0% found this document useful (0 votes)
61 views10 pages

IT Handouts Mod 1-9

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views10 pages

IT Handouts Mod 1-9

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

MODULE 1 IT Career Opportunities

Overview in Information Technology


Position Job Description
Informed User – a person knowledgeable about information Chief Information Highest-ranking IS manager;
technology and information system. Officer is responsible for all strategic
planning in the organization.
Possible reasons why we need to have an in-depth IS Director Manages all systems
throughout the organization
knowledge about information technology:
and the day-to-day operations
of the entire IS organization.
▪ You will have an advantage to your future Information Center Manages IS services such as
organization’s applications because you will have Manager help desks, hot lines, training
better understandings on how IT operates on its own and consulting.
▪ You will be given the chance to help your future Applications Coordinates and manages
organization in enhancing their quality outputs Development new systems development
▪ You will be given the chance to participate in the Manager projects.
organization’s decision support and making when it Project Manager Manages a particular new
comes to IT application systems development
▪ Being an informed user will allow you to be updated project.
to both information and technologies which will System Analyst Interfaces between users and
programmers; determines
guide you in helping the organization recommend IT
information requirements and
related decision making technical specifications for
▪ You will understand how IT can further enhance your new applications.
productivity towards your work and your team’s Business Analyst Focuses on designing
work; and solutions for business
▪ If you plan to become an entrepreneur, then being an problems; interfaces closely
informed user will guide you to use IT as you start with users to demonstrate
your business venture. how IT can be used
innovatively.
According to Williams & Sawyer (2012): Systems Programmer Creates the computer code
for developing new system
“Information technology (IT) is a general term that
software or maintaining
describes any technology that helps to produce,
existing system
manipulate, store, communicate, and/or disseminate software.
information” Application Programmer Creates the computer code
for developing new
Information Technology - a combination of two very applications or maintaining
significant technologies that that continues to evolve in existing system software.
time. These are: Emerging Technologies Forecasts technology trends;
Manager evaluates and experiments
1. COMPUTER TECHNOLOGY - a technology which with new technologies.
makes use of computer in order to accept a data and Network Manager Coordinates and manages the
perform processes and manipulation in order to organization’s voice and data
networks.
come up with an information which we can use.
Database Administrator Manages the organization’s
Computer technology aids us by way of solving
databases and oversees the
problems and executing processes within a short use of database management
span of time software.
2. COMMUNICATIONS TECHNOLOGY - which is also Auditing or Computer Oversees the ethical and legal
referred as telecommunications technology, allows Security Manager use of information systems.
electromagnetic devices and systems to Webmaster Manages the organization’s
communicate over long distances. Some examples World Wide Web site
of communications technology include telephones, Web Designer Creates World Wide Web
radio, satellite, broadcast television and cable sites and pages
How did Information Technology start? MEDIA
Year Invention
+2000 BC Papyrus
Early computing devices are traced as early as 3000 B.C.
1600 Newspaper
when Babylonians invented: 1816 Camera
1895 First Cinema and Film
Abacus - a mechanical computer that is capable of 1900 Radio
performing computations such as addition, subtraction, 1927 Electronic TV
multiplication and division. 1963 Satellite TV
1990 Internet
1998 Google
TRANSPORTATION
2001 Wikipedia
Year Invention
2004 Facebook
+9000 BC Horses and Camels
2005 Youtube
+2000 BC Wooden Ships
1800 Bicycles
1810 Steamships
MEDICINE
1820 Steam Locomotive
Year Invention
1885 First Car with Internal Combustion
+3000 BC Herbal Medicine
1895 First Internal Combustion Omnibus
1290 Eyeglass
1950 Toyota Plant
1816 Stethoscope
1990 Self-Driving Trains
1844 Nitrous Oxide (Anesthetic Drug)
1997 Hybrid Car
1846 General Anesthetic
2015 Testing of Self Driving Cars
1858 Prosthetic Leg
2018 Design of Safe and Reliable Heavy
1895 X-Ray
Trucks
1922 Insulin
1954 First Human Kidney Transplant
HOME DEVICES
1971 MRI
Year Invention
1973 Laser Eye Surgery
+9000 BC Lanterns and Candles
2016 Artificial Pancreas
1859 Electric Stove
1879 Electric Light Bulb
1882 Electric Flat Iron
TELECOMMUNICATION
1882 Electric Fan
Year Invention
1902 Airconditioning Unit
+9000 BC Smoke Signals, Drums, and Horses
1908 Electric Washing Machine
1876 Phone
1910 Home Vacuum Cleaner
1905 Rotary Phone
1913 Refrigerator
1996 First Phone Call made to the Moon
1922 Food Blender Machine
1973 Cordless Phone
1937 Electric Razor
1980 Modern Cellphone Battery
1976 Microwave Oven
2000 Phone with Built-In Camera and
Color Display
2003 Skype
BUILDING
2007 Iphone
Year Invention
2009 Whatsapp
2500 BC Pyramids of Giza
2010 Viber
1596 Flushing Toilet
2017 Samsung Galaxy S8 Waterproof
1781 Cast Iron Bridge
1818 Modern Fire Extinguisher
1853 Elevator Shaft MACHINES AND INSTRUMENTS
1889 Water Heater Tank Year Invention
1896 Working Escalator 1656 Pendulum Clock
1901 Multi-Storey Car Park 1700 Piano
1903 Reinforced Concrete Building 1770 Weighing Scale
1949 Tower Crane 1889 Electric Sewing Machine
2009 Burj Khalifa 1895 Pasteurizing Machine for Milk
2015 S 1911 Self-Propelled Harvester
1912 Electric Traffic Light
1933 Folding Wheelchair
1954 Practical Solar Cell
1959 Photocopier Machine
1960 Treadmill Machine
1967 ATM Machine
AEROSPACE Computer Hardware
Year Invention - Physical components of a computer system. It is
1783 Flight of Hot Air Balloon
abbreviated as computer HW. In short computer
1939 Practical Helicopter
1942 Test Flight of V-2 Rocket parts which can physically touch.
1949 Commercial Jet Aircraft - 4 Categories:
1953 Black Box (1) Input Devices: for raw data input
1958 NASA Agency (2) Processing Devices: to process raw data
1960 Weather Satellite instructions into information
1962 Flight of Boeing 727
(3) Output Devices: to disseminate data and
1963 Flight of Hiller OH-5A Helicopter
1969 Walk on the Moon information
1995 GPS becomes Fully Operational (4) Storage Devices: for data and information
2017 Boeing planned to test Self-Flying Planes retention

COMPUTER 1. Input Devices


Year Invention ▪ Keyboard - Most popular and commonly used
1703 Binary System
input device. It is just like a typewriter with
1949 Computer
1964 Computer Mouse additional keys for special purposes.
1972 HP Scientific Calculator ✓ Typing Keys: alphabet keys and number
1972 Video Games keys
1975 Microsoft ✓ Function Keys: 12 function keys used for
1981 Laptop specific purposes
1982 CD-ROM
✓ Control Keys: cursor and screen control
1985 C++ Programming Language
2000 USB Flash DRrives keys such as arrow, page up, page down,
2007 Playing, Speaking, and Walking Robots Ctrl, Alt, Esc, home, end, insert, delete
2010 IPad ✓ Operator and Special Character Keys
✓ Special Purpose Keys: Enter, Backspace,
Num-Lock, Caps Lock, Shift, Space Bar,
MODULE 3 Tab, Scroll Lock, Sleep, and Print Screen
Computer Hardware Basics Explained with ✓ Numeric Keypad: quick and easy
Parts reference keys Mouse - popular pointing,
selection and cursor control device.
Computer - a high-speed electronic computing and
data processing device which takes inputs processes ▪ Microphone - Used to record sound then
it and produces the output accordingly. It also store stored in a digital form mainly used in
information in memory. multimedia works.
▪ Joy Stick - A pointing device which is used to
Operation Flow on Computer move the cursor position on a screen and it is
mainly used in games.
▪ Light Pen - A pointing device which is similar
to a pen that is used to select a menu item or
draw pictures on the screen.
▪ Scanner - It works like a photocopy or xerox
machine that transfers information available
on a paper into digital format and stores it in a
computer memory.
Common Characteristics of a Computer ▪ Bar Code Reader - Used for reading
✓ Computer understands machine language that barcoded data. Barcoded data is generally
can't be understandable by human used in labeling items, numbering books etc.
✓ Computer recognizes values in the forms ▪ Optical Character Reader (OCR) - Used to
of zeros or ones scan printed text optically and converts them
✓ Accuracy repetitive task, and tirelessness work into readable text and store it in a computer
memory.
▪ Magnetic Ink Card Reader (MICR) - Used in
banks where to read banks code number and What is inside the cabinet?
cheque number are printed on the cheques ▪ Motherboard
with a special type of ink. - The most essential parts of a computer
▪ Optical Mark Reader (OMR) - A optical system. It collects all the parts of computer
scanner used to recognize the type of mark together (both internal and external
made by pen or pencil. It is specially used for components of the computer using various
checking the answer sheets of examinations slots and ports)
having multiple choice questions. ▪ Microprocessor (Heart of the computer)
- An electronic component that controls all
2. Output Devices functions of a computer system. It is located
▪ Monitor - Most common output device, inside the computer case on the
just like TV. It comes in various sizes and motherboard.
resolutions. - It is a single integrated chip (IC) containing
✓ Monitor Resolution: The visual billions of very small components including
dimensions of any given display. transistors, resistors, and diodes that work
Express in terms of width and height, together.
comprised of a specific number of - The microprocessor functions as an artificial
pixels. brain. All the arithmetic and logical functions
▪ Cathode Ray Tube (CRT) - Uses are done by it.
phosphorescent dots to generate the
pixels that constitute displayed images. 3. Memory Devices
Bulk in size and weight. ▪ RAM
▪ Flat Panel Screen - This makes use of liquid - A computer's primary memory. It is a very
crystals or plasma to produce output. Light is fast solid state storage medium that is
passed through the liquid crystals in order to directly accessible by the cpu.
generate pixels. - Any open programs or files on a computer
✓ LCD - Liquid Crystal Display are temporarily stored in RAM whilst being
✓ LED - Light Emitting Diodes used. Being volatile, any data stored in RAM
▪ Printer - generates a hard copy of documents will be lost when power is lost.
and photographs typically on a paper. ▪ ROM
(1) Impact Printers - works by direct - A type of primary storage medium that
contact of an ink ribbon with paper. permanently stores data on PCs and other
(2) Non-Impact Printer - uses laser, electronic devices.
xerographic, electrostatic, chemical - It contains the programming needed to start
and inkjet technologies. a PC, which is essential for boot up. - It
▪ Headset - A combination of speakers and performs major input/output tasks and holds
microphone. It is mostly used by gamers, programs or software instructions. - It is part
video conference, and online meeting etc. of the BIOS chip which is located on
▪ Speakers - Facilitate the output of digital motherboard.
sound.
▪ Projector - This device projects a computer 4. Storage Devices
created image onto another surface, usually ▪ Hard Disk Drives - Are non-volatile
whiteboard or wall. It is most widely used for magnetic secondary storage devices
presentations or for viewing videos. capable of remembering vast amounts of
▪ Plotter - This device generates a hard copy of data in gigabytes or terabytes.
digital depicted design. It is generally used ✓ Uses: Desktop PCs, Laptops, TV
with architect or engineering applications. and Satellite Recorders, Servers
and Mainframes
✓ Two types:
- Internal
- External
▪ SSD - Is a non-volatile secondary storage 2. Central Processing Unit (CPU)
device capable of holding large amounts - Controls, coordinates, and supervises the
of data. It uses flash memories (millions operations of the computer.
of transistors wired in a series on a circuit - It is responsible for processing of the input
board), giving it the advantage of having data and information.
no mechanical moving parts and - It consists of:
therefore faster transfer of data than hard ✓ Arithmetic Logic Unit (ALU):
disk drives. It is more expensive (1) performs mathematical calculations
✓ Uses: High End PCs, Laptops, and takes logical decions
Smartphones, Tablets etc. (2) arithmetic calculations include addition,
▪ Flash Storage Devices subtraction, multiplication, and division
- Are non-volatile solid state secondary (3) logical decisions involve comparison of
storage devices which use NAND flash two data items to see which one is larger
memories to store data. or smaller or equal.
- Portable and comes in a variety of ✓ Control Unit (CU):
capacities to suit most budgets and (1) coordinates and controls the data flow in
requirements. and out of CPU and also controls all the
▪ Pan-Drive - A storage device used in operations of ALU, registers and also
computers. input/output units.
▪ Memory Cards - Used in digital cameras, (2) responsible for carrying out all the
mobile phones, tablets etc. instructions stored in the program.
▪ CD, DVD, Blu-Rays - Are optical secondary (3) decodes the fetched instruction,
storage discs. Binary data is stored as understands it and sends control signals
changes to the texture of the disc surface, to input/output devices until the required
sometimes thought of us microscopic pics operation is done properly by ALU and
and bumps. memory.
✓ Disc Capacities: ✓ Registers:
➢CD - 700 MB (1) CPU has also a set of registers for
➢DVD - 4.7 GB temporary storage of data, instructions,
➢Blu-Ray - 25 GB to 128 GB addresses, and intermediate results of
▪ Optical Disc Drive - device reads, writes, calculation.
rewrites data on optical discs sterilizer be (2) different sizes (16bit, 32bit, 64bit, and so
me technology. on)
✓ Common: - CD, DVD, and Blu-Ray (3) accumulator (ACC) is the main register in
✓ Drives Two Types: the ALU.
➢ Internal
➢ External 3. Memory Unit
- Computer Memory is used to store
MODULE 4 information.
Structure of Computer - Two Types:
(1) Primary Memory
Four Functional Units ▪ Also called the Main Memory
1. Input Unit ▪ CPU can work with the information
- Accepts instructions and data from the user. stored in the main memory
- It converts these instructions and data in computer ▪ The input data is to be processed is
understandable form. brought into the main memory
- It supplies the converted instructions and data to the before processing
CPU for further processing. ▪ The instructions required for
Ex: Keyboard, Mouse, Light Pen, Joy Stick, Barcode processing of data and any
Reader, Microphone, Optical Mark Reader, and Optical intermediate results are also
Character Reader stored
▪ The output is stored in main MODULE 6
memory before being transferred What Is a Data Warehouse?
to the output device.
▪ Two Types: Single Source of Truth - The practice of structuring
(1) Random Access Memory all the best quality data in one place.
(2) Read Only Memory
Data Warehouse - It is the place where the
(2) Secondary Memory company store their valuable data assets. The
▪ The data, programs and outputs are single source of data truth for an organization. It is
stored permanently usually created and used primarily for data
reporting and analysis purposes.
4. Output Unit ✓ Customer Data
- Accepts processed data and information from the ✓ Sales Data
CPU. ✓ Employee Data
- Converts these data and information in user
understandable form. Defining Features:
- Displays or outputs the converted data and ▪ Subject-Oriented: information in the data
information. warehouse revolves around some subject
Ex: Monitor, Speaker, Plotter, and Printer therefore it does not contain all company
data ever but only the subject matters of
MODULE 5 interest.
Basic Telecom Terms ▪ Integrated: corresponds to the example
from the beginning of the video each
IMEI: "International Mobile Equipment Identity" database or each team or even each person
SAE: "System Architecture Evolution" has their own preferences when it comes to
PAN: "Personal Area Network" naming conventions that is why common
RRC: "Radio Resource Control" standards are developed.
ISDN: "Integrated Services Digital Network" ▪ Time Variant: relates to the fact that a data
IP: "Internal Protocol" - it is a method used to transfer data warehouse contains historical data.
from one computer to another using the internet. ▪ Non-volatile: the data only flows in the data
PDCP: "Packet Data Convergence Protocol" warehouse as is once there it cannot be
RLC: "Radio Link Control" changed or deleted.
GPRS: "General Packet Radio Service" ▪ Summarize: the data is used for data
VolTE: "Voice Over Long Term Evolution" analytics often it is aggregated or segmented
E-UTRAN: "Evolved Universal Mobile Telecommunication in some ways in order to facilitate analysis
System Terrestrial Radio Access Network" and reporting all right so that's what a data
TDD: "Time Division Duplex" warehouse is.
FDD: "Frequency Division Duplex"
UMTS: "Universal Mobile Telecommunications System" What is Database & Database Management
EPC: "Evolved Packet Core" System DBMS?
CDMA: "Code Division Multiple Access" - this channel
access method is used in radio communication DATA
technologies. - From the word “datum”
- Single piece of information
How does the mobile technology work? - Any object in consideration
Ex:
✓ Name
✓ Age
✓ Height
✓ Weight
COMPUTER DATA Data Warehouse
- Information processed or stored by a computer ▪ it is based on informational processing
- Maybe processed by computer’s CPU and is stored ▪ it usually stores the historical data whose
in computer hard disks. accuracy is maintained overtime
- Bunch of ones and zeros known as binary data. In ▪ used for long term informational
binary format it can be: requirements and decision support
✓ Created ▪ the common users are knowledge worker
✓ Processed (e.g. Manager, Executive Analyst)
✓ Saved ▪ the designing is done using snowflake
✓ Stored Digitally schema and its subject oriented
- Information in a form of: ▪ the data is summarized and in
✓ Text Documents consolidated form
✓ Images ▪ the view of data is multidimensional
✓ Audio Clips
✓ Software Programs MODULE 7

DATABASE What is Information System?


- Systematic collection of data
- They support electronic storage and manipulation Our world is full of info:
of data ✓ Music Playlist
- Makes data management easy, you can organize ✓ Computer Games
data into: ✓ Facebook Profile
✓ Tables ✓ Doctors Data
✓ Rows
✓ Columns Info needs to be:
✓ Index ✓ Stored
- Only one set of software program provides access ✓ Categorized
of data to all the users ✓ Searched
Example: ✓ Sorted
▪ Dynamic Website
▪ Online Telephone Directory ➢ Everyday we create 2.5 quantillum bites of
▪ Electricity Provider Service data
▪ Facebook ➢ 90% of the world data today was created in the
last two years (equivalent to 57.5 billion 32GB
Purpose of Database: ipads)
- Operate a large amount of information by storing,
retrieving, and managing data. Information Systems
▪ helps us create, control, store, find, and
Difference between Database and Data Warehouse access information.
▪ a set of computer based tools for
Database collecting, storing, and processing data
▪ based on operational processing in our world.
▪ mainly stores the current data which always
guaranteed to be up to date Database - is where the information system
▪ used for day-to-day operations store the data
▪ the common users are the clerk, DBA, the database Program - will help use the data in the program
professional will have
▪ the designing of the database is ER based and User interface - which the user will issue
application oriented commands and receive results.
▪ the data is primitive and highly detailed
▪ view of data is flat relational
10. Always use a computer in ways that
MODULE 8 ensure the consideration and respect for
your fellow human beings
What is Ethics?
Ethics INTERNET ETHICS - Helps people know what
▪ Branch of philosophy that as practical question acceptable behavior when using a computer
"what should we do?". including the behavior during Communication,
▪ This leads to study of things like values, beliefs, Copyright, Protection.
principles, and norms.
▪ These are the things that shape our choices. 1. COMMUNICATION - Politely, clearly, safely, not
talking to strangers, respecting views
Values - the things we hold to be good like justice, 2. RESPECTING COPYRIGHT LAWS - Watching
knowledge, family, and equality. and listening contents in internet does not include
the right to keep it. (piracy)
Principles - What's not just good but also right. They 3. PROTECT YOURSELF ONLINE - Don't send
determine the acceptable ways of getting the things we photos, post address, phone numbers, giving full
value. name, communicate with strangers. DO have
complex passwords, communicate responsibly,
Computer Ethics report to an adult
▪ A part of practical philosophy concerned with how
computing professionals should make decisions Ethical Issues In It
regarding professional and social conduct. Some information systems professionals believe
▪ Since we know ethics is a set of moral principles that that information technology offers many
govern the behavior of a group or individual, it is easy opportunities for unethical behavior because of
to understand computer ethics is how those ease of collecting and disseminating information.
principles relate to the use of computers.
FRAUD – cybercrime, cyberfraud, identity theft,
COMMON ISSUES RELATED TO COMPUTERS and intellectual property theft are on the rise.
1. Intellectual Property Rights
• "Is it ethical to take something just because CONTENT – No organization controls the whole
you can access it?" web so who decides what content should be on it?
2. Privacy Rights Two types of information are available on Web:
• "Should employees be able to monitor public and private.
employees' emails?"
ACCESS – though US citizens do not want the
10 COMMANDMENTS OF COMPUTER ETHICS government controlling web access, many parents
Thou shalt: are concerned about what their children are
1. NOT use a computer to harm other people exposed to while using the web, such as
2. NOT interfere with other people's computer work pornography, violence, and adult language.
3. NOT snoop around in other people's computer
files INTELLECTUAL PROPERTY – is a legal umbrella
4. NOT use a computer to steal covering protections that involve copyrights,
5. NOT use a computer to bear false witness trademarks, trade secrets, and patents for
6. NOT copy or use property software for which you “creations of the mind” developed by people or
have not paid businesses.
7. NOT use other people's computer resources
without authorization or proper compensation COPYRIGHT – laws protect tangible material, such
8. NOT appropriate other people's intellectual as books, drawings, and so forth.
output
9. Think about the social consequences of the
program you are writing or the system you are
designing
FAIR USE – Copyright laws do have some exceptions, corrupted by certain malicious viruses
however, usually under the Fair Use Doctrine. This embedded within the attachments.
exception means that you can use copyrighted material 2. Phishing Attack - the hacker usually sends
for certain purposes, such as quoting passages of a fraudulent emails which appear to be coming
book in literary reviews. from a legitimate source.
3. Man-In-The-Middle Attack - the hacker gains
DOMAIN NAME – One aspect of intellectual property access to the information path between the
that has attracted attention recently is cybersquatting, persons device and the website's server. The
which is registering, selling, or using a domain name to hacker's computer takes over ip address by doing
profit from someone else’s trademark. so the communication line between the person
and the website is secretly intercepted. This
DIGITAL DIVIDE – Some believe that information commonly happens with unsecured wi-fi
technology and the internet have created a digital divide networks and also through malware password
between the information rich and the information poor. attack is one of the easiest.
Children in particular are often victims of digital divide. 4. Password Attack - here a persons password
could have been cracked by using either
Creativity, Copyright, And Fair Use common passwords or trying all possible
alphabetical combinations.
COPYRIGHT LAW - a legal protection that creators have
over their creation, requiring people to get permission first Cyber Security Practices
before copying, pasting, altering, or sharing someone's 1. Install a Firewall: it is a virtual wall between
made. a persons computer and the internet.
Firewall filter the incoming and outgoing
PUBLIC DOMAIN - contents here have works that are not traffic from your device to safeguard your
copyrighted. network and they can either be software
applications or hardware reinforcements.
FAIR USE - allows us to use copyrighted work without 2. Implemented Honeypots: computer
permission only on certain ways: systems called honeypots are used to attract
1. Only small AMOUNT of the original work. attackers. These systems are made to look
2. Add new PURPOSE to the work to make it original vulnerable in order to deceive attackers and
3. Use works that are nonfiction or based on fact. this in turn defends the real system.
(NATURE) 3. Unique Alphanumeric Passwords
4. The EFFECT of the new work should not affect the 4. Antivirus Software
value of the original work 5. Started Avoiding Mails From Unknown
Senders
Claiming fair use is only acceptable on case to case basis:
1. Schoolwork and education Advanced Persistent Threat (APT)
2. Criticizing or commenting - in this form of attack hackers gain access to
3. News Reporting networks for a prolonged period in order to
4. Comedy or parody continuously gain confidential information.

Denial of Service Attack & DDoS


MODULE 9 - where networks are flooded with traffic
which in turn leaves legitimate service
What Is Cyber Security? requests unattended. A variant of this is the
▪ involves techniques that help in securing various distributed denial of service ddos attack
digital components networks data and computer when multiple systems are used to launch
systems from unauthorized digital access. the attack

Types of Cyber Attacks


1. Malware Attack - downloaded any suspicious
attachments online. System could have gotten
SQL Injection Attack The product of House Bill No. 5808
- when a hacker manipulates a standard sql query in a ▪ authored by representative Susan Yap-
database driven website. hackers can view edit and Sulit of the second district of tarlac and
delete tables from databases. 36 other co- authors.

Cyber Security Career Senate Bill No. 2796


- cyber security professionals are hired to work on ▪ proposed by Senator Edgardo Angara
identifying cyber threats and securing a company's
network • Both bills were passed by the respective
chambers within one day of each other on june
There Are Multiple Job Roles In The Field Of Cyber 4 and 5 2012 respectively shortly after the
Security impeachment of gregato corona.
• The final version of the act was signed into law
1. Ethical Hacker - such professionals try to a by President Benigno Aquino III on september
network's vulnerabilities just like how a hacker 12, 2012.
would do.
2. Security Architect – designs robust design robust Enforcement and Implementation
3. Chief Information Security Officer (CISO) - plays 1. PNP
a crucial role in enterprise security and is entrusted 2. NBI
with the overall safety of the information in an
organization.

CYBERCRIME PREVENTION ACT OF 2012 (RA 10175)


▪ First law in the philippines which specifically
criminalizes computer crime.
▪ Aims To:
✓ protect the confidentiality, integrity, and
availability of information and data online.
✓ penalizes the act of misuse, abuse, and
illegal access to information and
communication technology.
▪ Under this act offenses:
✓ Illegal Access
✓ Illegal Interception
✓ Data Interference
✓ System Interference
✓ Misuse of Device
✓ Cyber Squatting
▪ Computer Related Offenses:
✓ Computer Related Forgery
✓ Computer Related Fraud
✓ Computer Related Identity Theft Content
▪ Related Offenses:
✓ Cyber Sex
✓ Libel
✓ Child Pornography
▪ Penalties:
✓ Imprisonment
✓ Fines of 20,000 to 10 million

You might also like