Reading Notes for Topic 1
Reading Notes for Topic 1
Topic Description
Definition of Data
Data refers to raw, unprocessed facts and figures that lack meaning until they are
analyzed. Data can exist in various forms, such as numbers, text, images, audio, and video.
Types of Data
Type of Data Description Example
Definition of Information
Information is processed or structured data that is meaningful and useful for decision-
making. Information provides context to data, making it valuable.
Review Questions:
Definition of a Computer
Review Questions:
Component Examples
Review Questions:
In today’s digital world, Information Systems (IS), Information Technology (IT), and
Information and Communication Technology (ICT) play a critical role in managing, storing,
and sharing information efficiently. Understanding these concepts is essential for
leveraging technology in education, business, healthcare, and other sectors.
Definition:
An Information System (IS) is a structured combination of people, technology,
processes, and data that work together to collect, process, store, and distribute
information to support decision-making and operational functions.
Data Raw facts and figures processed into Customer records, financial
information. transactions.
Real-Life Example:
A hospital information system (HIS) collects patient records, schedules appointments,
and assists doctors in diagnosing diseases based on past medical history.
Definition:
Information Technology (IT) refers to the use of computing devices, software,
networks, and databases to store, retrieve, process, and transmit information efficiently.
IT is the backbone of modern digital infrastructure.
Core Components of IT
Real-Life Example:
Banks use IT systems to process transactions, manage accounts, and secure customer data
through encryption.
Definition:
Information and Communication Technology (ICT) is an extension of IT that focuses on
the integration of computing and communication technologies to enhance connectivity,
collaboration, and information exchange.
Telecommunication Networks for voice and data Mobile phones, fiber optics,
transmission. satellite communication.
E-Government & E- Digital services for citizens Online tax filing, mobile
Commerce and businesses. banking, e-marketplaces.
Real-Life Example:
A virtual classroom (ICT application in education) allows students to attend online
courses, collaborate on assignments, and interact with teachers using digital tools like
Google Classroom and Zoom.
Comparison of IS, IT, and ICT
Real-Life Analogy:
• IT is like the computers and software used in that school for various tasks.
• ICT is like the use of the internet and mobile applications for e-learning and
communication.
Review Questions
📖 Microsoft: Introduction to IT
🌍 World Economic Forum: ICT in Digital Transformation
IBM: What is an Information System?
Cisco: Introduction to Networking
Summary
Before diving into information security, let's define some essential terms used in
cybersecurity:
Brute Force Attack A trial-and-error method used to Hackers use software to try
guess passwords. thousands of password
combinations per second.
Figure 1: Terminologies
Integrity Ensures data remains accurate and Using digital signatures to verify
unaltered unless authorized the authenticity of electronic
changes are made. contracts.
Availability Ensures authorized users can Cloud backup ensures business
access information and services data remains available even after
when needed. a system crash.
Real-Life Analogy:
Think of a bank:
• Confidentiality: Only account holders and authorized bank staff can see account
details.
• Availability: ATMs and online banking must be accessible 24/7 for transactions.
Real-Life Analogy:
Cyber threats are like burglars trying to break into a house:
• Brute Force Attacks are like trying every key on a keychain to unlock a door.
Adware Comes with free Displays intrusive ads, Use ad blockers, avoid
software redirects users freeware sites
Review Questions
Keep Software & Regularly update operating Install updates to fix vulnerabilities
Devices Updated systems, applications, and exploited by Zero-Day Attacks.
security patches.
Secure Personal & Lock devices with Encrypt sensitive files stored on
Business Devices passwords or biometric laptops, USB drives, and mobile
authentication. devices.
Avoid Public Wi-Fi Public Wi-Fi networks are Use a VPN (Virtual Private
for Sensitive often unsecured and Network) for encrypted
Transactions vulnerable to attacks. communication.
Real-Life Analogy:
Think of cybersecurity as home security:
Review Questions
5. List three best security practices to protect personal and work data.
1. Define the terms data and information and explain how they differ.
5. Explain why data accuracy and consistency are critical in an Information System.
7. What are the four main stages of the IPOS cycle? Give an example of how they
work in an ATM machine.
8. Compare the functions of the CPU, RAM, and Storage in a computer system.
11. Differentiate between hardware and software, providing three examples of each.
12. Explain the role of input, output, storage, and processing devices in a computer
system.
14. Describe how a computer network enables hardware and software interaction.
17. Differentiate between IT and ICT, providing two real-life examples of each.
18. How has ICT impacted modern businesses, healthcare, and education?
19. Explain the importance of database systems in Information Technology.
20. Compare local and cloud computing in terms of efficiency, security, and
accessibility.
21. What is Information Security, and why is it important in today’s digital world?
22. Explain the CIA Triad (Confidentiality, Integrity, and Availability) with real-life
analogies.
24. List three best cybersecurity practices that individuals should follow to protect
their personal data.
26. What is ransomware, and how can organizations protect themselves against it?
27. How do firewalls and antivirus software protect computer systems from cyber
threats?
28. Describe the role of encryption in securing online transactions (e.g., online
banking).
30. Discuss the risks associated with using public Wi-Fi networks and how to mitigate
them.
Real-Life Application Questions
31. Imagine you are the IT manager of a company. What steps would you take to
protect your company's data from cyberattacks?
32. How does ICT contribute to remote learning and online collaboration? Provide an
example.
33. A hacker sends a fake email from a bank requesting your login details. How would
you identify this as a phishing attack, and what should you do?
34. Suppose you need to purchase a new computer. What factors would you consider
when choosing the right specifications for your needs?
35. Your organization experiences a server crash, resulting in lost data. How can
disaster recovery strategies help prevent such an issue in the future?