Thursday, 26 May 2016

Last Class Telecommunication & Networking

This class more about tips for final exam and the type and advantages/disadvantages topology network. Dr Dayana ask the students to watch the video about topology ( MIT Blossoms) which is the wedding table relate computer network. After that, the students have to acting to become topology. This can make student more understand and remember the long time about the type of topology.




What do I want from this class?
Improve my knowledge about the types and different of network topology. For example, the advantages of star topology and the disadvantages of linear bus topology.

What might I expected from this class?
Dr Dayana ask the student to watch the video blossoms about topology and then the student had to acting in the type of topology.

Why this class is relevant to my study?
This class is relevant to my study because it is easy when become the teachers then have to making decisions about the type of topology.

What new thoughts have come into my head so far in this class?
  • The star topology has to go hub then go another workstations.
  • The linear bus topology has terminator in the end also has backbones.
Lastly, I would enjoy learning this subject. I would like to say a big word of thank you to Dr Dayana & Dr Affandy and all the fellow classmates 1SPPS.
Thank you for this enjoyable 15 weeks of fun! This subject would be my most unforgettable moment.

Monday, 23 May 2016

Network & Computer Security

Introduction to Network
Consists of the provisions & policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.

Unauthorized Access/Used

Unauthorized access : When an individual gain access to a computer, network or file without permission.
Unauthorized used : Using a computer resource for unauthorized activity.

Types of unauthorized access/used.
1. Hacking - act of breaking into a computer or network. Using a computer to hack another computer system.
2. War Driving & Wi-Fi piggybacking - unauthorized used of a Wi-Fi network.
3. Interception of communication - gaining unauthorized access to the files/data/messages/e-mail.

Computer Sabotage
Acts of malicious destruction to a computer or computer resource.

Forms of computer sabotage :
  • Botnet - computer that is controlled by a hacker.
  • Denial of service - attempt to flood a network with so many requests for action. Leads to shuts down or simply cannot handle legitimate requests anymore.
  • Computer viruses 
Phishing & Web Spoofing

Phishing 
  • attacks are performed with the intention to acquire personal information like credit card numbers, bank account.
  • the recipients are encouraged to enter personal identification data.
Web Spoofing
  • mocking the web presences of trusted corporations with the intention to trick customers.
  • also employed for phishing attacks.
Desktop Security Issues 
End users' security can be endangered through threats like adware, spyware, viruses and worms.
  1. Adware - programs used to deliver advertising content
  2. Spyware - intends to remain unrecognized
  3. Viruses - programs that are attached to executable files or documents. Virus is executed when the host program is executed or documents is loaded.
  4. Worms - programs that can replicate or copy themselves. Example : when it is being distributed as e-mail attachment, a worm might send a copy to all the address listed.
  5. Trojan horses - program do not replicate themselves but typically cause damage or compromise of security of infected computers. Damage caused varies include data theft and destruction or illegitimate access.

Sunday, 22 May 2016

Social & Ethical issues, Intellectual property rights, Ethics.




Intellectual property rights.
Legal rights to which the creator of intellectual property, original creative works, are entitled. 

Types of intellectual property rights. 

1. Copyrights - exclusive right given to the owner of a copyright for a specific period. (Copyright Act 1987) 
                                    

2. Trademarks - sign which distinguishes the goods and services of one trader from those of another. A mark includes words, logos, pictures, names, letters, numbers or a combination of these.  


3. Patents - exclusive right granted for an invention, which is a product or a process that provides a new way of doing something or offers a new technical solution to a problem.
 
Obtain a copyright
  • sufficient effort has been expected to make the work original in character
  • the work has been written down, recorded or reduced to a material form
  • the author is qualified person or the work is made in Malaysia or the work is first published. 
Cyberlaws in Malaysia.

1. Digital Signature Act 1997
The Act mainly provides for the licensing and regulation of Certification Authorities (CA). CA issue Digital Signatures and will certify the identity of a signor by issuing a certificate. The Act also makes a digital signature as legally valid and enforceable as a traditional signature. The Digital Signature Act was brought into force on 1st October 1998.

2. Computer Crime Act 1997 
The Act makes it an offense to
  1. Enter or attempt to enter into computers and computer systems without authorization.
  2. Damage or alter data/information in computers or computer systems by planting viruses or other means.
  3. Aid people in doing items 1 & 2.
  4. Give passwords to people who are not authorized to receive it.
The Computer Crime Act was brought into force on 1st June 2000.

3. The Copyright ( Amendment ) Act 1997
Serves to protect the expression of thoughts and ideas from unauthorized copying and/or alteration.
The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new and converged multimedia environment. The transmission of copyright works over the internet now clearly amounts to infringement. Technological methods of ensuring works and authorship info are not altered or removed is also protected. The Copyright ( Amendment) Act 1997 was brought into force on 1st April 1999.

4. The Communications and Multimedia Act 1998
Convergence of technologies is also resulting in the convergence of the following industries: telecommunications, broadcasting, computing and content.
The CMA provides for a restructuring of the converged ICT industry. It creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services. The Communications and Multimedia Act was brought into force on 1st April 1999.

5.  The Electronic Government Activities Act 2007
To facilitate the electronic delivery of government services to the public.

6.  Software Piracy and Digital Counterfeiting
Creating duplicates of software/digital items and then selling/using them as authentic items.
 

Tuesday, 3 May 2016

Internet Application ( for teaching & learning )

Type of internet application

1.Asynchronous application
2.Synchronous application 

Asynchronous Application 
-communication not occurring at the same time,different time and place
-learners view information & respond at different times& from different place
-for example: news group, online forum

Synchronous Application
-communication is in real time. Same time & different place
-learners view content at the same time. Responses are immediate
-for example: Text chatting( google talk, yahoo messenger, e-learning )
                     Video chatting( skype )


Pros and Cons

Pros
  • plenty of time to formulate thoughts
  • able to respond in detail
  • giving them time to research certain ideas   
Cons
  • time lost waiting for a response 
Before the class dismiss, En Affandy ask to choose internet application for teaching & learning. Doing by microsoft word and must 1 page only. I would like to choose twitter for teaching & learning because twitter is a free, online social media tool, found at Twitter.com. You can also download the app onto your computer, tablet or phone. Once you have your account set up, you can post, or tweet, your thoughts in messages of 140 characters or less. That tweet can include a link to another website, a video, or photo. You can also share something someone else has posted through a re-tweet. After submit at e-learning UTM, En Affandy choose random student to present about why they choose that internet application, explain how to implement application in teaching and advantages and drawbacks in impleting the application.