Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
At the end of this lesson, students should be able to; • Communicate using Internet Relay Chat (IRC).. • Observe safety precautions when communicating online. • Describe the need for cyber law. • Define website. • List web design software.
ACTIVITY 1 : COMMUNICATING USING INTERNET ( mIRC)
IRC (Internet Relay Chat) • Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing. • It is mainly designed for group communication in discussion forums, but also allows one-to-one communication and data transfers
mIRC Example of IRC
Observe safety precautions when communicating online. • Never give out your personal information in a chat room. • Never agree to meet a stranger in person whom you met in a chat room. • Remember your Netiquette and be nice!
Chatting with mIRC 2. Select Channel Room to start chatting (#Beginner) 1. Click Connection / Disconnect Icon to connect mIRC 3. Click OK
Continue…. 4. Select the “chatter in room” in “Beginner Channel” to start chatting (kenali, reeena, P00r-girl)
Continue…. 5. Chatting is doing when to type the message text
Continue…. 6. Reply text message from members
Internet communication abuse SPAM hacking sending virus via e-mail
What is Cyber Law? • Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
The Malaysian Government has already passed severalcyber laws to control and reduce Internet communication abuse
These cyber laws include: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Telemedicine Act 1997 • Communications and Multimedia Act 1998
Digital Signature Act 1997 • Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. • By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.
Computer Crimes Act 1997 • Gives protection against the misuse of computers and computer criminal activities such as unauthorized use of programmed, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks. • Users can protect their rights to privacy and build trust in the computer system. • The government can have control at a certain level over cyberspace to reduce cyber crime activities.
Telemedicine Act 1997 • The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected. • This act provides future development and delivery of healthcare in Malaysia.
Communications And Multimedia Act 1998 • The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia.
Needs for Cyber Law • Integrity and Security of Information • Legal Status of Online Transactions • Security of Government Data • Privacy and Confidentially of Information • Intellectual Property Rights
Examples of Cyber abuse on the users • sending a computer virus via e-mail • hacking into your school’s database to change your examination results. • selling pirated software in a night market
DEFINITION A website (also spelled Website or web site) is a collection of related web pages, images, videos or other digital assets that are addressed with a common domain name or IP address in an Internet Protocol-based network.
Examples of Web Design Software • FrontPage • Macromedia Flash • Macromedia Dreamweaver • Microsoft Office Word