Socio Cyberinformatics
Socio Cyberinformatics
DIGITAL NATIVES
A digital native is a person who grew up with the presence of digital
technology or in the information age. Having grown up in IT's
presence, digital natives are comfortable with and fluent in
technology.
Cyberspace
Cyberspace is an interconnected digital environment. It is a type of
virtual world popularized with the rise of the Internet.
IT INDUSTRY OPPORTUNITIES.
1.Infrastructure Outsourcing.
2.Hardwarev support.
3.IT consulting.
4.Business Process outsourcing.
5.Infrastructure and Network integration service.
6.Application and software related services.
7.Hardware.
COOKIES
A cookie is a piece of data from a website that is stored within a
web browser that the website can retrieve at a later time. Cookies
are used to tell the server that users have returned to a particular
website.
ADWARE
Adware in cyber security refers to a type of malware that displays
unwanted advertisements on your computer or device. Adware is
commonly activated unknowingly when users are trying to install
legitimate applications that adware is bundled with.
SPYWARE
Spyware is malicious software that enters a user's computer,
gathers data from the device and user, and sends it to third parties
without their consent. A commonly accepted spyware definition is a
strand of malware designed to access and damage a device without
the user's consent.
WHO IS SPYING?
1.Online Attackers
2.Marketing Organizations.
3.Spying by a trusted insider.
MALEWARE
Malware, short for malicious software, refers to any intrusive
software developed by cybercriminals (often called hackers) to steal
data and damage or destroy computers and computer systems.
Examples of common malware include viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
PHISHING.
A technique for attempting to acquire sensitive data, such as bank
account numbers, through a fraudulent solicitation in email or on a
web site, in which the perpetrator masquerades as a legitimate
business or reputable person.
INTERNET HOAX.
A hoax news report conveys a half-truth used deliberately to
mislead the public. Hoax may serve the goal of propaganda or
disinformation – using social media to drive web traffic and amplify
their effect.
HACKING.
A commonly used hacking definition is the act of compromising digital
devices and networks through unauthorized access to an account or
computer system. Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by cyber
criminals.
TYPES OF HACKING.
1.Website hacking.
2.Network hacking.
3.Email hacking.
4.Ethical hacking.
5.Password hacking.
REMEDIES OF HACKING.
1.Checking system securities.
2.Use of firewalls
3.Data encryption.
TROJAN HORSES
A Trojan Horse Virus is a type of malware that downloads onto a computer
disguised as a legitimate program.
* Deleting data
* Blocking data
* Modifying data
* Copying data
COMPUTER THREATS
1. Computer Virus
A computer virus is a type of malicious software, or malware, that
spreads between computers and causes damage to data and
software. Computer viruses aim to disrupt systems, cause major
operational issues, and result in data loss and leakage.
Protection from virus
+ Antivirus programs
+ Acquisition of software from reliable sources
+ Testing new applications in single computer
2. WORMS
A computer worm is a type of malware whose primary function is to
self-replicate and infect other computers while remaining active on
infected systems. A computer worm duplicates itself to spread to
uninfected computers.
3. LOGIC BOMBS AND TIME BOMBS
A logic bomb is a set of instructions in a program carrying a
malicious payload that can attack an operating system,
program, or network.
A time bomb is a malicious piece of code that activates at a
specific date and time or after a certain amount of time has
elapsed.
4. WEB JACKING.
The hackers implant a fake website, which, when you open it,
takes you to another fraudulent website, where the attackers
try to extract sensitive information.
5. Email bombing
An e-mail bomb is the sending of a huge number of e-mails to one system or
person. We also call it a ‘mail bomb.’ It is a kind of technological attack
or cyber attack.
6. Salami attacks.
A salami attack is a type of cybercrime that attackers typically use to commit financial
crimes. Criminals steal money or resources from financial accounts on a system one
at a time. This attack occurs when several minor attacks combine to form a powerful
attack.
CYBER ETHICS
Cyber ethics is a branch of applied ethics that examines
moral, legal, and social issues at the intersection of
computer/information and communication technologies.
Cybercrime is a type of crime involving a computer or a computer
network. The computer may have been used in committing the
crime, or it may be the target.
CYBER ADDICTIONS
Relationship
Money
Information searching.
Gaming.
Sex.
INFORMATION OVERLOAD.
Information overload is a state of being overwhelmed by the
amount of data presented for one's attention or processing.
HEALTH ISSUES.
Increased blood pressure
Low mood
Low energy
A decreased brain performance
Difficult to concentrate
Impaired vision
Diminished productivity
Insomnia
Vivid dreams
Tiredness.
E-WASTE
E-waste or electronic waste is created when an electronic
product is discarded after the end of its useful life. The rapid
expansion of technology and the consumption driven society
results in the creation of a very large amount of e-waste.
IMPACT OF E WASTE
1. Environmental impact
2. Economic impact
MANAGEMENT OF E WASTE
1. Inventory management
2. Production process modification
3. Volume reduction
4. Recovery and reuse
5. Sustainable product design
MANAGEMENT OF E WASTE IN INDIA.
E-waste management refers to properly disposing and managing
electronic waste, including old or discarded electronic gadgets such
as phones, computers, and televisions. The following are the some
of the management options suggested for the government,
industries and the public.
1. Responsibilities of the government
Proper disposal of hazardous waste is required
Government should setup regulatory agencies in
each district
Government must encourage research in to the
development and standard hazardous waste
disposal
Government should enforce strict regulation
Heavy fine levied on industries
Government should encourage and support NGOs
2. Responsibility of industries
Generators of waste should take responsibility to
determine the output
All personnel involved in handling e-waste
Companies should adopt waste minimisation
techniques
Manufacturers, distributors and retailers should
undertake the responsibility of recycling/disposal of
their own products.
3. Responsibilities of citizen
Recycling
Donating electronics
Green computing
Green computing, or sustainable computing, is the practice of
maximizing energy efficiency and minimizing environmental impact
in the ways computer chips, systems and software are designed
and used.
Why green computing
This is the exact mission of green computing: to reduce the
environmental impact that computing systems have on our planet
and ultimately encourage the use of more sustainable technologies.
Green computing, when executed well, can be extremely beneficial
for the environment.
1. Green use
2. Green disposal
3. Green design
4. Green manufacturing
E-governance
E-governance, meaning 'electronic governance' is using information
and communication technologies (ICTs) (such as Wide Area
Networks, the Internet, and mobile computing) at various levels of
the government
Stages of E-governance
1. Computerisation
2. Networking
3. Websites
4. Online interactivity
Types of E-governance
1. G2G
2. G2C
3. G2B
4. G2E
Advantages of E-governance
1. Quality services for citizen
2. Access to information
3. Time saving
4. Reduce cost
5. Transparency
6. Accountability
7. Improved efficiency
Disadvantages of E-governance
1. Lack of equality in access to the internet
2. Cyber crime
3. Lack of trust
4. False sense
5. Costly infrastructure
E-governance initiatives in INDIA
1. Friends
Fast reliable efficient network for disbursement of
services is a part of the Kerala state IT mission
2. Bhoomi
The department of in Karnataka state as computerized
20 million records of land ownership.
3. E-seva
Its is improved version of the twins project, cities of
Hyderabad and Secunderabad in Andrapradesh
4. CARD
The computer aided administration of registration
department in Andrapradesh
5. Gyandoot
Gyandoot, which means 'purveyor of knowledge' in Hindi, is a
government-to-citizen, intranet-based service portal, implemented in the
Dhar district of the state of Madhya Pradesh, India, in January 2000.
6.Vidya Vahini
The Vidya Vahini project was launched in 2003 to offer IT
education in schools. Under this project, the schools are provided
computer labs to facilitate IT education, access to the Internet, online
library, academic services, web broadcast and E-learning.
7.Akshaya.
Akshaya has to surpass many challenges, everyone who respect its
potential is keen to seek something innovative. Akshaya, an ambitious endeavor of
the State of Kerala was inaugurated by Dr. APJ Abdul Kalam, on November 18,
2002.
The end