ASSALAMUALAIKUM..W.B.T. SELAMAT DATANG KE BLOG SAYA..:)

music

Monday 9 May 2016

MINGGU KESEPULUH - ETHICAL, SOCIAL AND LEGAL ISSUES



Pada minggu ini, pembelajaran mengenai ethical,social and legal issues.. Tajuk yang dipelajari ialah :

1.Intellectual Property Rights
i.Copyrights
ii.Trademarks
iii.Patents

2.Cyberlaws in Malaysia


- Intellectual Property Rights :

Refers to creations of the mind, original creative works from the creator– software, applications, systems, websites, etc. 
IP is protected in law by, for example, to earn recognition or financial benefit from what they invent or create.
By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.

what is copyright????
Copyright is the exclusive right given to the owner of a copyright for a specific period. Copyright protection in Malaysia is governed by the Copyright Act 1987.



Permission must be obtained to use a copyrighted material from the copyright holder (and pay any required fee)
Exception: concept of fair use which permits limited duplication and use of a portion of copyrighted material for special purposes , such as teaching, research, news reporting, commentary, criticism.

Trademark :
A trade mark is a sign which distinguishes the
goods and services of one trader from those of
another.
A mark includes words, logos, pictures, names,
letters, numbers or a combination of these.
A trade mark is used as a marketing tool to
enable customers in recognizing the product of
a particular trader.


contoh "trademark"





Patents
A patent is an exclusive right granted for an invention, which is a product or process that provides a new way of doing something, or offers a new technical solution to a problem.







CYBERLAW IN MALAYSIA
Communications and Multimedia Act 1998
The CMA provides for a restructuring of the converged ICT industry. It creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services.
Though intended to allow the converged ICT industry to be self-regulating, the Act also provides for the existence of the Communication and Multimedia Commission (the roles and powers of which are more clearly defined by the Communications and Multimedia Commission Act 1998) as a new regulatory authority to oversee the converged ICT industry.
The Communications and Multimedia Act was brought into force on 1st  April 1999.






Monday 2 May 2016

MINGGU KESEMBILAN - NETWORK AND COMPUTER SECURITY


Network And Computer Security

Introduction to network/computer security
Client security issues
Phishing and Web spoofing
Desktop security issues
Adware and Spyware
Viruses, Worms and Trojan Horses

consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network accessible resources.



Standard SSL Certificate




Phishing

Attacks are performed with the intention to acquire personal information like credit card numbers, bank account, etc.
One common approach of performing phishing attack – send e-mails to stem from an official representative of a well-known company
The recipients are encouraged to enter personal identification data. 




Web Spoofing
Typically relies on the following factors:
Convincing website and email design
Use of convincing URLs
Pretending “secure” connections. 


Desktop Security Issues


Spyware
Intends to remain unrecognized.
Used to gather personal info like login details, etc.
Spyware monitors the user’s activities and scan the system.





























contoh virus detected


Dibawah terdapat video ringkas mengenai proses SSL berlaku.


HOW SSL WORK......