distributers


• Check suspicious app permissions
• Beware of app advertisements
• Switch off permissions for apps you don’t use
• Update your device firmware
iOS Jailbreaking: Process of removing software restrictions imposed by iOS, violates
your End User License Agreement; it also exposes your phone to security vulnerabilities
and puts your personal data at risk.

Rooting Android: Process of allowing users running the Android operating system to
attain privileged control (root access)

License – agreement to use the software: Single-user/device license,Volume license for


families, schools and organizations.

Copyright (to protect software owner rights): Is the legal right to copy, distribute, modify
and sell an original work.

Types:
Closed Source Code – not permitted to modify the code.
Open source code - right to use, modify and redistribute.

1
Algorithms:
A unified common language that all programmers understand, they convert it to software
using different programming languages.

Programming languages:
Low level: machine, assembly languages
High level: C++, Java, VB, Python, …

Programmers use high level languages, they are the people who write the software.
Debugging: to detect & correct errors.

System software: Includes the operating & utility

Operating systems: Microsoft OS family, Mac OS, Unix OS “ used by internet servers,
enables timesharing”, Apple iOS “2007”, Google android, Chrome OS “ web-based”

Utility programs: analyze, configure, optimize or maintain a computer, Some are included
with the OS while others are stand-alone applications. “ Copy files, Compress files (eg:
zip), Virus protection, Disk Cleanup, Backup”.

Device drivers: small programs that enable communication with devices. "Keyboard,
printers, flash memory".

Some Computing devices have full OS in ROM, Others have only a part in ROM and the
core in the Hard Drive, Booting Process “Loads OS from the Hard Drive into memory
(RAM)”.
How computer works:

Switch on ROM booting Load OS from


computer program starts HD to RAM
→ →

OS loads Word User selects Windows (OS)


(App Program) MS word controls screen
← -

Word controls Word process OS controls


screen ends screen
→ →
User interface: used to let the user to interact with the computer system, simple, '
effective and user friendly
• Old interfaces:
• Command Line: limited to text command.
• Menu Driven: use keyboard to open menu, shortcuts.
• Current interfaces:
• WIMP (Windows, Icons, Menus, Pointing devices)
• SILK (Speech, Image, Language, Knowledge)

WIMP:
Graphical User Interface ( GUI ): Menu Based, Submenus, Pop up Menus, RightClick, Task
Bar, Any Icon, Start Menu.
Tiles on the Start Screen, Windows Icon Shortcuts, Mac Icon Dock.
SILK:
Gesture Based Interfaces “motion”, VR, Augmented Reality “ikea app, Pokémon go”,
Mixed reality “3d interactive holograms”, Voice Commands “ Siri, Alexa”.
Chapter 5
Artificial Intelligence
AI vs. Automation:
- Automation: bunch of machines doing a repetitive task without human intervention.
- AI: simulation of intelligent behavior in computers, that should be compared to the
humans intelligence, helps improve the automation process by learning and improving
itself, let the machine make selections and decisions based on different factors.

Narrow AI: the only form humanity had achieved so far, preform a single task within
limited context. " playing chess, purchase suggestions, translation engine, self-driving
cars".

General AI: " human-level, strong", understanding & reasoning it's environment like
humans.

Super AI: much smarter than the smartest human being in every field.

Turing test The AI term


1950 1955
Alan Turing John McCarthy

he The Turing Test is a deceptively simple method of determining whether a


machine can demonstrate human intelligence: If a machine can engage in a
conversation with a human without being detected as a machine, it has
demonstrated human intelligence.
Small amount of data, more
human intervention, Shorter
training & lower accuracy.

Large amount of data, learn by


it's own from the environment
and past mistakes, longer
traning & higher accuracy.

Pattern Recognition: Predicting patterns with a high amount of accuracy.

Computer Vision: Interpret information from images/videos.

The rest of the ppt is common sense ig :) S


Chapter 6
Graphics, digital media & Multimedia
Computer graphics: representation of image data by a computer with help from hardware
& software.

Graphics terminology:

Pixels: smallest element in an image, square shape.


Image dimensions: width X height.
Ex: 1920 x 1080 = full hd "High Definition".

Graphic types:

2- Bitmap graphics "raster":


painting pixels on the screen with a pointing device life mouse, stylus, etc... Or capturing
an image with a digital camera.
- Rectangular grid of pixels.
- Each pixel color is specified by number of bits.
- JPG, BMP, PNG, GIF.
- Ms paint,adobe photoshop.
- The image quality is determined by: color depth & resolution

Color depth" bit depth": the number of bits devoted to each pixel.
- Monochrome → simple bit mapped, I bit per pixel can be 0,1 - black, white.
- Gray-scale → 8 bits per pixel, up to 256 shades of gray.
- Colored → 24 bits per pixel, RGB. Red, Green. Blue.
~

Resolution: pixel density of an image, ppi or dpi.


S the
Pixel perinch dots per inch
2- Vector graphics "object oriented": pointer movements translated into lines and patterns
on screen using mathematical formulas.
- Scalable graphics.
- Built using mathematical formulas.
- Can be resized without losing image quality.
- Adobe illustrator, inkscape.
- SVG.

File size = total number of


pixels in the image x the
number of bits that is
represented by each pixel.
" depend on the color depth".

Image processing:
- Filtering & cleaning: eliminate red eye & facial blemishes.
- Can distort & combine photos → tabloids.
- Can fabricate images.
- Clear X-ray images.
- Natural language processing → cleaning captcha phrases.
Computer vision:
Field that include acquiring, processing, analyzing & understanding images.
- Object detection.
- Tracking.
- Action recognition.
- Facial recognition.

3D modeling software:
Process of developing mathematical representation of any surface of an object in 3d via
specialized software.
- Rotate and view from different Angeles.
- Create walk through 3d environment that exists only in memory.
- Blender, 3D Max, autocad,unity "game engine".
- Animation movies,3D home design.

CAD "Computer Aided Design":


Use of computer system to assist creating, modifying, analyzing, optimizing a design.
- Cheaper, faster.
- Architects, brides design, test a prototype, design computer chips "PCB".
- Implants and human body models.

CAM " Computer Aided Manufacturing":


Use of software to control machine tools to help manufacture products.
- CAD tools → manufacturing instruction for machines.

CIM "Computer Integrated Manufacturing":


Combination of CAD / CAM, manufacturing approach of using computers to control the
entire production process.
- Increased productivity.
- Enhanced flexibility.
- Improved quality.
Presentation graphics:
- Used for lectures, sales demos.
- Shows on screens + projectors.
- Includes images,animation & video clips.
- Don't add too much text.
- Choose correct color theme.
- MS PowerPoint, press.

Multimedia:
Computer information can be represented through audio, video, & animation in addition to
traditional media.

Animation:
Pictures are manipulated to appear as moving images.
Frame → one of the images which compose the complete moving picture.
Frame Rate → number of images changing in one second.
- Standard = 30fps

Computer animation:
- Used in tv and movies to create effect that is hard to achieve without computers.
- Most are made with CGI " computer generated imagery".
- Tweeting → creating the in between frames.

Video:
Series of bitmap images that when played back create the illusion of movement.
The quality depends on:
- Frame size.
- Bit depth.
- Fps.
↳frame rate
Data Compression:
Encoding information using fewer bits than the original representation.
I- Lossless: don't want to loss any of the original info.
- WinZip, WinRar.
- Not good enough for multimedia data.
2- Lossy: recover a representation similar to the original one.
- More practical
- Reduce the colors → reduce the bits.
- MP3, JPEG, MPEG Video.
- High compression ratios.

Digital Audio:
Using microphone to capture sound from electric waves → digital data by ADC "Audio
digitizer: captures sound (analog) and stores it as a data file ". les
- Sampled "digitally recorded". DAC Is the obssite
- Synthesized "generated - fake ": of it, it converts
- Electronic instrument that generates, create, produces sound digital data to
- Using mathematical formulas. analog wave and
plays it.
Samplers:
Electronic instrument that uses recording "samples" of sounds that are loaded or recorded
into it by the user.

Visualizing a sound wave:


Repetitiveoscillations of sound vibrations.
A - Amplitude.
B - Wave length.
C - Frequency.
Digital sampling:
- Analog audio signal: continuous without interruption.

- Digital audio signal: sampled at regular intervals.

Audio quality:
1 - The sampling rate: number of samples per seconds, Hz.
2- The sample size" bit depth": bits used to represent a sample" 0 , 1 ", bits.
3- The number of channels: mono 'ID', stereo "more then 2D''.
Ge ID

Audio formats:
- WAV, AIFF: uncompressed → window & Mac OS.
- MP3: l / 10 of the original.
- WMA: MP3 for windows.
- AAC: MP3 for Apple.
- OGG : MP3 but open source and freely available.

Hypertext: text that contains links, non-sequential information, non-linear travel through
pages.

HyperMedia: combination of → text, numbers, sound, music, graphics, animation.

Interactive multimedia: Integration of digital media including electronic text, graphics,


moving images, and sound, into a structured digital computerized environment → allows
people to interact with the data for appropriate purposes.
Chapter 8
Networking & Digital Communication
Network fundamentals:
Computer Network: system that links two or more computers.
- Each computer = node.
- Essential components: hardware, software, people.

Network types:
I- PAN (Personal Area Network): communication between one persons’ devices.
- Connecting AirPods to iPhone and iPad using bluetooth.

2- LAN (local Area Network): computers are physically close to each other.
- Every node has a unique ip address.
- Can be connected wire, wireless.

3- MAN (Metropolitan Area Network): large network for specific geographical area.
- Entire city.

4- WAN (Wide Area Network): network that extends over a large physical distance.
- Internet is the largest WAN.
- Each LAN site = mode on WAN.

Bandwidth (Network speed):


Quantity of data transmitted per sec.
- Kbps, Mbps, Gbps.
- Depend on:
- Transmission media: copper wire or fiber optic. " 1 fiber optic = 10000 copper
wire ".
- Traffic on the network.
Networking components:
I- Switches / hubs: allow nodes to communicate together.

2- Routers: hardware devices or software programs,


- Route massages as they travel between networks.
- Connect two or more networks together.

3- Network Interface Card: let nodes communicate with each other.


- Wireless, wired NIC.

Networking models:
I- Client / receiver model: one or more computers act as dedicated servers and the
others act as clients.

2- peer to peer model: every computer on the network is both client & server.

Networking software:
I- NOS (Network operating system): is system that is available on servers and handles
communication and requests from multiple clients.

2- Communication protocols: system of rules that allow two for more entities of a
communications system to transmit information.
- Protocols are required for data exchange.

How does the internet work:


I- TCP/IP:
- The most famous protocol.
- Controls data exchange between computers on the internet.
- HTTP, FTP, DHCP, DNS.

2- Packets: the name of the small pieces that contain transmitted information over the
internet.
Making connections:
1- Modem connection: through telephone lines,conversion at both ends, up to 56.6 Kbps.

2- Broadband connection: grater bandwidth then moderns.


- DSL (Digital Subscriber Line): standard tel. Lines.
- Cable modems: fast TV cables.
- Satellite connection: TV dishes.
- Optical fiber: sea cables.

Wireless networks:
Computer network, uses wireless data connections between networkers nodes.
Examples:
- Wireless LAN. ->
local access network.
- Cell phone / modile network.
- Wireless sensor network.

Wireless Technology standards:


- Wi-Fi, Wi-MAX.
- Infrared, Bluetooth.
- 3G, 4G, 5G.
WAP → Wireless Access Point
Wi-Fi: &
Fastest growing wireless technology,uses radio waves to link computer to WAP, allow peer
to peer.
Affected by:
- Objects blocking the signals
- Antenna placement.
- Other wireless devices in the same air space.

The standard is 802.11


Wi-MAX:
Family of wireless broadband Communication, 802.16 is the standard, radio based, A
single tower can provide access to 25 square mile area.

Bluetooth:
Used for exchanging data between fixed and mobile devices over short distance.
- Communicate regardless of Os
- Uses low power, low cost, transmitters & receivers with long of 10-100 meters.

Mobile phone Network:


I- Tethering: cabling the laptop with the phone to get internet connection.
- Done over Wi-Fi.

2- Mobile hotspot: the device is acting like a portable WAP.

Securing wireless networks:


- Setup a password for your wireless network.
- Use encryption & wireless security protocols.
Network advantages:
- Share computer hardware resources.
- Share data & software programs.
- Work, play & communicate together.

Internet of Things (IoT):


Emerged due to real-time analytics, machine learning, sensors, automation &embedded
systems.
Applications:
- Smart home.
- Smart Cities.

Specialized Networks:
Blockchain: system that records transactions across several computers that are linked in
peer to peer, transactions are verified by network nodes & recorded in a
public ledger.
Applications:
- Cryptocurrencies: digital asset designed to work as a medium of exchange that uses
strong cryptography to secure financial transactions.

Interpersonal Computing:
Human to human: 70% of connected time is to communicate with other users, chatting,
blogging.

Online Communication:
Allows people to interact while being physically located at different places in the world.
1- Synchronous Communication:
- Real time Communication between all parties, instant messaging, Audio & Video
Conferencing.

2- Asynchronous Communication:
- Posters & readers don't have to be logged in at the same time.
- Emails,SMS.
Email:
Messages distributed by electronic means from one to one or more receivers via network.
Email Server: handles & delivers email over the internet.
Common issues:
- Spam: unwanted junk mail.
- Attachment sizes.
- Email size limitations.

Audio Communication:
Enables two or more people to use the computer as a telephone conferencing system.
1- IP telephony or voice over IP (VoIP): use internet protocols to exchange voice .

2-voice mail: computer-based system that allows users to exchange personal voice
messages.

Video Communication:
Video teleconferencing: Communication between people in feel-time " zoom meeting ".
Benefits:
- No need to travel.
- Saves time.
- Share resources and collaborate.

Blogging:
I- Blogs (web log): ongoing online diary or commentary written by an individual.
2- Micro blog: posting small pics (Instagram).
3- Video blog (vlog): posting video.

Social Network Revolution:


Online platform, people use it to build social relationship.
Social Media Influencers:
Who is famous in a specific industry.
- Has access to large audience.

Media sharing:
- Video shearing platforms: YouTube.
- Viral Video.
- Streaming: transmit or recivel ( dates "video" ) over the internet in continuous flow.
- Live streaming: recorded &broadcast in real time.
- Podcasting: digital recording, can be downloaded "audio".

Community collaboration:
Crowdsourcing: using the internet &the intelligence of the crowd to accomplish a task or
solve a problem for the benefit of all.
Forms:
- Crowdsolving: collaborative, holistic way using many people.
- Crowdfunding: collection of funds from the crowd to sponsor a project.
- Non-commercial work:anyone can contribute to it "Wikipedia".

Online gaming:
Gaming networks: playstation Network, Xbox Network,Nintendo Network.
Characteristics:
- Thousands of simultaneous players
- Players take roles in the virtual worlds
- Passionate addiction of the Players
- Cooperation among group of players required
Sharing resources:
I- Peer to Peer: sharing without posting on central server.
2- Grid computing: sharing processing power rather than data.
3- Cloud computing: from the internet.
Chapter 11
Computer Security & Risks

Computer Security: The protection of Computing systems & data from unauthorized
access, change or destruction.

Computer uses:
- Upholding laws:
Computer forensics: investigation of variety of Computer crimes, use special
softwares to find clues in complex cases, trace digital fingerprints "deleted files",
automated detection.
- Breaking the laws: viruses, identity theft…

Computer Crime:
- Cybercrime: any crime using computer or networks " company insiders → covered
up".
- Cyberstalking: repeatedly harm / harass people in a deliberate manner the internet.
(limit how much personal info you share )
- Cyber bullying: targeting children &young adults online (involves humiliation, rumors,
lies)
- Intellectual property theft: software piracy, plagiarism of copy righted text / songs,
illegal duplication of movies.
What is stolen?
Money, goods, info, software resources.

Computer theft:
- Theft of computer itself: the software & info on the computerare more valuable than
the hardware.
Social engineering:
- Spoofing: trick the target to extract secret info " internet technician → passwords".
- Shoulder surfing: used to obtain info by looking over the victim's shoulder.
- Phishing (fishing for sensetive info): is the act of attempting to acquire sensitive info
By: Masquerading as a trustworthy entity in an electronic communication
- Sending an email posing as a bank → fill a fake bank web form.
-As the users to reveal credit card numbersto prove age → makes no sense.

Identity theft:
Extract personal info commit a crime in another person identity.
- National ID, driving license, credit card number.

Software Sabotage:
Malicious software: used to disrupt computer operation, gather sensitive info, or gain
access to private computer systems.
I- Viruses: attached to a file/program & spread when files are exchanged via email
attachments or flash drives.
- When the virus program is opened/executed it:
- Damage the operating system.
- Display annoying pop-up messages
- Destroys or steals data.
- Viruses are cross-platform.
- Macro viruses: attach themselves to documents containing macros → set of
commands to automate repetitive tasks.
2- Worms: independed programs, capable of reproducing themselves, memory freezes,
spreads through the internet slowing it down.
- Famous worm: code red (2001)
Didn't attack PCs, it attacked internet servers running
Microsoft servers.

3- Trojan horse: disquise themselves as useful programs or apps, has hidden viruses.
Often posted in shareware, sound like games or utilities, act as a
backdoor → allow the attacher to control Your PC.

4- Spyware: gets installed & collects info without user's knowledge, slows down PC
performance " spybot, tracking software".
-Tracks: keystrokes, websites visited, screen displays.

5- Ransomware: malware that locks your computer & encrypts data in your hard drive,
you pay a ransom to unblock the files (by bitcoin because it is
untraceable).
- You get infected by opening an infected email attachment or
malicious link.

Hacking & Electronic Trespassing:


Hackers: people who break into computer systems or networks unlawfully,they can
control computers or steal Personal info to commit identity theft.
Types:
I- Black-hat hacker:criminals develop new techniques to penetrate systems to gain
illegal access or destroy info.

2- White-hat hacker ( ethical hacker): security experts developing new techniques to


protect us, test the system weaknesses.
Zombie Computers:
Computers that have been hijacked using viruses to preform malicious acts without the
knowledge of the owners.
Botnets: group of software programs called bots, runs automatically on zombie
computers to do the same thing feet zombie computers do.

DDoS (Distributed Denial of Service):


Bombards servers and web sites with traffic that shuts them down → using thousands
of zombie computers (botnets), authorized users cannot use their computer.

Physical Access restriction:

Passwords: used to restrict access to computers, to make it effective → don't use real
words, change it frequently ( have more them 8 characters, don't use your
name or birthday ).

Access privileges:
Use access control software, doesn't need to treat all users identically.

Firewalls:
protect from hackers, it filters info between a private system &the rest of the internet.
Could be:
- Software programs.
- Hardware device.
- Both together.
Encryption:
Scrambling transmitted messages to secure them using a secret code called "key",and the
reverse process called "decryption"
- Left key: replace every letter with 5th letter before it.
- Right key: replace every letter with 5th letter successive letter.

Protection & Prevention:


Use Anti-Virus software → protect computer/files from harm, detect viruses & delete
them, needs to be revised for new viruses.

Audit Control Software:


Monitoring & recording user's computer transactions,tracing & identifying suspicious
computer activity.

Backups & other Precautions:


Backups are used to replace originals,the best is regular backups.
Storage:
- Online in the cloud: remote storage.
- Off-site: hard drives or flash drives that is in a remote location.
- Backup drive: in Laptops, externed hand drives, network storage.
Types:
-Incremental: only new files or modified files.
-Bootable: entire system backup, makes a complete duplicate of a disk in case of a
crash.
Tools:
- Uninterrupted Power Supply ( UPS ): protects data loss due to power failure.
- Surge protector: shields electronic equipment from dangerous power spikes.

Safe Computing:
If it’s important, back it up. If it’s sensitive, lock it up. If you’re sending sensitive
information, consider encryption. Beware of email bearing gifts. Share with care. Handle
shareware and freeware with care. Don’t pirate software. Disinfect regularly. Take your
passwords seriously.
Security vs. Privacy:
Security is to prevent crimes but it can threaten privacy
" smart badges, Smart phone → proximity recognition technology".

UAE cybercrime Law:

Security & reliability:


Software Bugs → cause more damage then viruses.
It is important to eliminate all bugs → the bigger the be system the bigger the problem.
Y2K Bug: using two digits for years, in 2000 it caused calculation errors → changing
many programs.

Computers at war:
- Smart weapons: missiles that use computerized guidance systems to locate their
targets.
- Autonomous system: complex system that can assume responsibility for a task
without human input.
- Cyber warfare: attacking computer networks the enemy can cripple
(telecommunications, power grids, water & gas supplies ).

You might also like