Cisco Module 1
Cisco Module 1
ICT: An Introduction
You wake up in the morning and search for your smartphone to read messages and check for
Facebook updates. As you go out of your room, you see your father watching news from your flat-
screen television. You also see your younger sister watching a video she downloaded into her tablet.
Your mother, meanwhile, is preparing a meal using a recipe she just saw in Youtube. When you
arrive in school, you see almost everyone busy with their smartphones, either playing a newly
downloaded online game or updating their blogs. You, along with almost everyone around you, are
drawn towards a thing or two in today's technological trends.
It is important to stay updated with knowledge of the trends we are going along with, especially given
that we are dealing with gadgets and electronic tools throughout our lives. To be able to do that, we
must know which specific tool to use to assist us in gathering this information. These tools may come
as a hardware device or simply an application sitting in your desktop or laptop computers. As for
software, we also need to know how to use some of the advanced applications since we are dealing
with them most of the time either as a student or as a professional. For example, you need to
finish your homework using your spreadsheet (e.g., Microsoft Excel), but you are having a hard time
determining the formula to use to obtain the correct result. One more instance is when you do your
research for your thesis using online resources; however, it is already taking you hours searching for
the the article you need.
ICT is an acronym for Information and Communications Technology. A good way to think about
ICT is to consider the use of technology, which enables individuals, businesses and organizations to
use digital information. ICT covers any product that will store, retrieve, manipulate, transmit or receive
information electronically in a digital form. This covers areas under education, banking, healthcare,
government, business, and so many branches that we can think of. 1
Web 1.0 is considered the foundation of web technology. The objective of Web 1.0 was to provide
access to the Web itself, making the people to view and read the information. The key areas of interest
centered on protocols such as HTTP, open standard markup languages such as HTML and XML, Internet
access through ISPs, the first Web browsers, Web development platforms and tools, Web-centric software
languages such as Java and Javascript, the creation of Web sites, the commercialization of the Web and
Web business models, and the growth of key portals on the Web.
The infancy of Web 1.0 is the purpose of the birth of Web 2.0, known as the second generation of
Internet-based services. Most of the Internet navigators are now able to perform modification of
information, and interact with one another to share ideas and knowledge. This became the advent of social
networking sites, wikis, communication tools, and folksonomies — that emphasize online collaboration and
sharing among users. The purpose of this was to make sure that the site accessed by an Internet user is
interactive. Another trend that has been a major factor in Web 2.0 is the emergence of the mobile Internet
and mobile devices (including camera phones) as a major new platform driving the adoption and growth of
the Web.
Web 3.0, the supposed third generation of Internet-based technological innovations, is referred to
as ‘the intelligent Web’. At this instance, usage of semantic web, microformats, natural language search,
data-mining, machine learning, recommendation agents, and artificial intelligence technologies — which
emphasize machine-facilitated understanding of information in order to provide a more productive and
intuitive user experience, became very common.
Online database with adjustable content: There are websites that allow users to store
information which can be retrieved at a later time. These sites also enable users to contribute,
collaborate and edit site content. A good example of this is a wiki, which allows anyone to view
and even modify information on the site.
The increasing prevalence of Software as a Service (SaaS), web apps and cloud computing
rather than locally-installed programs and services.
Mobile computing, also known as nomadicity, the trend toward users connecting from
wherever they may be. This trend is enabled by the proliferation of smartphones, tablets and other
mobile devices in conjunction with readily accessible Wi-Fi networks.
Mash-ups: Web pages or applications that integrate complementary elements from two or
more sources.
Social networking: The practice of expanding the number of one's business and/or social
contacts by making connections through individuals.
Crowdfunding or Crowdsourcing: Collaborative efforts based on the ability to reach large
numbers of participants and their collective resources
User-generated content (UGC): Writing, images, audio and video content - among other
possibilities - made freely available online by the individuals who create it.
Unified communications (UC): The integration of multiple forms of call and multimedia/cross-
media message-management functions controlled by an individual user for both business and
social purposes.
Social curation: The collaborative sharing of content organized around one or more particular
themes or topics. Social content curation sites include Reddit, Digg, Pinterest and Instagram.
Web 2.0 tools
Social media are Web 2.0 tools allowing people to interact with one another exchange
information, career interests, ideas, and pictures/videos in virtual communities and networks. A
more detailed discussion of this is illustrated on Module 1.1.3.
This technology lets users organize their access to the web sites by storing the preferred sites that
have been recently accessed, and then maybe accessed later on. Web sites dedicated to social
bookmarking, such as Flickr and del.icio.us, provide users with a place to store, categorize, annotate
and share favorite Web pages and files.
Unlike file sharing, social bookmarking does not save the resources themselves, merely bookmarks
that reference them, i.e., a link to the bookmarked page. Descriptions may be added to these
bookmarks in the form of metadata, so users may understand the content of the resource without first
needing to download it for themselves.
Table 1.1.1.1a List of Social bookmarking sites and their Description 1
A Podcast is basically just an audio (or video) file. What distinguishes a podcast from other
types of audio on the Internet is that a “podcaster” can solicit subscriptions from listeners, so that
when new podcasts are released, they are automatically delivered, or fed, to a subscriber's
computer or mobile device. Usually, the podcast features an audio show with new episodes that
are fed to your computer either sporadically or at planned intervals, such as daily or weekly. This
format encourages listeners to “subscribe.” 2 Common podcast applications include iTunes which
can be used only for iOS devices, and Spotify, an application focusing on streaming service
(streaming media is multimedia which allows a media file to be played before the entire file has
been temporarily been transmitted.)
Educational tools. There are two types of educational tools under Web 2.0. Electronic
portfolios (also referred to as ePortfolios or Webfolios) are gaining recognition as a valuable tool
for learners. It is practically a storage medium for individuals who wish to store learned
information. Learning Management Systems (LMS), however, is faculty-centered type of
application that is focused on providing tools for students to learn and be assessed with. LMS is
owned by the institution to where it is currently being implemented while the ePortfolio is owned
by the learner. As it is more popular and common today, LMS will be discussed further and will be
the main topic on Module 1.1.4.1.
Google
https://www.google.com/bookmarks Bookmarking service by Google
Bookmarks
Adobe Flash
This is the plug-in on browsers used for delivering high-impact, rich Web content. Designs, animation,
and application user interfaces are deployed immediately across all browsers and platforms,
attracting and engaging users with a rich Web experience. 1
Microsoft Silverlight
Silverlight is a powerful development tool for engaging on interactive user experiences for Web and
mobile applications similar with Adobe Flash. This tool is a free plug-in that is based under the .NET
framework and compatible with multiple browsers, devices and operating systems. 2 It is different with
Adobe Flash in terms of animation model used, compression formats, file size, platform capability,
and so forth.
JavaScript
JavaScript is the programming language of HTML and the Web used to define the behavior of web
pages.3 An instance of this is a new window being displayed after clicking an image, text shown in
marquee mode (string of text displayed moving from left to right and vice versa), or a control being in
and out of visibility. A more simple library used by programmers, which is jquery, is also used to ease
up the content of code as it is already commercially free and available.
Torrent
Web 2.0 applications are often based on the decentralized download methodology that made torrent
sites successful. A torrent is also a server, sharing the workload and making heavily demanded
content more accessible that it would be in the centralized model where demand can lead to
overwhelmed servers and pages. The media file is being downloaded from a swarm of distributed
servers simultaneously instead of one centralized server, which makes it faster to download.
All peers (downloaders and uploaders) may come and go, allowing the pieces to still be available for
downloading, not like when you are directly downloading the file. Once done, a peer may still continue
to upload, making him a seeder. The higher the number of seeders, the faster it is to download the
file.
Other Technological Innovations of Web 2.0
Manufacturing 2.0
The integration of Web 2.0 communication and collaboration applications into traditional
manufacturing practices and processes has been dubbed Manufacturing 2.0. Manufacturing 2.0 takes
typical Web 2.0 apps and services and incorporates them into every stage of development and
production. The use of these technologies and tools facilitates greater collaboration and sharing and
referencing of information in a business, ideally leading to better thought out design and more
efficient production.4
Figure 1.1.1.3a Graph of the Degree of Contract Manufacturing over the Manufacturing Complexity 5
Enterprise 2.0
Similarly, the inclusion of Web 2.0 technologies into an enterprise’s business processes, intranet and
extranet is sometimes referred to as Enterprise 2.0 (E2.0). Most enterprise 2.0 followers use a
combination of blogs, social networking and social collaborative tools as well as free, paid and
homegrown technologies.
The image below displays the full capability of E2.0. The applications and blogospheres (set of blogs
collectively connected within an online community) are interacting with tehe enterprise unit to provide
better social and financial assistance.
Figure 1.1.1.3b Collaboration of Web 2.0 tools with an enterprise 6
Web 2.0 suicide
So synonymous with Web 2.0 is social networking that the deletion of one’s social networking
presences throughout the Internet is referred to as Web 2.0 suicide. There are web applications
designed to facilitate the process, such as the free service Web 2.0 suicide machine. The application
attempts to purge user info on some of the most common social networking presence points:
Facebook, MySpace, LinkedIn and Twitter before adding the user to the Social Network Suiciders
group on Facebook and signing them out.4
Broadband adoption
Mobile Internet access
Mobile devices
Network Computing
Open Technologies
Open Identity
Semantic Web technologies (RDF, OWL, SWRL, SPARQL, Semantic application platforms, and
statement-based datastores such as triplestores, tuplestores and associative databases)
Distributed databases — or what I call “The World Wide Database” (wide-area distributed database
interoperability enabled by Semantic Web technologies)
Digital convergence refers to the convergence of four industries into one conglomerate, ITTCE
(Information Technologies, Telecommunication, Consumer Electronics, and Entertainment). Previously
separate technologies such as voice (and telephony features), data (and productivity applications), and
video can now share resources and interact with each other synergistically. This is a way where new
technological devices are being produced which are based from previous technologies performing the
same tasks with advanced features.1
Figure 1.1.2.3a Timeline Illustrating the Technological Convergence for Cinema/TV, Telephone,
Interface, computer, and games2
Figure 1.1.2.3b Network Convergence for Voice, Data, and Video to create a new technology 4
Media convergence, in this instance, is defined as the interlinking of computing and other
information technologies, media content, and communication networks that have arisen as the
result of the evolution and popularization of the Internet as well as the activities, products and
services that have emerged in the digital media space. Many experts view this as simply being the
tip of the iceberg, as all facets of institutional activity and social life such as business, government,
art, journalism, health, and education are increasingly being carried out in these digital media
spaces across a growing network of information and communication technology devices. 5
Figure 1.1.2.3c Illustration of Media Convergence Involving Smart phones and Laptop Units to
access media sites6
Convergent services, such as VoIP, IPTV, Smart TV, and others, tend to replace the older
technologies and thus can disrupt markets. IP-based convergence is inevitable and will result
in new service and new demand in the market.
When the old technology converges into the public-owned common, IP based services
become access-independent or less dependent. The old service is access-dependent.
Microblogging is a web service, which allows the subscriber to broadcast short messages to other
subscribers of the service. This is a type of blog that lets users publish short text updates, the posts of
which are termed microposts. Microposts can be made public on a Web site and/or distributed to a private
group of subscribers.
Social networking sites, like Facebook, also use a microblogging feature in profiles. On Facebook,
this is called "Status Updates". Bloggers can usually use a number of service for the updates
including instant messaging, e-mail, or Twitter.
Faceboo
Facebook, Inc. 2004-02 social network proprietary own TOS Yes No
k
Primary Content Ad-
Service Owner Launched Software license Multilingual
service license free
Google+ Google, Inc. 2011-06 social network proprietary own TOS Yes No
Yammer Yammer, Inc. 2008-09 micro-blogging proprietary own TOS Yes Yes
o Wikis are content management systems that provide collaborative modification of its content
and structure directly from the web browser. Coined from a Hawaiian term which means quick, a wiki is
run using wiki software, otherwise known as a wiki engine. In a typical wiki, text is written using a
simplified markup language (known as "wiki markup"), and often edited with the help of a rich-text
editor.
There are at least tens of thousands of other wikis in use, both public and private, including wikis
functioning as knowledge management resources, notetaking tools, community websites and
intranets. Ward Cunningham developed the first wiki software, WikiWikiWeb, originally described it as
"the simplest online database that could possibly work". The encyclopedia project Wikipedia is by far
the most popular wiki-based website as of today, and is in fact one of the most widely viewed sites of
any kind of the world, having been ranked in the top ten since 2007. The table below shows a list of
other wikis and the notes signifying the functions of these sites. 2
Sustainable development,
Appropedi English, French,
including appropriate technology merging CC BY-SA 3.0
a German, Spanish
with several other wikis
Baike se
GNU Free
non-profit
Connectip funded and maintained by Meyer Memorial Documentation License
organizations and f
edia Trust. Runs on Wagn and a Creative
oundations
Commons License
Choral
Public Public Domain, CPDL
A wiki library of free typeset musical
Domain Music Licence, C.C. Licences,
scores
Library (C Copyrighted (free use)
PDL)
Encyclope
dia of
Mathematics CC BY-SA 3.0
Mathemati
cs
Family
History Genealogy Reference information and research
CC BY-SA 3.0 US
Research research guidance. In 11 languages.
Wiki
Familypedi
Genealogy Family trees and history CC BY-SA
a
Internation
al Music
A wiki library of public domain musical
Score Music GFDL
scores
Library
Project
A multi-lingual academic encyclopedia,
JurisPedia Government—Law including Arabic, Chinese, English, French, CC-NC
German and Spanish
Mostly copyrighted. CC
LyricWiki Music—Lyrics A listing of lyrics by album BY-SA for minority of
content.
PlanetMat
Misc—Mathematics Free wiki-style mathematical encyclopedia
h
RationalWi Encyclopedic Information and articles are written from CC-BY-SA 3.0
Name Focus Notes License
a liberal and secular point of view as a
ki
response to Conservapedia
WikiAnswe
General knowledge Compiles answers to questions posed Copyrighted
rs
Multilingual Wikimedia project that
Wikipedia Encyclopedic CC BY-SA
uses MediaWiki
Name Focus Notes License
Reference—
Wikiquote A quote repository; a Wikimedia project CC BY-SA
Quotations
Wikispecie
Science—Biology A directory of species; a Wikimedia project GFDL and CC BY-SA
s
A free global family
WikiTree Genealogy tree using MediaWiki software, but Unknown[51]
unconnected to the Wikimedia Foundation.
Computer
WikiWikiW programming,
World's oldest wiki (began circa 1995) GPL
eb specifically design
patterns
Multilingual
Wiktionary An online dictionary; a Wikimedia project CC BY-SA 3.0
dictionary
Twitter is a free microblogging service that allows registered members to broadcast short posts called
tweets. Twitter members can broadcast tweets and follow other users' tweets by using multiple
platforms and devices.
Google+ (pronounced Google plus) is Google's social networking project, designed to replicate the
way people interact offline more closely than is the case in other social networking services. The
project’s slogan is “Real-life sharing rethought for the web.”
Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a
community of users known as Wikipedians. Anyone registered on the site can create an article for
publication; registration is not required to edit articles. Wikipedia was founded in January of 2001.
LinkedIn is a social networking site designed specifically for the business community. The goal of the
site is to allow registered members to establish and document networks of people they know and trust
professionally.
Pinterest is a social curation website for sharing and categorizing images found online. Pinterest
requires brief descriptions but the main focus of the site is visual. Clicking on an image will take you to
the original source, so, for example, if you click on a picture of a pair of shoes, you might be taken to a
site where you can purchase them. An image of blueberry pancakes might take you to the recipe; a
picture of a whimsical birdhouse might take you to the instructions.
Assistive Media
Assistive media is an Internet-based audio reading service for people with reading impairments. This
opens unique avenue of accessibility for said individuals with visual, cognitive, and communication
disabilities. History dates back 1996 when David Erdody researched the availability of accessible
audio-based reading materials for his father Kenneth Harmon Erdody who is suffering from diabetic
retinopathy. Soon after, he discovered that less than 5% of U.S. publications were provided in an
alternative audio format.
There is an existing site that allows one to access some of the available recordings (Click here (Links
to an external site.)to access the site). The service offered by this site is open and free of charge, and
there is no need for anyone to sign up to download the data. There is also no verification needed if
the user is under reading disability.
1. Through the use of ICT tools, mentors may be able to use images that will allow memory retention and
boost of interest ensuring students' comprehension
2. Through the use of ICT tools, mentors may be able to explain complicated instructions and be able to
easily access resources to knowledge being imparted to the students.
3. Through the use of ICT tools, mentors may be able to create an environment making the modules
enjoyable, which could improve student attendance and concentration.
The succeeding modules describe and discuss ICT tools focusing on education.
Learning Management System functions solely as an online classroom where professors can:
LMSs store and deliver materials developed in a variety of different formats — everything from MS
Office documents to videos and third-party applications. They support synchronous (at the same
time) and asynchronous (not at the same time) interactions between faculty and students and
students and students. Online learning management systems can be hosted locally (i.e., kept on a
server physically located at an educational institution) or remotely, “in the cloud” wherein the LMS
company (Moodle Rooms or a Moodle partner, Desire to Learn, or Blackboard) manages all server-
related issues. Wherever they reside, LMSs demand high-speed connectivity and strong bandwidth. 1
Essentially all LMSs have “standard” or typical and uniform features, including:
Discussion Pages
The discussion pages allow the instructor to confer modules that are related to the topic to be taught
for the specific class hours. They are very useful for answering general questions of the whole class,
allowing students to 'meet,' or having a group dissertation on a topic presented by the
instructor. Some LMS's include an online board that the professor can use to write something about
the topic that the students can view online.
Chat Rooms
Chat rooms are great for office hours. Students know that they can drop in at a certain time and find
their instructor there. Like live office hours, sometimes no one shows, but those who do can get an
immediate answer to a question, and they make another connection to their instructor.
Threaded Discussions
These are discussions that allow a user to follow a thread/theme. This is found to be more useful in
small classes than in large classes. It is useful for those who are unable to join a discussion within the
provided time frame, or for some discussions that are found to be broad and may be discussed in a
very long span of time.
Group Pages
Group pages are areas where students can communicate with a sub-set of classmates, can share
files, and can work collaboratively. Normally the professor has to set the groups up, giving access to
the proper students. They then have a private discussion section, a group e-mail, and a private file-
sharing space. These are very useful for setting up collaborative projects in online classes.
Online Tests
Students may take the exams online with an allotted timeframe to complete it. The teachers may set
when the test can be taken, so they may decide if the exam should be answered either within the
school premise or within their homes. The exam types may be multiple choice, true or false,
identification, or even essay type of exams. Except for those that needs the analysis of the teachers,
most exams can be checked immediately by the system given that the teacher sets the
corresponding answers for each problem. The students may already see their scores and the correct
answers after taking the test.
Grade book
Teachers may get for the students' grade without having to create a spreadsheet file using the LMS
as the computation of the final grade based from the scores of the students' quizzes and
appropriate formula to be used is embedded in the system.
LMSs serve many functions, but it is best to think of them as a repository or vehicle for learning, not
the learning itself. LMSs lack functionality in the most critical areas of teaching—content and
instruction. An LMS does not teach an online course—the instructor does that through the LMS. And
LMSs do not support content creation and their functionality is usually limited. Rather, the professor
with an instructional designer, or an instructional designer, designs content, using separate,
dedicated content authoring software, and places content in the LMS and runs classes, discussions,
quizzes through the LMS.
Each LMS has its strength and weaknesses and there are far too many to discuss here. If cost is an
issue, Moodle and Sakai (especially the latter for universities) are
free. D2L (formerly Desire2Learn, now Brightspace) has great analytics, a nice drag-and-drop
interface and very strong customer service. Acatar has a beautiful interface, is designed for flipped
learning, and is grounded in a strong pedagogical framework. Blackboard has history and
presence. Canvas is quite popular with universities for its look-and-feel, ability to customize and
simple navigation structure.
Since they are so similar, the biggest factors in considering LMS are (not in order):
Cost
Ease of use
The LMSs (and company’s) maturity and presence (a long-established record and a presence
in the region)
Appearance (look and feel)
The ability to integrate with existing Student Information Systems (SIS)/Education Information
Management Systems (EMIS)
Suite of supports (hosting the course, course design, help with upgrades, etc.)
Special features (e.g., Blackboard’s suite of applications; Moodle’s filtering system; D2L’s
portfolio feature)
MOOCs—Massively Open Online Courses—can be considered LMSs, just writ large, for thousands
or hundreds of thousands of learners. One really nice feature of MOOCs that more and more LMS
designers are copying (for example, Acatar) is the really clean user interface and simple navigation
structure of a MOOC.
Cost: It is free and available to everyone as long as one is connected to the Internet.
Educational focus: Educational social networking apps are designed for teachers and students and
online learning. It does not have or promote commercial content.
Less bandwidth intensive: It supports low-bandwidth communications so students and instructors can
carry on synchronous (real-time or live) and asynchronous (delayed) conversations without the need for a
lot of bandwidth. Additionally, students or instructors with smart phones can access the Edmodo app
and/or access the course via their phones, versus a computer.
Serves as an online classroom: Edmodo makes for an excellent course site, allowing for readings to
be housed in a library, the formation of small groups, discussions to be archived, third-party apps, and
posting of photos and videos.
Familiar and easy to use: Edmodo mimics Facebook in use and structure and should thus require
very little training to use. It mimics an application with which, many instructors and students are familiar.
There are other options in this space, everything from VoiceThread to Twitter chats to online learning
communities, like Classroom 2.0 (not technically social media) or Peer2Peer University to blogs (like
this one). If the idea is to have learners teaching each other in an open environment (versus the
traditional instructor in the “walled garden” of an LMS), option 2 may be a good way to go.
To be able to have a glance at what a social networking can be used as an online educational tool,
click the image below to see the features and functionality of Edmodo.
Two-way Audio
A final option is to use two-way video for one-to-one coaching and tutoring (for example, Skype or
Google Hangouts. This is an extraordinarily powerful form of online learning because it can provide
intensive one-to-one (or one-to-many) instruction and support and make e-learning less impersonal
and more “face-based.” And of course, seeing someone and talking with them one-on-one is so
essential to developing rapport—and when online learners develop a rapport with their online
instructor they are more likely to persist in an online course of study.
1
https://elearningindustry.com/choosing-online-learning-platform-makes-sense
Table 1.2a Number of Internet Users over the Total World Population as of July 2016 1
Your Online and Offline Identify
As more time is spent online, your identity, both online and offline, can affect your life. Your offline
identity is the person who your friends and family interact with on a daily basis at home, at school, or
work. They know your personal information, such as your name, age, or where you live. Your online
identity is who you are in cyberspace. Your online identity is how you present yourself to others
online. This online identity should only reveal a limited amount of information about you. However,
due to limited knowledge of what is happening around, most people neglect to consider securing the
information via online.
Your online identity can also be considered as an actively constructed presentation of oneself.
Although some people choose to use their real names online, some Internet users prefer to be
anonymous, identifying themselves by means of pseudonyms, which reveal varying amounts of
personally identifiable information. An online identity may even be determined by a user's relationship
to a certain social group they are a part of online. Some can even be deceptive about their identity.
In some online contexts, including Internet forums, online chats, and massively multiplayer online
role-playing games (MMORPGs), users can represent themselves visually by choosing an avatar, an
icon-sized graphic image. Avatars are one-way users express their online identity. Through
interaction with other users, an established online identity acquires a reputation, which enables other
users to decide whether the identity is worthy of trust. Online identities are associated with users
through authentication, which typically requires registration and logging in. Some websites also use
the user's IP address or tracking cookies to identify users. 2
A part of ICT learning is to make sure that individuals are aware of the online security threats and all
possible measures to combat and prevent such attacks. The succeeding modules will be able to
assist the students in such learning.
Medical Records - Information provided to you by your doctor, including physical and mental health,
prescription and other personal information that may not be medically related, is considered your electronic
health records (EHRs). Besides your medical history and personal information, the EHR may also include
information about your family. Clinical data like heart rates, blood pressures, and blood sugar levels that
may be stored via under a cloud platform is also considered a part of your medical record
Figure 1.2.1a Sample medical record containing personal information about the patient
Education Records - Your grades and test scores, your attendance, courses taken, awards
and degrees rewarded, and any disciplinary reports may be in your education record. This record
may also include contact information, health and immunization records, and special education
records including individualized education programs (IEPs).
Figure 1.2.1b Sample Educational Record containing the grades of the sample student for the entire
school year
Employment and Financial Records - Your financial record may include information about your
income and expenditures. Tax records could include paycheck stubs, credit card statements, your
credit rating and other banking information. Your employment information can include your past
employment and your performance.
visiting sites that contains drive-by attack codes. A drive-by attack is a way where an exploit is being
made which allows an attacker to gather information from the user or embedding a malware into the
system as he is accessing the site. These sites may be accessed via an advertisement or a link sent to the
via user
downloading malicious software disguised as keygens, cracks, and patches
downloading files via peer-to-peer networks (for example, torrents).
downloading attachments from emails sent especially from unknown sources
replying to emails involving your credentials such as credit card numbers, social security numbers, and
few other things
installing software applications with bugs, glitches and vulnerabilities
plugging in removable media containing malicious programs
Common Effects of Malware
Damage from malware varies from causing minor irritation (such as browser popup ads), to stealing
confidential information or money, destroying data, and compromising and/or entirely disabling
systems and networks. The following specifically enumerates the list of possible effects of malware
attacks1:
slowing down your operating system, your Internet speed or the speed of your applications.
unexpected pop-ups appearing on the system; sometimes, they come bundled with other
concealed malware threats, and which could be more destructive for our systems.
system crashes frequently or BSOD (Blue Screen of Death) is experienced regularly.
physical disk continues to exhibit excessive activity even when you don’t use it and there is no
program or download running at that moment, this could be the right time to check your system for
malware.
running out of hard disk space; there are a number of malicious software which use various
methods to fill up all the available space in the hard drive and cause it to crash.
high network activity is being observed even there is no current connection in the Internet.
new homepage, new toolbars or unwanted websites being accessed without going there
manually using your browsers.
programs automatically open and close without user intervention and unusual messages seen
in the during or after the booting process
system suddenly shuts down for no reason
security solution is disabled - your antivirus update is disabled or the antivirus software itself
does not work
strange messages sent from your blogs or emails to your peers via applications in your system that you
do not have any control of.
"Bot" is derived from the word "robot" and is an automated process that interacts with other network
services. Bots often automate tasks and provide information or services that would otherwise be
conducted by a human being. A typical use of bots is to gather information (such as web crawlers), or
interact automatically with instant messaging (IM), Internet Relay Chat (IRC), or other web interfaces.
They may also be used to interact dynamically with websites.
Bots can be used for either good or malicious intent. A malicious bot is self-propagating malware
designed to infect a host and connect back to a central server or servers that act as a command and
control (C&C) center for an entire network of compromised devices, or "botnet." With a botnet,
attackers can launch broad-based, "remote-control," flood-type attacks against their target(s). In
addition to the worm-like ability to self-propagate, bots can include the ability to log keystrokes, gather
passwords, capture and analyze packets, gather financial information, launch DoS attacks, relay
spam, and open back doors on the infected host.
Phishing
Phishing is the act of sending an email to a user falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into surrendering private information that will be used for
identity theft.
Phishing email will typically direct the user to visit a website where they are asked to update personal
information, such as a password, credit card, social security, or bank account numbers, that the
legitimate organization already has. The website, however, is bogus and will capture and steal any
information the user enters on the page.
The word is a used as a homophone to fishing due to the similarity of using a bait in an attempt to
catch a victim. Communications purporting to be from popular social web sites, auction sites, banks,
online payment processors or IT administrators are commonly used to lure unsuspecting victims.
Phishing emails may contain links to websites that are infected with malware. Phishing is typically
carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake
website whose look and feel are almost identical to the legitimate one. Phishing is an example of
social engineering techniques used to deceive users, and exploits the poor usability of current web
security technologies.3
Examples of Phishing Scams
2003 saw the proliferation of a phishing scam in which users received emails supposedly from eBay
claiming that the user's account was about to be suspended unless he clicked on the provided email
link and updated the credit card information that the genuine eBay already had. Because it is
relatively simple to make a website look like a legitimate organization's site by mimicking the HTML
code, the scam counted on people being tricked into thinking they were actually being contacted by
eBay and were subsequently going to eBay's site to update their account information. 3
1.2.3 Cybersecurity
What is Cybersecurity?
The connected electronic information network has become an integral part of our daily lives. All types
of organizations, such as medical, financial, and education institutions, use this network to operate
effectively. They utilize the network by collecting, processing, storing, and sharing vast amounts of
digital information. As more digital information is gathered and shared, the protection of this
information is becoming even more vital to our national security and economic stability.
Cybersecurity is the ongoing effort to protect these networked systems and all of the data from
unauthorized use or harm. On a personal level, you need to safeguard your identity, your data, and
your computing devices. At the corporate level, it is everyone’s responsibility to protect the
organization’s reputation, data, and customers. At the state level, national security, and the safety
and well-being of the citizens are at stake.
Cyber threats
Your online credentials are valuable. These credentials give the thieves access to your accounts,
which in turn will give them access to the money you store in your accounts. A criminal could also
take advantage of your relationships. They could access your online accounts and your reputation to
trick you into wiring money to your friends or family. This trick which is coined as social
engineering allows criminal to send messages stating that your family or friends need you to wire
them money so they can get home from abroad after losing their wallets. This technique is also used
by these criminals to manipulate people into making them think they are closed friends, but they
actually have hidden intentions behind this.
The criminals are very imaginative when they are trying to trick you into giving them money. They do
not just steal your money; they could also steal your identity and ruin your life.
There are two types of security threats. Attacks originating from within an organization or from outside
of the organization is known as an internal threat. An internal user, such as an employee or contract
partner, can accidentally or intentionally mishandle confidential data, threaten the operations of
internal servers or network infrastructure devices, facilitate outside attacks by connecting infected
USB media into the corporate computer system, accidentally invite malware onto the network through
malicious email or websites. When the mentioned attacks is done from the outside the facility, this is
considered to be an external threats. Internal threats also have the potential to cause greater damage
than external threats, because internal users have direct access to the building and its infrastructure
devices. Employees also have knowledge of the corporate network, its resources, and its confidential
data, as well as different levels of user or administrative privileges.
Types of Attackers
Attackers are individuals or groups who attempt to exploit vulnerability for personal or financial gain.
Attackers are interested in everything, from credit cards to product designs and anything with value.
Amateurs – These people are sometimes called Script Kiddies. They are usually attackers with little
or no skill, often using existing tools or instructions found on the Internet to launch attacks. Some of
them are just curious, while others are trying to demonstrate their skills and cause harm. They may
be using basic tools, but the results can still be devastating.
Hackers – This group of attackers break into computers or networks to gain access. Depending on
the intent of the break-in, these attackers are classified as white, gray, or black hats. The white hat
attackers break into networks or computer systems to discover weaknesses so that the security of
these systems can be improved. These break-ins are done with prior permission and any results are
reported back to the owner. On the other hand, black hat attackers take advantage of any
vulnerability for illegal personal, financial or political gain. Gray hat attackers are somewhere between
white and black hat attackers. The gray hat attackers may find a vulnerability in a system. Gray hat
hackers may report the vulnerability to the owners of the system if that action coincides with their
agenda. Some gray hat hackers publish the facts about the vulnerability on the Internet so that other
attackers can exploit it.
Organized Hackers – These hackers include organizations of cyber criminals, hacktivists, terrorists,
and state-sponsored hackers. Cyber criminals are usually groups of professional criminals focused on
control, power, and wealth. The criminals are highly sophisticated and organized, and they may even
provide cybercrime as a service to other criminals. Hacktivists make political statements to create
awareness to issues that are important to them. State-sponsored attackers gather intelligence or
commit sabotage on behalf of their government. These attackers are usually highly trained and well-
funded, and their attacks are focused on specific goals that are beneficial to their government.
The Consequences of a Security Breach
To protect an organization from every possible cyberattack is not feasible, for a few reasons. The
expertise necessary to set up and maintain the secure network can be expensive. Attackers will
always continue to find new ways to target networks. Eventually, an advanced and targeted
cyberattack will succeed. The priority will then be how quickly your security team can respond to the
attack to minimize the loss of data, downtime, and revenue.
By now you know that anything posted online can live online forever, even if you were able to erase
all the copies in your possession. If your servers were hacked, the confidential personnel information
could be made public. A hacker (or hacking group) may vandalize the company website by posting
untrue information and ruin the company’s reputation that took years to build. The hackers can also
take down the company website causing the company to lose revenue. If the website is down for
longer periods of time, the company may appear unreliable and possibly lose credibility. If the
company website or network has been breached, this could lead to leaked confidential documents,
revealed trade secrets, and stolen intellectual property. The loss of all this information may impede
company growth and expansion.
The monetary cost of a breach is much higher than just replacing any lost or stolen devices, investing
in existing security and strengthening the building’s physical security. The company may be
responsible for contacting all the affected customers about the breach and may have to be prepared
for litigation. With all this turmoil, employees may choose to leave the company. The company may
need to focus less on growing and more on repairing its reputation.
Legal Issues in Cybersecurity
Cybersecurity professionals must have the same skills as hackers, especially black hat hackers, in
order to protect against attacks. One difference between a hacker and a cybersecurity professional is
that the cybersecurity professional must work within legal boundaries.
Personal Legal Issues
You do not even have to be an employee to be subject to cybersecurity laws. In your private life, you
may have the opportunity and skills to hack another person’s computer or network. There is an old
saying, “Just because you can does not mean you should.” Keep this in mind. Most hackers leave
tracks, whether they know it or not, and these tracks can be followed back to the hacker.
Cybersecurity professionals develop many skills which can be used for good or evil. Those who use
their skills within the legal system, to protect infrastructure, networks, and privacy are always in high
demand.
Corporate Legal Issues
Most countries have some cybersecurity laws in place. They may have to do with critical
infrastructure, networks, and corporate and individual privacy. Businesses are required to abide by
these laws.
In some cases, if you break cybersecurity laws while doing your job, it is the company that may be
punished and you could lose your job. In other cases, you could be prosecuted, fined, and possibly
sentenced.
In general, if you are confused about whether an action or behavior might be illegal, assume that it is
illegal and do not do it. Your company may have a legal department or someone in the human
resources department who can answer your questions before you do something illegal.
International Law and Cybersecurity
The area of cybersecurity law is much newer than cybersecurity itself. As mentioned before, most
countries have some laws in place, and there will be more laws to come.
International cybersecurity law is still quite new. The International Multilateral Partnership Against
Cyber Threats (IMPACT) is the first, international public-private partnership that is focused on cyber
threats. IMPACT is a global partnership of world governments, industries, and academia dedicated to
improving global capabilities when dealing with cyber threats.
What is Cyberwarfare?
Cyberspace has become another important dimension of warfare, where nations can carry out
conflicts without the clashes of traditional troops and machines. This allows countries with minimal
military presence to be as strong as other nations in cyberspace. Cyberwarfare is an Internet-based
conflict that involves the penetration of computer systems and networks of other nations. These
attackers have the resources and expertise to launch massive Internet-based attacks against other
nations to cause damage or disrupt services, such as shutting down a power grid.
An example of a state-sponsored attack involved the Stuxnet malware that was designed to damage
Iran’s nuclear enrichment plant. Stuxnet malware did not hijack targeted computers to steal
information. It was designed to damage physical equipment that was controlled by computers, and
used modular coding that was programmed to perform a specific task within the malware. It used
stolen digital certificates so the attack appeared legitimate to the system.
Figure 1.2.2.b Stuxnet attack which disrupted Iran's centrifuge for uranium enrichment
Click the following link (Links to an external site.)to lead you to a video about Stuxnet attack.
The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or
competitors.
A nation can continuously invade other nation’s infrastructure, steal defense secrets, and gather
information about technology to narrow the gaps in its industries and military. Besides industrial and
militaristic espionage, cyberwar can sabotage the infrastructure of other nations and cost lives in the
targeted nations. For example, an attack can cause the following:
Ensure that your operating system is up to date. This means that you must regularly apply the most
recent patches and fixes that is recommended by the OS vendor.
Install an anti-virus software in your PC's. Also, assure that they are always updated. This can
prevent threats like viruses, Trojan horses and malwares from causing damage into your system. The
installed software should be email to scan e-mail and files as they are downloaded from the Internet or
transferred from external media.
Firewall should always be enabled. A firewall is a set of related programs, located at a network
gateway server, that protects the resources of a private network from users from other networks.1
Assure that the file to be downloaded is safe. Emails usually have attached files which may tend to
be unsafe as it may contain viruses and Trojan horses. Assure that your mailing site has anti-virus
extensions enabled. In addition, download attachments only from known trusted senders (and at least
verify from the sender if he has really sent an email or not).
Be cautious accepting or agreeing to prompts. When prompted to install any program or add-on,
make sure to read and understand the agreement before clicking on the Ok button. If you do not
understand the agreement or feel it is not necessary to install the program, cancel or close the
window. Additionally, when installing any program, watch for any check box that asks if it's ok to install a
third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave
these boxes unchecked.
Points to Ponder to Secure your Own Data
Your personal data can be accessed anywhere. It is up to you how you secure this information from
the cyber attackers. No one is safe from these threats, so it is up to you to secure your data and
perform appropriate measures to assure safety and security. Remember that the information may be
used against you in any way an attacker can, so precautions must be put into consideration.
Use browsers in a private manner, especially when surfing in an internet cafe or using others
laptops/desktops. Other browsers term this as InPrivate browsing or incognito mode. This mode allows the
system not to store any information entered by the user while using the browser. All of the input values will
totally be erased once the user closes the browser. However, keep in mind that browser needs to be
closed after using it; its feature will be meaningless if the device is left opened while you are still logged in.
You should take care when choosing a username or alias for your online identity. The username
should not include any personal information. It should be something appropriate and respectful. This
username should not lead strangers to think you are an easy target for cybercrimes or unwanted attention.
Choose your passwords wisely. As much as possible, choose a password with a combination of
uppercase, lowercase, numeric, and special characters. Never use passwords that will include any
personal information like your birthday or full name. In addition, never store them in a way that is
accessible by anyone.
Be careful when sharing documents, pictures, and other online resources via blogs or
emails.Once files are downloaded from a public computer shop, make sure that the files are removed from
the system before leaving your terminal.
Be aware of shoulder surfing. This is an act of looking "past your shoulder" anything that you are
typing from the keyboard or on your cellular phones and tablets without you noticing.
Verify data is encrypted. When sending confidential information over the Internet, such as
usernames, passwords, or credit card numbers, only send it securely. To verify this, look for a small lock in
the bottom right corner of your browser window or next to the address bar. If visible, this lock should also
be in the locked position and not unlocked. We also suggest making sure the URL begins with https. While
the lock is in the locked position, data is encrypted, which helps anyone from understanding the data if it's
intercepted. When no lock is visible or in the unlocked position, all information is plaintext and could be
read if intercepted. If a web page is not secure, such as an online forum, use a password you wouldn't use
with protected sites, such as your online banking website.
Be aware of social engineering. This is a psychological manipulation of people into tricking other
people until the victim divulge into sharing confidential information.
Use two-factor authentication if it is available. Two-factor authentication adds additional protection
by requiring an additional step in verifying a login. Typically with two-factor authentication, after verifying
your password, if the service does not recognize your computer, it sends your phone a text message with a
verification code. If someone had your password but did not have your phone, even with a valid password,
they cannot access your account.
When connecting via Wi-Fi, log on to a secure network using WEP or WPA; this may prevent
nearby users from intercepting and reading information that has been sent to and from your PC.
1. Email
Electronic mail (e-mail) is a common way of communicating formally with people as you are able to
put in your message to whom the message is for (it may be an individual or a group of people), a
summary of the message in the Subject field, and some critical information of the sender. When
composing an email, you usually fill up the following components:
* To: field: the main recipient of the message; it may contain more than one email addresses
* CC: field: this means carbon copy. This may include email addresses that you wish to have the
copy of the mail that you are going to send but are not your direct recipients.
* BCC: field: this means blind carbon copy. This is the same with CC field except that this hides the
details of this recipient from the others who will receive this email. This means that the recipients from
the To: and CC: fields will not know that the recipient from the BCC: has received the same email.
* Subject: This portion should contain a brief detail of what the message is all about and is
considered the title of the email.
* Body: This contains the message of the sender.
* Signature: This is seen at the bottom portion of the email and contains information about the
sender - Job Title, Work Address, Contact Number, and many others, to name a few.
2. Chat rooms
This is the quickest way of sending a message to the recipient and are usually embedded in most
blog sites. It also shows the status of the receiver which will give you a hint if he is available to read
the message or not. The receiver may reply immediately to the message as though he/she is
conversing with the other in a telephone.
3. Usenet
Usenet is a bulletin-type of service containing newsgroups where the users can post messages and
these posted messages are distributed via Usenet servers. The messages posted will last only for a
limited amount of time known as retention time. Usenet users currently logged in may be able to see
and reply to any of the posts given the same channel. Some Usenet providers also allow users to
upload/download files from the site.
Like the network itself, these developing norms remain in a state of flux and vary from community to
community.The points most strongly emphasized about netiquette often include:
using simple electronic signatures; this can be done in the settings of the mailing site.
avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other
techniques used to minimize the effort required to read a post or a thread.
use of unabbreviated English while users of instant messaging protocols like SMS occasionally
encourage just the opposite, bolstering use of SMS language. However, many online communities frown
upon this practice.
avoid flamewars and spam
avoid typing in all caps or grossly enlarging script for emphasis, which is considered to be the
equivalent of shouting or yelling.
Other commonly shared points, such as remembering that one's posts are (or can easily be made)
public, are generally intuitively understood by publishers of Web pages and posters to Usenet, although
this rule is somewhat flexible depending on the environment. On more private protocols, however, such as
e-mail and SMS, some users take the privacy of their posts for granted. One-on-one communications, such
as private messages on chat forums and direct SMSs, may be considered more private than other such
protocols, but infamous breaches surround even these relatively private media.
Beyond matters of basic courtesy and privacy, e-mail syntax (defined by RFC 2822) allows for different
types of recipients. The primary recipient, defined by the To: line, can reasonably be expected to respond,
but recipients of carbon copies cannot be, although they still might. Likewise, misuse of the CC: functions
in lieu of traditional mailing lists can result in serious technical issues.
Core Rules of Etiquette
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's mistakes
1. Contact a librarian before getting stuck sifting through piles of online information: A 2016 Project
Information Literacy found that only 9 percent of respondents cited librarians as a go-to learning source,
while 88 percent said they relied mainly on search engines. Many university library websites have a
librarian chat feature and other ways to remotely contact a librarian. Reaching out at the beginning of a
project to clarify the topic, research questions, methodologies and best potential sources will make the
research process and project better.
2. Consider that when in doubt, it's wiser to over-cite sources than risk plagiarism: Many learning
management systems employ plagiarism detection features that flag suspicious language for the instructor
to further investigate. It’s best to provide citations or quote phrases taken from Internet sources; online
students can use free plagiarism checkers such as PlagScan or Turnitin to ensure an assignment
complies.
3. Use Google and Wikipedia at the beginning of a research process, not the end: The first few
pages of search engine results are generally the most popular and commercial information sources, which
aren't necessarily the most scholarly or authoritative. It's best to think of Wikipedia as a table of contents of
popular sources about an idea rather than the single most definitive source. The links at the bottom of a
Wikipedia entry are useful jumping-off points.
4. Don't think that the Web is your only source of information: Online students can access premium
databases that are not available to the public such as ProQuest, EBSCO, JSTOR, Naxos and Elsevier.
These databases contain electronic access to published journals, magazines, newspapers, books, reports,
documents, dissertations, image collections, films, videos, curated archives and audio recordings. The
difference between searching these collections and the entire web is that these sources are peer-reviewed
and under copyright, and do not contain commercial results.
5. Understand the professor's expectations for citation format: Before using a scholarly reference
citation tool such as CiteULike, Zotero, or BibDesk, understand that a professor's requirements may differ
from the default settings in these tools.
6. Understand why professors still assign research projects: Research isn't busy work or an outdated
vestige of higher education. Research and the information literacy needed to produce it remain sought-
after job skills. Online students must be able to accurately search and source scholarly information,
evaluate it, contextualize it; think, speak, and write critically about it; and synthesize it to inform opinions
and drive good decisions. Graduates who have honed these abilities will quickly rise as the most valued in
the workplace. If these skills aren't being developed, then the online student is missing something.
As online students absorb new knowledge, competencies and skills in pursuit of a degree or
certificate, sifting through the copious amounts of useful and useless information should be viewed as
a special skill in need of development. Seeking the online assistance of research and reference
librarians is an essential practice, and online students must work to develop healthy information-
seeking and scholarly citation habits.
In addition to Web search engines other common types of search engines include the following:
Local (or offline) Search Engine: Designed to be used for offline PC, CDROM or LAN searching
usage.
Metasearch Engine: A search engine that queries other search engines and then combines the results
that are received from all.
Blog Search Engine: A search engine for the blogosphere. Blog search engines only index and
provide search results from blogs (Web logs).
Google is the world's most popular search engine, with a market share of 67.49 percent as of
September, 2015. Bing comes in at second place.
The world's most popular search engines are:
Search
Market share in September 2015
engine
Google 69.24%
Bing 12.26%
Yahoo! 9.19%
Baidu 6.48%
AOL 1.11%
Ask 0.24%
Lycos 0.00%
1. Select a search engine. At the top of any page on your computer, type the phrase “search engines”
into the Search Bar to attain access to several different internet sites that specifically aid in searching.
2. Type in whatever you want to search on the allotted text box.
3. Choose a few of the most specific or relevant keywords or phrases to describe your topic. Utilize
synonyms. Generally, capitalization and punctuation are not needed. Search engines usually disregard
minor words such as "the, and, to, etc.
1. If you are to search for a series of words, the results given to you include web pages where
these words are present. If you wish to be specific with the sequence of the words as you type them,
enclose the words inside double quotes.
2. Look for the advanced options of the site you are using if you wish to have a Verbatim search or
if you wish to restrict your search according to some points like dates and mostly viewed links.
4. Click Search or press the Enter key on your keyboard.
5. Assess your results. Search through your list of web pages to pinpoint information. Click the links of
the sites shown to you. Of course, you must be careful in choosing as some may lead you to cyber threats
mentioned before.