Digital Society: Digital Society is an interdisciplinary research area and a kind of progressive society that has been formed as a result of adaptation as well as integration of advanced technologies into the society and culture. Digital Society deals with the highly advanced telecommunications and wireless connectivity systems and solutions. The latest Digital Society includes Internet of Things (IoT), 5G, Cloud Computing, Big Data, Human Computer Interaction and so on. Some of the benefits of Digital Society are: a. Social connectivity b. Communication Speed c. versatile working d. Learning Opportunities e. Entertainment. ICT (Information Communication Technology) Information System is, which is used to communicate through any medium or by using technology, is called information communication technology. Information Communication Technology (ICT) literally used to clarify its meaning, which refers to the merging of telephone networks with computer networks. Information Technology (IT) is the study, design, development, implementation, support or management of information systems. Social Impact of the ICT POSITIVE Impact of ICT: Create opportunity for technical employment: E-Commerce Fast and Cheap Communication Education Health Care Multimedia Presentation NEGATIVE Impact of ICT: Number of Employment Opportunity will Reduced Health Problem Money Theft Digital Divide Possibility of Leakage, hacked and Disclosure of Personal Information Pornography Digital Divide: Digital Divide refers to the gap between individuals, households, business and geographic areas at different socio- economic levels with regard with the opportunity to access Information and Communication Technology (ICT) in the Internet using computers and many other mobile computing devices such as tablet PC, PDA, mobile etc.
Computer Ethics: The word 'ethics' means 'moral' beliefs and rules about right and wrong. Thus, computer ethics also refers to the responsible use of computers and computer networks. It is a branch of practical. Ethics deals with placing a value on acts according to whether they are good or bad. Commandments:
Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information is anything that holds value for its receiver. Information Security programs are built around 3 objectives, commonly known as CIA (Confidentiality, Integrity, Availability). Confidentiality: Confidentiality refers to protecting information from disclosure. Information should not be revealed to unauthorized users. Integrity: Integrity refers to ensuring that the data or information is not corrupted or modified by unauthorized users. Availability: Availability of data or information means that the data or information is available for use whenever required. This essentially means placing security system in order to prevent the destruction or theft of information. Network Security: Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure. Security Threat: Security threat is a possible danger that might exploit vulnerabilities in a computer system to breach security and thus cause possible harms. Vulnerability is a weakness of flaw in a computer system that can be exploited by a threat. Types of security threats 1.Interception: It refers to the situation that an unauthorized party has gained access to a service or data. 2.Interruption: It refers to the situation in which services or data become unavailable, unusable, destroyed, and so on. 3.Modification: It involve unauthorized changing of data or tampering with a service so that it no longer adheres to its original specifications.
4.Fabrication: It refers to the situation in which additional data or activities are generated that would normally not exist. Security Threat: An attack is an attempt to destroy, expose, alter, disable, steal, or gain unauthorized access to or make unauthorized use of an asset. i. Passive attack: An attack that attempts to learn or make use of information from the system but does not affect system resources. ii. Active attack: An attack that attempts to alter system resources or affect their operation. Security Services: Security services is a services provided by a layer of communicating open systems, Which ensures adequate security of the systems or of data transfers. Types of Security Services. i. Authentication: ii. Authorization: iii. Data confidentiality: iv. Data integrity: v. Non- repudiation: Cryptography: Cryptography is the science of providing security for information. Cryptography means secret writing and is the art and science of information hiding. Cryptography was mostly referred to as encryption and decryption. Encryption is the mechanism to convert the readable plaintext into unreadable text by using some algorithm and key. Decryption is the opposite or reverse process of encryption. It converts cipher text back to the plaintext by using some algorithm or key. Alternatively the term encode and decode or encipher and decipher are used instead of encrypting and decrypting.
Cyber-crime refers to the use of computer technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. There are many types of cyber-crimes committed. Some of them are discussed below: Types of cyber-crime