M O D U L E 2.
1
Sunday, May 7, 2023 6:59 PM
• The internet
o Worldwide computer network consisting of computers devices and
networks linked using some forms of communication media
• WAN
o A network spread over a wide geographical area such as a city, country or
even continents
• ISP
o Company that has a permanent fast connection to the internet and that
sells internet access and services for a monthly fee
Most people prefer a broadband - a high speed, high bandwidth connection to the
internet
Wired VS wireless connections
• ADSL = permanent digital connection to the internet using a normal telephone line
o Split into two channels one for phone calls + and one for internet
• Fiber
o Data is transmitted along thin glass fiber tubes.
o Much faster than electrical transmission over copper cables used in
ADSL
Wired
ADSL Cheaper than cellular connections
ADSL Speeds drop the further you are away from the exchange
ADSL + Fiber more stable than cellular connections
Fiber Faster + cheaper + more stable than ADSL or cellular
Fiber Not affected by electrical interferences
Wireless
▪ Internet connectivity without ADSL or fiber line
▪ 3G or 4G dongle on a desktop
▪ Smartphone = Wi-Fi hotspot to connect other devices to the internet
Advantages Mobile access to the internet using a mobile device
Disadvantages • Limited or slow access if in area with poor cellular
coverage
• Never escape communication
Module 2.1 Page 1
• Never escape communication
• Need to limit the amount of data you use
Wi-Fi
• Way of connectivity to an existing ADSL or fiber connection wirelessly
o Fairly small area of coverage
o WIFI at a public hotspot can provide cheaper or free access
o Can use ADSL router to create own WIFI network
o Password needed the first time you connect a device to WIFI
o Your device will also detect other WIFI networks
People prefer data connection that is:
• Always on + everywhere
• Fast + reliable
• Hassle-free
✓ Always on
○ Laptop has to boot up or wake up from sleep mode before you can use it
○ Delays are difference between using mobile devices and traditional computing
devices
✓ Always connected
○ To tell you when you are being communicated with via phone, instant messaging
or VoIP services
✓ 3G/4G
○ Connect to the internet using cellular technology whenever a cellphone signal is
available
✓ Wi-Fi vs cellular
○ Usually only an issue for tablets models with Wi-Fi re less expensive
○ Makes more sense to het a model with cellular data so you can access the
internet wherever you are
Real time messaging • Instant messaging
• WhatsApp + snapchat + Facebook
messenger
Advantages • Chat in real time with more than
person at a time
• Cost effective
• Can easily witch from chat to
voice or video call
Disadvantages • No control to ensure that people
are who they say they are
• Can lead to anti-social behavior
• Creates opps for cyberstalking +
cyberbullying
VoIP Technology that allows telephone
Module 2.1 Page 2
VoIP • Technology that allows telephone
calls to be made over Lan + wans
6 internet
• Conference call technology
• Skype and other messaging apps
Advantages • VoIP calls are cheaper than
normal phone calls
• Software is generally free
• Allows you to transfer files and
make video conference calls
Disadvantages • Need an internet connection and
both users need to use the same
software
• Need to purchase credits to call
phones not on the internet
• Call quality may be poor if
internet connection is slow
Video • Allows two or more people to hold
conferencing online conferences at different
locations using a computer network
to transmit audio and video as if
they were all in the same room
• Webcam + microphone + speakers
linked to the computer
Advantages • People you are communicating with
are visible
• Cheaper than normal phone calls or
travelling to a meeting
Disadvantages • Video/audio quality can be poor on
a slow internet connection
• Can use a lot of data especially
when using video
Cloud computing • The sharing and use of resources
and applications offered as
services over the internet
• Online storage of files , web based
email
• Amazon rents and provides online
computing resources
• Google drive
• Web based word processing
Advantages • Software always up to date
• Do not have to download or install
any software
• Can use the software and access
your data anywhere
Module 2.1 Page 3
your data anywhere
Disadvantages • Only effective if you have a fast ,
reliable internet connection
• May have to pay a monthly fee
• Software might not have all the
features or capabilities of locally
installed software
Online storage • Keeping your data in the cloud
Advantages • File extensions are not blocked
• Online storage system backs up
the files
• Can save up space on local hard
drive
Disadvantages • Amount of space allocated for
saving file can be quite small for
free usage - must pay a
subscription fee to get extra
• People you have shared folders
with can remove files by mistake
File sharing - • Sharing files via any kind of
Email emailing platform + software
attachments
Advantages • Inexpensive way to transfer files
• Relatively fast method
Disadvantages • Not suitable for large files
• Some email systems block certain
file extensions
• Not always secure on the number
if recipients
File sharing - File • A protocol used for the transfer
transfer protocol of files between remote computers
without an internet connection
• Files are uploaded to an ftp server
or downloaded from an ftp server
• Cloud storage services have largely
taken over this function for most
users
Grid computing • Resources of different computers
are shared and used at the same
time to solve a single problem -
increases the total processing
power
• Used for scientific or technical
applications that require large
Module 2.1 Page 4
applications that require large
amounts of data to be processed
or high processing power
Examples • A scientist can use an entire
network of computers to analyses
data
• A businessman can access an entire
network of computers to forecast
the growth of particular stock
Advantages • Cost effective solution with the
ability to use many resources
• Provides a method to solve
problems that need a lot of
processing power
• Saves money and resources by
using the power of idle computers
Disadvantages • A fast network connection
between the computers and
network is necessary
• The computers that are used may
not be fast enough or might be
slowed down
• The computers may be affected by
malware infections
Government • Renewal of tv licenses
internet services • Election information accessed
online
• UIF + tax details added and
updated
• Telephone accounts and call logs
• Passports and ID documents
Advantages • Better communication between
government depts and citizen
• Access to services anytime
anywhere any place
• Immediate feedback
Obstacles • The digital divide
• The initial cost to develop these
sites
• Concerns about the security +
privacy and use of information
• Blame technology for what might
actually be a human error
Module 2.1 Page 5
M O D U L E 2.2
Sunday, May 7, 2023 1:05 PM
TECHNIQUES AND TOOLS FOR CYBER CRIME
Social engineering
○ Any attempt to manipulate or con someone I to giving out confidential
information which can be used to impersonate them to install malware
Malware
○ Any software that is written with negative intentions
Phishing
○ It refers to attempts from people to con the user into giving out confidential
details such as pin numbers + passwords by posing as legitimate organization
usually via email
Pharming
○ Scamming practice where user is redirected to another fake website even when
the user types in a valid URL in their browser. A criminal can use any data
inputted by the user
Click - Jacking
○ An attack where a site appears to one thing but your clicks are redirected to do
something else
Spoofing
○ E-mail spoofing is the forgery of an email header so that the email appears to be
from a different origin or person
Spyware
○ Technique or software that tries to monitor and track the way you use your
computer and then reports this information to a third party
Keylogger
○ Kind of spy that records your keystrokes + movements of your mouse +
screenshots of what is displayed in your screen as you type in an attempt to
discover your usernames and passwords
Computer Virus
○ Malware written to disrupt the normal functioning of a person's computer
without their knowledge or consent.
○ Used to turn your computer into a bot to spread malware or to create security
loopholes for other programs to exploit
Computer worm
○ A computer worm is malware that is able to distribute itself over a network
normally via email =, without a person having an infected program
Trojan
Type of malware which is a destructive program disguised as a useful application.
Module 2.2 Page 6
○ Type of malware which is a destructive program disguised as a useful application.
Could delete files on your computer + scan your computer for personal
information
○ They rely on you to activate them
Ransomware
○ Malware that encrypts data until you pay a ransom fee
Adware
○ Software that downloads onto your computer and bombards your computer with
adverts that pop-up whenever you are connected to the internet
Bots
○ A computer that has been compromised and can be controlled remotely when it
is on and connected to the internet. Also called a zombie
CATEGORIES OF COMPUTER CRIME
Harassment
○ Cyberstalking
○ Spam = unwanted and sometimes embarrassing adverts through email
○ Uploading unauthorized pictures on the web
○ Cyberbullying
Internet Attacks
○ Attacks on businesses
○ Attacks on websites
○ Cyberterrorism
○ Denial of service
Computers + theft
○ Bandwidth
○ Identity theft
○ Processing time and power
○ Data/intellectual property
○ Money
○ Copyrighted material
Protecting yourself against computer crime
○ Software to help computer
▪ Anti-virus software - Software that scans files for different types of
malware
▪ Uses signatures and definitions to detect the signs of specific traces that
a specific type of malware leaves in your system
○ Precautions
▪ Be careful when installing free software from the internet as there might
be malware
▪ Have good password policies\
▪ Check that e-banking and e-commerce sited that you use starts with
https://
What not to do on the internet
Module 2.2 Page 7
What not to do on the internet
○ Do not give out personal information
○ Do not click on links in pop-ups and do not click on popup windows
○ Do not click on links in phishing emails or in other types of email scams
○ Do not open attachments
○ Do not perform financial transactions on public computers
Access vs privacy
○ If your workplace has computer usage policy you have accepted other people
might have access to your files
○ If you work on someone else's computer they can claim access to your data files
○ Free online services can use your data as adverts
○ Online services such as Facebook own everything you post to the site
PARANOID ABC
○ A - assume nothing
○ B - believe no one
○ C - check everything
Module 2.2 Page 8
M O D U L E 2.3
Friday, May 12, 2023 1:31 PM
• Strengths and advantages of digital communication
○ Easy to communicate digitally
○ Connect and communicate worldwide
○ Used where you are on multiple devices
○ Faster than conventional methods\
• Weaknesses + Disadvantages
○ Depends on internet coverage and internet speed
○ Require other people to be connected digitally
○ Relatively expensive equipment and high data costs in SA
• Good Practices
○ Keep time zones in mind
○ Keep differences in bandwidth in mind
○ Digital communications are largely impersonal and faceless
○ You are not able to undo something you have said
USE OF DIGITAL COMMUNICATIONS
• E - mail
○ Composing + sending of mess gases electronically over a network
including the internet
○ Gmail + Outlook have a calendar , contact list, task list and
archive features to help you to be organized
• E - mail Calendar
○ Reminders about events + appointments
○ Sync the dates with you mobile device
○ You can access your schedule wherever you are
• E - mail Tasks
○ Add tasks to a to-do list
○ Assign a due date
• E - mail contact list
○ Address book or contact list
○ Contacts can be organized into groups
○ It can be configured to automatically add email address to the
list when you use them
• E - mail Archiving
○ Tidy up inbox by moving messages from inbox to an archive
folder without deleting them
MODULE 2.3 Page 9
• Social networking sites
○ Stay in touch and communicate with others all over the world
○ Advertise and market products or services
○ Network with people with similar interests
• Blogs + vlogs
○ Web blogs are websites that are updated often with news and
events in chronological or sequential order
○ Form of blog which uses video as the medium
Publishing a blog
○ Website that allow you to create an account, set up your blog
and host your blog
▪ Word press + Blogger + Type pad + Weebly
○ Create an account on the website of a blog provider
▪ Decide a name
▪ Choose your theme and first post ideas
▪ Save draft of the post until you have completed the post
• Podcasts
○ Audio File
○ Can be downloaded individually
○ Can be produced by professionals or amateurs
○ Video podcast includes video clips or photos
▪ Can be used to download radio shows
▪ For educational purposes
▪ For tourists and visitors
• Wikis
○ Allows for the collaborative and creating of the content of web
pages
○ Take the form of a web page and access to them is usually free
○ How can be they
▪ Creating company intranets
▪ Creating community websites
▪ Creating reference sites
• GPS technology
○ Smartphones + cameras and other devices have GPS facilities
○ Some Businesses send out unique advertising to their customers
as they enter the vicinity
• Web browser
○ An application that allows you to navigate view and interact with
content on the web
▪ Fire Fox + Google chrome + Microsoft Edge
• Pop-up blocker
○ Is a small web browser window that appears on top of the
website you are viewing . Usually created by advertisers and
MODULE 2.3 Page 10
website you are viewing . Usually created by advertisers and
often open as soon as you visit a website
• Blocking of websites
○ Reasons for blocking websites
▪ Avoid phishing
▪ Prevent further targeting by spammers
▪ Parental access
• Caching
○ Web browsers temporarily store web documents such as HTML
pages + images on disk + caching
○ To reduce bandwidth usage and to allow previously visited web
pages to load quicker
• Browser plug - ins
○ Web pages sometimes contains specialized content
○ Plug - in is usually free
○ Increasingly browsers that have the capacity to display
specialized content
• Browser add-ons
○ Are useful hard party apps that can be downloaded to extend
the functionally of a browser beyond browsing
MODULE 2.3 Page 11
M O D U L E 2.4
Sunday, May 14, 2023 2:49 PM
The impact of technology on the global community
➢ People communicate on a global scale
➢ Work + businesses and competition take place on a a global scale
➢ Telecommuting is possible
➢ Computer fraud can take place
How to cope with information overload
➢ Learn to read quickly and accurately, identify the key points
➢ Learn to analyze and compare sources
➢ Take a disciplined and structured approach
○ Limit time spent on dealing with information
○ Filter email into categories
○ Use search tools properly
Social networking services
➢ They are free
➢ They need users to register them
➢ They encourage people to get other people to join
⚫ Twitter
○ Microblogging service
○ Twitter allows people to send messages to their followers
⚫ Facebook
○ Free service that allows people to connect and to keep up to date wish
friends and family
○ Users can also set up or join user groups
⚫ Virtual communities
○ When a website is focused on serving the needs of people with a specific
shared interest it helps to create a virtual community
⚫ Kickstarter + IndieGoGo
○ You can produce an idea for a product
○ You create a presentation
○ You can work out a business plan
How technology can benefit or harm society
MODULE 2.4 Page 12
⚫ Employment
○ New entrepreneurial opportunities and jobs are created by the IT sector
○ Job losses and unemployment of computer automation and outsourcing
⚫ Education
○ ICT improves Access to information + resources
○ Higher education requirements + digital divide
⚫ Culture + Languages
○ People are better able to record and communicate things that reflect
their own culture so culture can be preserved or shared with the world
⚫ Individual connectedness
○ People are able to connect with others around the world
○ Connectedness is virtual + not real
MODULE 2.4 Page 13
NETWORKS
Sunday, May 14, 2023 4:00 PM
• HAN - HOME AREA NETWORK
○ Used for communication among digital devices within a home
○ Allows for various devices to connect and share information with each
other
• WAN - WIDE ARE NETWORK
○ Type of computer network that spans a large geographic area such as
country + continent or even the whole world
○ Connection of smaller area networks such as LANs
○ Fiber optic cables
• PAN - PERSONAL AREA NETWORK
○ Type of network used for communication among personal devices within a
short range.
○ Exchange of data without cables
• Bandwidth VS Broadband
○ Band is the amount of data that can be transmitted through a network
connection in a given time measured in bps
○ Broad is the hight speed internet connection that can transmit large
amounts of data simultaneously
○ Band is used to transmit data
○ Broad refers to a specific type of band that uses a wide range of
frequencies to transmit data
○ Band is any type of connection
○ Broad is a wired connection
○ Band is available everywhere
○ Broad is only available in urban and suburban areas only
• ADSL VS CELLULAR
○ Is a type of wired broadband internet connection that use traditional
copper telephone lines
○ Cellular usese wireless technology
○ ADSL is typically faster depending on plan and location
○ Cellular speed depends on the coverage area and siganl strenght
○ ADSL is more reliable than cellular internet since it is a wired connection
and is not affected by weather or enviromental factors
○ Cellular can be affected by signal interference + network congestion +
weather conditions
○ ADSL is typically only available with access to traditional copper telephone
lines whuich may limit availability in certain rural or remote areas
○ Cellular is widely available
○ ADSL is more affordable and cellular is more expensive
EXTRA MODULE 2 Page 14