SPP
SPP
Digital Literacy:
o Information Overload: • Digital literacy has become an essential skill
However, this abundance of for navigating the modern world.
information also presents
Entertainment & Leisure than urban areas. Socioeconomic factors also
Digital Entertainment: heavily influence access, as lower-income
• Streaming services, online gaming, and individuals and communities may not be able to
social media provide a wide range of afford technology.
entertainment options.
Changing Leisure Habits: SKILLS
• Technology has significantly altered leisure Even with access, individuals need the skills to
activities, with increased reliance on digital effectively use technology. This includes:
entertainment. • Basic computer literacy, such as navigating
operating systems and using software.
Healthcare • Internet skills, such as searching for information
Medical Advancements: and evaluating online sources.
• Technology has led to significant • Digital literacy, which involves understanding
advancements in medical diagnosis, how to use technology safely and responsibly.
treatment, and patient care. Digital skills are increasingly essential for
• Telemedicine is increasing access to education, employment, and participating in
healthcare, especially in remote areas. modern society. Lack of these skills can further
marginalize individuals and communities.
USAGE
This aspect goes beyond basic access and skills
and focuses on how people use technology. It
includes:
• The types of online activities people engage in.
• The quality and purpose of their internet use.
• Whether they use technology for productive
purposes, such as education or economic
opportunities, or primarily for entertainment.
The Digital Divide and Access to Technology Even when individuals have access and skills,
• The "digital divide" refers to the gap there can be differences in how they use
between individuals and communities that technology. Some may use it for passive
have access to information and consumption, while others may use it for active
communication technologies 1 (ICT) and creation and participation.
those that don't. It's not simply about
having a computer or internet connection; Different Digital Divide
it's a more complex issue with several Urban/Rural Divide:
dimensions:
• In essence, the digital divide is a • This is perhaps the most visible form. Urban
multifaceted issue that encompasses not areas typically have better access to high-
only access to technology but also the skills speed internet, more robust infrastructure,
and ability to use it effectively. and a higher concentration of technology-
related resources.
ACCESS • Rural areas often struggle with limited
This is the most basic level and refers to the broadband availability, slower internet
physical availability of technology. It includes: speeds, and less access to technical support.
• Having access to computers, smartphones, and This can hinder economic development,
other devices. education, and access to essential services.
• Reliable internet connectivity, including
broadband access.
• Affordability of devices and internet services. • Income level is a significant determinant of
Geographical location plays a significant role in access to technology. Lower-income
access, with rural areas often having less access individuals and families may not be able to
afford computers, smartphones, or internet • This can be due to cultural norms, social
subscriptions. barriers, and limited educational
• This divide can perpetuate economic opportunities.
inequality, as those with access to
technology have greater opportunities for
education, employment, and economic Different Digital Divide
advancement. The digital divide's impacts are far-reaching and
deeply affect various aspects of individuals' and
communities' lives.
• Older generations may have less familiarity Here are the key impacts of Digital Divide and Access
and comfort with technology compared to to Technology:
younger generations.
Educational Inequalities
• This can create a gap in digital literacy and
usage, with older adults potentially missing Limited Access to Healthcare and Government Services:
out on the benefits of online services and
information. Economic Disadvantages
Social Exclusion
• Access to technology and digital literacy
skills vary across educational levels and
institutions. Educational Inequalities
• Students in well-funded schools and
universities often have greater access to • Students without reliable internet access or
technology and digital resources, while devices struggle to participate in online
those in underfunded schools may lack learning, complete assignments, and access
these opportunities. educational resources.
• This creates a significant disadvantage,
particularly in an increasingly digital
• This refers to the gap in access to learning environment.
technology between developed and • It limits opportunities for skill development
developing countries. and academic achievement, perpetuating
• Developing countries often face challenges educational disparities.
such as limited infrastructure, high costs, • Those who lack digital literacy are also at a
and low levels of digital literacy. disadvantage when trying to find and use
online educational resources.
• Individuals with disabilities may face unique Limited Access to Healthcare and
barriers to accessing and using technology. Government Services:
• This can include a lack of accessible
hardware and software, as well as limited • Many healthcare services, such as
availability of assistive technologies. telemedicine and online appointment
scheduling, rely on internet access.
Individuals without access may miss out on
• Much of the internet's content is in English, essential medical care.
creating a barrier for those who speak other • Government services, such as online
languages. applications for benefits and access to
• This limits access to information and online public information, are increasingly digital.
services for non-English speakers This can create barriers for individuals who
lack internet access or digital skills.
• This can lead to delays in receiving aid, or
• In some regions of the world, women have total lack of access to critical resources.
less access to and use of technology than
men.
cybercriminals, as Colonial Pipeline paid a multi
million-dollar ransom."
• In today's job market, digital skills are
essential for many occupations. Individuals Small Business Example:
without these skills are at a significant "It's not just big companies. A local dentist office got
disadvantage in finding and securing hit with a ransomware attack. All their patient
employment. records were encrypted. They couldn't access
• The digital divide limits access to online job appointment schedules, or patient medical histories.
boards, remote work opportunities, and They were forced to close for a week, and lost
entrepreneurial resources. revenue. Also, they had to worry about patient
• Businesses in areas with limited internet privacy, and if those records were also stolen. This
access may struggle to compete in the example shows any business is vulnerable."
digital economy.
• E-commerce opportunities are limited for Importance of Ethical Conduct in IT
those without access. • Data Privacy Example:
"Imagine a database administrator who has
access to customer credit card information.
They could easily copy and sell this data for
• The internet and social media have become personal gain. However, this would be a severe
integral to social interaction and community breach of trust and a violation of privacy laws.
engagement. Individuals without access Ethical IT professionals understand their
may feel isolated and excluded from social responsibility to protect sensitive data and
networks. adhere to strict confidentiality agreements.“
• They may miss out on opportunities to • System Integrity Example:
connect with friends and family, participate "A software developer discovers a security flaw
in online communities, and access social in a critical application. They could exploit this
support. flaw for personal gain or to demonstrate their
• The lack of access to online information can skills. However, an ethical developer would
also limit participation in civic life and report the vulnerability to the company so that
democratic processes. it can be patched. This demonstrates a
• Social isolation can lead to mental health commitment to system integrity and the
issues. protection of users.“
• AI and Bias Example:
Cyberattacks and Their Impact "With the rise of AI, IT professionals are
Data Breach Example: responsible for developing algorithms that are
"Remember the Equifax data breach? In 2017, fair and unbiased. If an algorithm is biased, it
hackers stole the personal information of over 147 could lead to discriminatory outcomes. An
million people. This included social security numbers, ethical IT professional would be aware of these
birth dates, and addresses. Imagine the impact on risks and take steps to mitigate them."
individuals whose identities were compromised. • Whistleblowing Example:
They faced the risk of identity theft, financial fraud, "An employee discovers that their company is
and emotional distress. For Equifax, the breach engaging in unethical or illegal practices related
resulted in massive fines, lawsuits, and a significant to data handling. They face a difficult decision:
loss of public trust." remain silent or report the wrongdoing. Ethical
conduct may require them to blow the whistle,
Ransomware Example: even if it means risking their job."
"Consider the ransomware attack on the Colonial
Pipeline in 2021. Hackers shut down a critical
pipeline that supplied nearly half of the East Coast's
fuel. This caused widespread gas shortages and price
hikes. This example shows how cyberattacks can
disrupt essential services and impact the economy. It
also highlights the financial motivation of many
IT Management as a Framework for Responsible professional codes of conduct, protecting sensitive
Technology Use data, and using technology responsibly.
• IT Management
IT management provides the structure and processes This encompasses the planning, organizing,
necessary to ensure that technology is used directing, and controlling of information
responsibly and ethically. technology resources to achieve organizational
It involves setting policies, implementing controls, goals. It involves managing hardware, software,
and fostering a culture of security and compliance. networks, data, and personnel. Effective IT
management ensures that technology is used
• Access Control Policies:
efficiently, securely, and ethically.
"IT management establishes policies for user access
control, such as requiring strong passwords,
• Cybersecurity
implementing multi-factor authentication, and
This is the practice of protecting computer
granting access based on the principle of least
privilege. This ensures that only authorized systems, networks, and data from unauthorized
individuals can access sensitive systems and data." access, damage, or theft. It involves
• Incident Response Planning: implementing security measures to prevent,
"IT management develops incident response plans detect, and respond to cyberattacks.
that outline the steps to take in the event of a
cyberattack. This includes procedures for containing • Cyberthreats
the attack, recovering data, and notifying affected These are potential dangers or attacks that
parties. This proactive approach minimizes the target computer systems, networks, and data.
impact of security incidents." They can include malware, phishing,
• Employee Training and Awareness: ransomware, denial-of-service attacks, and
"IT management invests in employee training and other malicious activities.
awareness programs to educate users about
cybersecurity best practices. This includes training on • Vulnerabilities
how to recognize phishing emails, how to protect These are weaknesses or flaws in software,
passwords, and how to report security incidents. This hardware, or networks that can be
helps to create a culture of security awareness
exploited by cyberthreats. They can result
throughout the organization."
from coding errors, misconfigurations, or
• Software Patch Management:
"IT management ensures that software is regularly inadequate security measures.
patched and updated to address known
vulnerabilities. This reduces the risk of cyberattacks • Ethical Hacking
that exploit these weaknesses." Also known as penetration testing, this is the
• Data backup and recovery: practice of using hacking techniques to identify
"IT management designs and implements systems vulnerabilities in computer systems and
for regular data backups, and tests recovery networks with the owner's permission. The goal
procedures. is to improve security by finding and fixing
This makes it possible to restore operations after a weaknesses before malicious hackers can exploit
cyber attack, or other disaster." them.
• "Do not use company resources to access or • "Do not post confidential company
distribute copyrighted material without information or disparaging remarks about
permission." the company, its employees, or its
customers."
• "Do not use company resources to engage
in online gambling, or other illegal Personal Social Media:
activities."
• "Avoid excessive personal social media use
• "Do not use company resources to run a during work hours."
personal business."
• "Clearly distinguish between personal
3. Prohibitions Against Unauthorized Software opinions and company views when posting
Installations: on social media."
• "Only authorized IT personnel can install • "All social media posts on behalf of the
software on company devices." company must be approved by designated
personnel."
• "Employees must request permission from
the IT department before installing any Security Concerns:
software."
• "Be cautious about clicking on links or
• "Downloading and installing software from downloading files from social media
untrusted sources is strictly prohibited." platforms. These can contain malware."
Key Policy Areas: Software and Hardware • "Document all patch management
Management procedures, including patch deployment
schedules, testing results, and any
1. Software Update and Patch Management
exceptions."
Procedures:
2. Hardware Inventory and Security Standards:
This involves ensuring that all software is kept up-to-
date with the latest security patches and updates. This involves maintaining an accurate inventory of all
This minimizes vulnerabilities that attackers can hardware assets and implementing security
exploit. standards to protect them.
This involves establishing and enforcing secure • "Use secure data wiping software to
configuration settings for operating systems, overwrite hard drives and other storage
applications, and network devices. devices multiple times. This makes it
impossible to recover data."
Operating System Hardening:
• "Verify that the wiping process was
• "Disable unnecessary services and features
successful."
that can create security vulnerabilities.
Physical Destruction:
• "Implement strong access control settings
and file system permissions." • "Physically destroy hard drives and other
storage devices by shredding, crushing, or
• "Configure firewalls and intrusion detection
drilling them. This ensures that data cannot
systems."
be recovered."
Application Security:
• "Use a certified vendor, that specializes in
• "Disable default accounts and change secure destruction of hard drives."
default passwords."
Secure Disposal of Computers:
• "Implement strong authentication and
• "Remove and securely dispose of hard
authorization controls."
drives before disposing of computers.
• "Regularly scan applications for
• "If the computer is to be reused, ensure
vulnerabilities."
that all data is securely erased."
Network Device Security:
Documentation:
• "Change default passwords on routers,
• "Document all hardware disposal
switches, and firewalls."
procedures, including the methods used
• "Disable unnecessary network services and and the dates of disposal."
protocols."
• "Keep records of the serial numbers of
• "Implement network segmentation to destroyed hard drives."
isolate critical systems."
Regular Audits:
Key Policy Areas: Risk Management
• "Perform regular security audits to ensure 1. Risk Assessment Methodologies:
that systems are configured according to
Risk assessment is the process of identifying,
security guidelines."
analyzing, and evaluating potential risks to an
• "Use automated tools to scan organization's assets. Methodologies provide a
configurations and compare them to known structured approach to this process.
secure configurations."
Qualitative Risk Assessment:
4. Procedures for Disposal of Old Hard Drives and
• "This method uses subjective judgments to
Computers:
assess risks based on their likelihood and
This involves securely disposing of old hardware to impact. For example, assigning risk levels
prevent sensitive data from falling into the wrong like 'high,' 'medium,' or 'low' to different
hands. threats. It uses expert opinion, and past
experience to make these determinations."
Quantitative Risk Assessment: • "Schedule regular vulnerability scans of all
critical systems, such as servers, databases,
• "This method uses numerical values to
and network devices. Frequency should be
assess risks, such as calculating the
based on risk, for example weekly scans of
expected financial loss from a cyberattack.
public facing servers, and monthly scans of
For example, calculating the Annualized
internal servers.
Loss Expectancy (ALE). This is more data
driven, and uses historical data, and • Use automated vulnerability scanning tools
statistical analysis." to identify known vulnerabilities.