We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
MODULE 1 IT Career Opportunities
Overview in Information Technology
Position Job Description Informed User – a person knowledgeable about information Chief Information Highest-ranking IS manager; technology and information system. Officer is responsible for all strategic planning in the organization. Possible reasons why we need to have an in-depth IS Director Manages all systems throughout the organization knowledge about information technology: and the day-to-day operations of the entire IS organization. ▪ You will have an advantage to your future Information Center Manages IS services such as organization’s applications because you will have Manager help desks, hot lines, training better understandings on how IT operates on its own and consulting. ▪ You will be given the chance to help your future Applications Coordinates and manages organization in enhancing their quality outputs Development new systems development ▪ You will be given the chance to participate in the Manager projects. organization’s decision support and making when it Project Manager Manages a particular new comes to IT application systems development ▪ Being an informed user will allow you to be updated project. to both information and technologies which will System Analyst Interfaces between users and programmers; determines guide you in helping the organization recommend IT information requirements and related decision making technical specifications for ▪ You will understand how IT can further enhance your new applications. productivity towards your work and your team’s Business Analyst Focuses on designing work; and solutions for business ▪ If you plan to become an entrepreneur, then being an problems; interfaces closely informed user will guide you to use IT as you start with users to demonstrate your business venture. how IT can be used innovatively. According to Williams & Sawyer (2012): Systems Programmer Creates the computer code for developing new system “Information technology (IT) is a general term that software or maintaining describes any technology that helps to produce, existing system manipulate, store, communicate, and/or disseminate software. information” Application Programmer Creates the computer code for developing new Information Technology - a combination of two very applications or maintaining significant technologies that that continues to evolve in existing system software. time. These are: Emerging Technologies Forecasts technology trends; Manager evaluates and experiments 1. COMPUTER TECHNOLOGY - a technology which with new technologies. makes use of computer in order to accept a data and Network Manager Coordinates and manages the perform processes and manipulation in order to organization’s voice and data networks. come up with an information which we can use. Database Administrator Manages the organization’s Computer technology aids us by way of solving databases and oversees the problems and executing processes within a short use of database management span of time software. 2. COMMUNICATIONS TECHNOLOGY - which is also Auditing or Computer Oversees the ethical and legal referred as telecommunications technology, allows Security Manager use of information systems. electromagnetic devices and systems to Webmaster Manages the organization’s communicate over long distances. Some examples World Wide Web site of communications technology include telephones, Web Designer Creates World Wide Web radio, satellite, broadcast television and cable sites and pages How did Information Technology start? MEDIA Year Invention +2000 BC Papyrus Early computing devices are traced as early as 3000 B.C. 1600 Newspaper when Babylonians invented: 1816 Camera 1895 First Cinema and Film Abacus - a mechanical computer that is capable of 1900 Radio performing computations such as addition, subtraction, 1927 Electronic TV multiplication and division. 1963 Satellite TV 1990 Internet 1998 Google TRANSPORTATION 2001 Wikipedia Year Invention 2004 Facebook +9000 BC Horses and Camels 2005 Youtube +2000 BC Wooden Ships 1800 Bicycles 1810 Steamships MEDICINE 1820 Steam Locomotive Year Invention 1885 First Car with Internal Combustion +3000 BC Herbal Medicine 1895 First Internal Combustion Omnibus 1290 Eyeglass 1950 Toyota Plant 1816 Stethoscope 1990 Self-Driving Trains 1844 Nitrous Oxide (Anesthetic Drug) 1997 Hybrid Car 1846 General Anesthetic 2015 Testing of Self Driving Cars 1858 Prosthetic Leg 2018 Design of Safe and Reliable Heavy 1895 X-Ray Trucks 1922 Insulin 1954 First Human Kidney Transplant HOME DEVICES 1971 MRI Year Invention 1973 Laser Eye Surgery +9000 BC Lanterns and Candles 2016 Artificial Pancreas 1859 Electric Stove 1879 Electric Light Bulb 1882 Electric Flat Iron TELECOMMUNICATION 1882 Electric Fan Year Invention 1902 Airconditioning Unit +9000 BC Smoke Signals, Drums, and Horses 1908 Electric Washing Machine 1876 Phone 1910 Home Vacuum Cleaner 1905 Rotary Phone 1913 Refrigerator 1996 First Phone Call made to the Moon 1922 Food Blender Machine 1973 Cordless Phone 1937 Electric Razor 1980 Modern Cellphone Battery 1976 Microwave Oven 2000 Phone with Built-In Camera and Color Display 2003 Skype BUILDING 2007 Iphone Year Invention 2009 Whatsapp 2500 BC Pyramids of Giza 2010 Viber 1596 Flushing Toilet 2017 Samsung Galaxy S8 Waterproof 1781 Cast Iron Bridge 1818 Modern Fire Extinguisher 1853 Elevator Shaft MACHINES AND INSTRUMENTS 1889 Water Heater Tank Year Invention 1896 Working Escalator 1656 Pendulum Clock 1901 Multi-Storey Car Park 1700 Piano 1903 Reinforced Concrete Building 1770 Weighing Scale 1949 Tower Crane 1889 Electric Sewing Machine 2009 Burj Khalifa 1895 Pasteurizing Machine for Milk 2015 S 1911 Self-Propelled Harvester 1912 Electric Traffic Light 1933 Folding Wheelchair 1954 Practical Solar Cell 1959 Photocopier Machine 1960 Treadmill Machine 1967 ATM Machine AEROSPACE Computer Hardware Year Invention - Physical components of a computer system. It is 1783 Flight of Hot Air Balloon abbreviated as computer HW. In short computer 1939 Practical Helicopter 1942 Test Flight of V-2 Rocket parts which can physically touch. 1949 Commercial Jet Aircraft - 4 Categories: 1953 Black Box (1) Input Devices: for raw data input 1958 NASA Agency (2) Processing Devices: to process raw data 1960 Weather Satellite instructions into information 1962 Flight of Boeing 727 (3) Output Devices: to disseminate data and 1963 Flight of Hiller OH-5A Helicopter 1969 Walk on the Moon information 1995 GPS becomes Fully Operational (4) Storage Devices: for data and information 2017 Boeing planned to test Self-Flying Planes retention
COMPUTER 1. Input Devices
Year Invention ▪ Keyboard - Most popular and commonly used 1703 Binary System input device. It is just like a typewriter with 1949 Computer 1964 Computer Mouse additional keys for special purposes. 1972 HP Scientific Calculator ✓ Typing Keys: alphabet keys and number 1972 Video Games keys 1975 Microsoft ✓ Function Keys: 12 function keys used for 1981 Laptop specific purposes 1982 CD-ROM ✓ Control Keys: cursor and screen control 1985 C++ Programming Language 2000 USB Flash DRrives keys such as arrow, page up, page down, 2007 Playing, Speaking, and Walking Robots Ctrl, Alt, Esc, home, end, insert, delete 2010 IPad ✓ Operator and Special Character Keys ✓ Special Purpose Keys: Enter, Backspace, Num-Lock, Caps Lock, Shift, Space Bar, MODULE 3 Tab, Scroll Lock, Sleep, and Print Screen Computer Hardware Basics Explained with ✓ Numeric Keypad: quick and easy Parts reference keys Mouse - popular pointing, selection and cursor control device. Computer - a high-speed electronic computing and data processing device which takes inputs processes ▪ Microphone - Used to record sound then it and produces the output accordingly. It also store stored in a digital form mainly used in information in memory. multimedia works. ▪ Joy Stick - A pointing device which is used to Operation Flow on Computer move the cursor position on a screen and it is mainly used in games. ▪ Light Pen - A pointing device which is similar to a pen that is used to select a menu item or draw pictures on the screen. ▪ Scanner - It works like a photocopy or xerox machine that transfers information available on a paper into digital format and stores it in a computer memory. Common Characteristics of a Computer ▪ Bar Code Reader - Used for reading ✓ Computer understands machine language that barcoded data. Barcoded data is generally can't be understandable by human used in labeling items, numbering books etc. ✓ Computer recognizes values in the forms ▪ Optical Character Reader (OCR) - Used to of zeros or ones scan printed text optically and converts them ✓ Accuracy repetitive task, and tirelessness work into readable text and store it in a computer memory. ▪ Magnetic Ink Card Reader (MICR) - Used in banks where to read banks code number and What is inside the cabinet? cheque number are printed on the cheques ▪ Motherboard with a special type of ink. - The most essential parts of a computer ▪ Optical Mark Reader (OMR) - A optical system. It collects all the parts of computer scanner used to recognize the type of mark together (both internal and external made by pen or pencil. It is specially used for components of the computer using various checking the answer sheets of examinations slots and ports) having multiple choice questions. ▪ Microprocessor (Heart of the computer) - An electronic component that controls all 2. Output Devices functions of a computer system. It is located ▪ Monitor - Most common output device, inside the computer case on the just like TV. It comes in various sizes and motherboard. resolutions. - It is a single integrated chip (IC) containing ✓ Monitor Resolution: The visual billions of very small components including dimensions of any given display. transistors, resistors, and diodes that work Express in terms of width and height, together. comprised of a specific number of - The microprocessor functions as an artificial pixels. brain. All the arithmetic and logical functions ▪ Cathode Ray Tube (CRT) - Uses are done by it. phosphorescent dots to generate the pixels that constitute displayed images. 3. Memory Devices Bulk in size and weight. ▪ RAM ▪ Flat Panel Screen - This makes use of liquid - A computer's primary memory. It is a very crystals or plasma to produce output. Light is fast solid state storage medium that is passed through the liquid crystals in order to directly accessible by the cpu. generate pixels. - Any open programs or files on a computer ✓ LCD - Liquid Crystal Display are temporarily stored in RAM whilst being ✓ LED - Light Emitting Diodes used. Being volatile, any data stored in RAM ▪ Printer - generates a hard copy of documents will be lost when power is lost. and photographs typically on a paper. ▪ ROM (1) Impact Printers - works by direct - A type of primary storage medium that contact of an ink ribbon with paper. permanently stores data on PCs and other (2) Non-Impact Printer - uses laser, electronic devices. xerographic, electrostatic, chemical - It contains the programming needed to start and inkjet technologies. a PC, which is essential for boot up. - It ▪ Headset - A combination of speakers and performs major input/output tasks and holds microphone. It is mostly used by gamers, programs or software instructions. - It is part video conference, and online meeting etc. of the BIOS chip which is located on ▪ Speakers - Facilitate the output of digital motherboard. sound. ▪ Projector - This device projects a computer 4. Storage Devices created image onto another surface, usually ▪ Hard Disk Drives - Are non-volatile whiteboard or wall. It is most widely used for magnetic secondary storage devices presentations or for viewing videos. capable of remembering vast amounts of ▪ Plotter - This device generates a hard copy of data in gigabytes or terabytes. digital depicted design. It is generally used ✓ Uses: Desktop PCs, Laptops, TV with architect or engineering applications. and Satellite Recorders, Servers and Mainframes ✓ Two types: - Internal - External ▪ SSD - Is a non-volatile secondary storage 2. Central Processing Unit (CPU) device capable of holding large amounts - Controls, coordinates, and supervises the of data. It uses flash memories (millions operations of the computer. of transistors wired in a series on a circuit - It is responsible for processing of the input board), giving it the advantage of having data and information. no mechanical moving parts and - It consists of: therefore faster transfer of data than hard ✓ Arithmetic Logic Unit (ALU): disk drives. It is more expensive (1) performs mathematical calculations ✓ Uses: High End PCs, Laptops, and takes logical decions Smartphones, Tablets etc. (2) arithmetic calculations include addition, ▪ Flash Storage Devices subtraction, multiplication, and division - Are non-volatile solid state secondary (3) logical decisions involve comparison of storage devices which use NAND flash two data items to see which one is larger memories to store data. or smaller or equal. - Portable and comes in a variety of ✓ Control Unit (CU): capacities to suit most budgets and (1) coordinates and controls the data flow in requirements. and out of CPU and also controls all the ▪ Pan-Drive - A storage device used in operations of ALU, registers and also computers. input/output units. ▪ Memory Cards - Used in digital cameras, (2) responsible for carrying out all the mobile phones, tablets etc. instructions stored in the program. ▪ CD, DVD, Blu-Rays - Are optical secondary (3) decodes the fetched instruction, storage discs. Binary data is stored as understands it and sends control signals changes to the texture of the disc surface, to input/output devices until the required sometimes thought of us microscopic pics operation is done properly by ALU and and bumps. memory. ✓ Disc Capacities: ✓ Registers: ➢CD - 700 MB (1) CPU has also a set of registers for ➢DVD - 4.7 GB temporary storage of data, instructions, ➢Blu-Ray - 25 GB to 128 GB addresses, and intermediate results of ▪ Optical Disc Drive - device reads, writes, calculation. rewrites data on optical discs sterilizer be (2) different sizes (16bit, 32bit, 64bit, and so me technology. on) ✓ Common: - CD, DVD, and Blu-Ray (3) accumulator (ACC) is the main register in ✓ Drives Two Types: the ALU. ➢ Internal ➢ External 3. Memory Unit - Computer Memory is used to store MODULE 4 information. Structure of Computer - Two Types: (1) Primary Memory Four Functional Units ▪ Also called the Main Memory 1. Input Unit ▪ CPU can work with the information - Accepts instructions and data from the user. stored in the main memory - It converts these instructions and data in computer ▪ The input data is to be processed is understandable form. brought into the main memory - It supplies the converted instructions and data to the before processing CPU for further processing. ▪ The instructions required for Ex: Keyboard, Mouse, Light Pen, Joy Stick, Barcode processing of data and any Reader, Microphone, Optical Mark Reader, and Optical intermediate results are also Character Reader stored ▪ The output is stored in main MODULE 6 memory before being transferred What Is a Data Warehouse? to the output device. ▪ Two Types: Single Source of Truth - The practice of structuring (1) Random Access Memory all the best quality data in one place. (2) Read Only Memory Data Warehouse - It is the place where the (2) Secondary Memory company store their valuable data assets. The ▪ The data, programs and outputs are single source of data truth for an organization. It is stored permanently usually created and used primarily for data reporting and analysis purposes. 4. Output Unit ✓ Customer Data - Accepts processed data and information from the ✓ Sales Data CPU. ✓ Employee Data - Converts these data and information in user understandable form. Defining Features: - Displays or outputs the converted data and ▪ Subject-Oriented: information in the data information. warehouse revolves around some subject Ex: Monitor, Speaker, Plotter, and Printer therefore it does not contain all company data ever but only the subject matters of MODULE 5 interest. Basic Telecom Terms ▪ Integrated: corresponds to the example from the beginning of the video each IMEI: "International Mobile Equipment Identity" database or each team or even each person SAE: "System Architecture Evolution" has their own preferences when it comes to PAN: "Personal Area Network" naming conventions that is why common RRC: "Radio Resource Control" standards are developed. ISDN: "Integrated Services Digital Network" ▪ Time Variant: relates to the fact that a data IP: "Internal Protocol" - it is a method used to transfer data warehouse contains historical data. from one computer to another using the internet. ▪ Non-volatile: the data only flows in the data PDCP: "Packet Data Convergence Protocol" warehouse as is once there it cannot be RLC: "Radio Link Control" changed or deleted. GPRS: "General Packet Radio Service" ▪ Summarize: the data is used for data VolTE: "Voice Over Long Term Evolution" analytics often it is aggregated or segmented E-UTRAN: "Evolved Universal Mobile Telecommunication in some ways in order to facilitate analysis System Terrestrial Radio Access Network" and reporting all right so that's what a data TDD: "Time Division Duplex" warehouse is. FDD: "Frequency Division Duplex" UMTS: "Universal Mobile Telecommunications System" What is Database & Database Management EPC: "Evolved Packet Core" System DBMS? CDMA: "Code Division Multiple Access" - this channel access method is used in radio communication DATA technologies. - From the word “datum” - Single piece of information How does the mobile technology work? - Any object in consideration Ex: ✓ Name ✓ Age ✓ Height ✓ Weight COMPUTER DATA Data Warehouse - Information processed or stored by a computer ▪ it is based on informational processing - Maybe processed by computer’s CPU and is stored ▪ it usually stores the historical data whose in computer hard disks. accuracy is maintained overtime - Bunch of ones and zeros known as binary data. In ▪ used for long term informational binary format it can be: requirements and decision support ✓ Created ▪ the common users are knowledge worker ✓ Processed (e.g. Manager, Executive Analyst) ✓ Saved ▪ the designing is done using snowflake ✓ Stored Digitally schema and its subject oriented - Information in a form of: ▪ the data is summarized and in ✓ Text Documents consolidated form ✓ Images ▪ the view of data is multidimensional ✓ Audio Clips ✓ Software Programs MODULE 7
DATABASE What is Information System?
- Systematic collection of data - They support electronic storage and manipulation Our world is full of info: of data ✓ Music Playlist - Makes data management easy, you can organize ✓ Computer Games data into: ✓ Facebook Profile ✓ Tables ✓ Doctors Data ✓ Rows ✓ Columns Info needs to be: ✓ Index ✓ Stored - Only one set of software program provides access ✓ Categorized of data to all the users ✓ Searched Example: ✓ Sorted ▪ Dynamic Website ▪ Online Telephone Directory ➢ Everyday we create 2.5 quantillum bites of ▪ Electricity Provider Service data ▪ Facebook ➢ 90% of the world data today was created in the last two years (equivalent to 57.5 billion 32GB Purpose of Database: ipads) - Operate a large amount of information by storing, retrieving, and managing data. Information Systems ▪ helps us create, control, store, find, and Difference between Database and Data Warehouse access information. ▪ a set of computer based tools for Database collecting, storing, and processing data ▪ based on operational processing in our world. ▪ mainly stores the current data which always guaranteed to be up to date Database - is where the information system ▪ used for day-to-day operations store the data ▪ the common users are the clerk, DBA, the database Program - will help use the data in the program professional will have ▪ the designing of the database is ER based and User interface - which the user will issue application oriented commands and receive results. ▪ the data is primitive and highly detailed ▪ view of data is flat relational 10. Always use a computer in ways that MODULE 8 ensure the consideration and respect for your fellow human beings What is Ethics? Ethics INTERNET ETHICS - Helps people know what ▪ Branch of philosophy that as practical question acceptable behavior when using a computer "what should we do?". including the behavior during Communication, ▪ This leads to study of things like values, beliefs, Copyright, Protection. principles, and norms. ▪ These are the things that shape our choices. 1. COMMUNICATION - Politely, clearly, safely, not talking to strangers, respecting views Values - the things we hold to be good like justice, 2. RESPECTING COPYRIGHT LAWS - Watching knowledge, family, and equality. and listening contents in internet does not include the right to keep it. (piracy) Principles - What's not just good but also right. They 3. PROTECT YOURSELF ONLINE - Don't send determine the acceptable ways of getting the things we photos, post address, phone numbers, giving full value. name, communicate with strangers. DO have complex passwords, communicate responsibly, Computer Ethics report to an adult ▪ A part of practical philosophy concerned with how computing professionals should make decisions Ethical Issues In It regarding professional and social conduct. Some information systems professionals believe ▪ Since we know ethics is a set of moral principles that that information technology offers many govern the behavior of a group or individual, it is easy opportunities for unethical behavior because of to understand computer ethics is how those ease of collecting and disseminating information. principles relate to the use of computers. FRAUD – cybercrime, cyberfraud, identity theft, COMMON ISSUES RELATED TO COMPUTERS and intellectual property theft are on the rise. 1. Intellectual Property Rights • "Is it ethical to take something just because CONTENT – No organization controls the whole you can access it?" web so who decides what content should be on it? 2. Privacy Rights Two types of information are available on Web: • "Should employees be able to monitor public and private. employees' emails?" ACCESS – though US citizens do not want the 10 COMMANDMENTS OF COMPUTER ETHICS government controlling web access, many parents Thou shalt: are concerned about what their children are 1. NOT use a computer to harm other people exposed to while using the web, such as 2. NOT interfere with other people's computer work pornography, violence, and adult language. 3. NOT snoop around in other people's computer files INTELLECTUAL PROPERTY – is a legal umbrella 4. NOT use a computer to steal covering protections that involve copyrights, 5. NOT use a computer to bear false witness trademarks, trade secrets, and patents for 6. NOT copy or use property software for which you “creations of the mind” developed by people or have not paid businesses. 7. NOT use other people's computer resources without authorization or proper compensation COPYRIGHT – laws protect tangible material, such 8. NOT appropriate other people's intellectual as books, drawings, and so forth. output 9. Think about the social consequences of the program you are writing or the system you are designing FAIR USE – Copyright laws do have some exceptions, corrupted by certain malicious viruses however, usually under the Fair Use Doctrine. This embedded within the attachments. exception means that you can use copyrighted material 2. Phishing Attack - the hacker usually sends for certain purposes, such as quoting passages of a fraudulent emails which appear to be coming book in literary reviews. from a legitimate source. 3. Man-In-The-Middle Attack - the hacker gains DOMAIN NAME – One aspect of intellectual property access to the information path between the that has attracted attention recently is cybersquatting, persons device and the website's server. The which is registering, selling, or using a domain name to hacker's computer takes over ip address by doing profit from someone else’s trademark. so the communication line between the person and the website is secretly intercepted. This DIGITAL DIVIDE – Some believe that information commonly happens with unsecured wi-fi technology and the internet have created a digital divide networks and also through malware password between the information rich and the information poor. attack is one of the easiest. Children in particular are often victims of digital divide. 4. Password Attack - here a persons password could have been cracked by using either Creativity, Copyright, And Fair Use common passwords or trying all possible alphabetical combinations. COPYRIGHT LAW - a legal protection that creators have over their creation, requiring people to get permission first Cyber Security Practices before copying, pasting, altering, or sharing someone's 1. Install a Firewall: it is a virtual wall between made. a persons computer and the internet. Firewall filter the incoming and outgoing PUBLIC DOMAIN - contents here have works that are not traffic from your device to safeguard your copyrighted. network and they can either be software applications or hardware reinforcements. FAIR USE - allows us to use copyrighted work without 2. Implemented Honeypots: computer permission only on certain ways: systems called honeypots are used to attract 1. Only small AMOUNT of the original work. attackers. These systems are made to look 2. Add new PURPOSE to the work to make it original vulnerable in order to deceive attackers and 3. Use works that are nonfiction or based on fact. this in turn defends the real system. (NATURE) 3. Unique Alphanumeric Passwords 4. The EFFECT of the new work should not affect the 4. Antivirus Software value of the original work 5. Started Avoiding Mails From Unknown Senders Claiming fair use is only acceptable on case to case basis: 1. Schoolwork and education Advanced Persistent Threat (APT) 2. Criticizing or commenting - in this form of attack hackers gain access to 3. News Reporting networks for a prolonged period in order to 4. Comedy or parody continuously gain confidential information.
Denial of Service Attack & DDoS
MODULE 9 - where networks are flooded with traffic which in turn leaves legitimate service What Is Cyber Security? requests unattended. A variant of this is the ▪ involves techniques that help in securing various distributed denial of service ddos attack digital components networks data and computer when multiple systems are used to launch systems from unauthorized digital access. the attack
Types of Cyber Attacks
1. Malware Attack - downloaded any suspicious attachments online. System could have gotten SQL Injection Attack The product of House Bill No. 5808 - when a hacker manipulates a standard sql query in a ▪ authored by representative Susan Yap- database driven website. hackers can view edit and Sulit of the second district of tarlac and delete tables from databases. 36 other co- authors.
Cyber Security Career Senate Bill No. 2796
- cyber security professionals are hired to work on ▪ proposed by Senator Edgardo Angara identifying cyber threats and securing a company's network • Both bills were passed by the respective chambers within one day of each other on june There Are Multiple Job Roles In The Field Of Cyber 4 and 5 2012 respectively shortly after the Security impeachment of gregato corona. • The final version of the act was signed into law 1. Ethical Hacker - such professionals try to a by President Benigno Aquino III on september network's vulnerabilities just like how a hacker 12, 2012. would do. 2. Security Architect – designs robust design robust Enforcement and Implementation 3. Chief Information Security Officer (CISO) - plays 1. PNP a crucial role in enterprise security and is entrusted 2. NBI with the overall safety of the information in an organization.
CYBERCRIME PREVENTION ACT OF 2012 (RA 10175)
▪ First law in the philippines which specifically criminalizes computer crime. ▪ Aims To: ✓ protect the confidentiality, integrity, and availability of information and data online. ✓ penalizes the act of misuse, abuse, and illegal access to information and communication technology. ▪ Under this act offenses: ✓ Illegal Access ✓ Illegal Interception ✓ Data Interference ✓ System Interference ✓ Misuse of Device ✓ Cyber Squatting ▪ Computer Related Offenses: ✓ Computer Related Forgery ✓ Computer Related Fraud ✓ Computer Related Identity Theft Content ▪ Related Offenses: ✓ Cyber Sex ✓ Libel ✓ Child Pornography ▪ Penalties: ✓ Imprisonment ✓ Fines of 20,000 to 10 million