Gee 11 Midterm
Gee 11 Midterm
Gee 11 Midterm
Cyber threats can originate from any individuals whose goal is to steal data or cause
damage to computer systems.
• Social Engineering Attacks: These threats involve tricking and manipulating individuals
to provide entry for malware. The effect of this is that the victim may unknowingly provide
sensitive information, such as passwords. The main types of social engineering attacks
are phishing, baiting, pretexting, vishing, smishing, piggybacking, and tailgating.
• Supply Chain Attacks: This type of attack is considered severe because it is used to
infect legitimate applications .The software vendor may not be aware that its
applications or updates are infected with malware.
• Denial-of-Service Attack: This attack can hinder the ability of a system to function
normally by overwhelming it with a large volume of traffic. Some techniques include
HTTP flood DDoS and SYN flood DDoS.
• Injection Attacks: This type of attack can insert malicious input directly into a web
application, potentially exposing sensitive information. An example of this is Cross-Site
Scripting (XSS).
• Malicious Insider Threats: Attackers can infiltrate the network through the data sharing
of employees who have access to vital systems. Insider threats are challenging to
identify because they can manipulate their actions to appear genuine.
• Missing or Poor Data Encryption: Weak encryption can lead to the exposure of
misleading information on a server. Attackers can intercept system communications.
• Zero-Day Vulnerabilities: These are flaws in software that attackers are aware of but
that users have not yet identified. Attackers may use this advantage to infiltrate systems
while the vulnerabilities remain unknown.
Data privacy focuses on who has access to certain data, which is often controlled by the user. In
contrast, data protection refers to the responsibility of the company that holds your data to ensure that it
remains private. Data privacy defines the policies that data protection tools and processes employ.
Data Privacy
is a guideline for how data should be collected and handled. This applies to all sensitive
information that the company manages. Such information plays a vital role in business
operations, development, and finances. Data privacy ensures that sensitive data is only
accessible to approved parties, typically controlled by the user or customer.
Data Protection
signifies the strategic and procedural steps that organizations take to protect the
sensitive data they collect and process, as well as to prevent its loss. Additionally, the goal of
data protection is to ensure that information remains accessible and reliable while maintaining
its protection.
• Data Availability: Ensuring users can access and use the data required to perform
business functions, even when this data is lost or damaged.
• Data Lifecycle Management: Involves automating the transmission of critical data
to offline and online storage.
• Information Lifecycle Management: Involves the valuation, cataloging, and
protection of information assets from various sources
• Data Privacy and Protection Laws: Compliance with laws like GDPR and CCPA to
safeguard personal data.
• Intellectual Property (IP) Protection: Prevent unauthorized access and ensure IP rights
are respected
• Ethical Hacking: Ethical hackers must have permission; unauthorized hacking is illegal.
• Surveillance and Monitoring: Balance security with privacy rights and inform
individuals.
• Incident Reporting Obligations: Timely reporting of data breaches is required by
regulations.
• Cybercrime Legislation: Laws exist to combat hacking, identity theft, and other
cybercrimes.
The following are the key cybersecurity laws and regulations in the Philippines:
RA No. 10175
also known as the Cybercrime Prevention Act of 2012, enacted of September 12, 2012, is a
piece of legislation in the Philippines that addresses cybercrime and promotes cybersecurity within the
country.
Any person found guilty Section 4(c)(2) penalty to be imposed shall be one (1) degree
ADVANTAGES
• Cybersecurity Enhancement:
• Protection of Individuals:
• Legal Framework
ISSUE
• Privacy Concerns
IT AND SOCIETY
The digital divide refers to the gap in access, use, and skills related to information and
communication technologies (ICT). It extends beyond mere connectivity and encompasses
disparities in digital literacy, accessibility of devices, and ability to leverage technology
effectively.
Technology in education extends beyond online classes to include gamified learning, AI-driven
personalization, immersive virtual reality (VR) environments, and data analytics for tracking student
progress.
INNOVATIONS IN E-LEARNING
• Massive Open Online Courses (MOOCs) : Platforms like edX and Coursera democratize
education, offering access to courses from top institutions. This challenges traditional
education models by emphasizing lifelong learning and flexibility.
• Virtual Classrooms and Collaboration Tools : Microsoft Teams, Google Classroom,
and Edmodo enable real-time collaboration and enhance accessibility for student with
special needs.
• AI in Education : Adaptive learning systems like DreamBox and Khan Academy
personalize lessons based on individual learning speeds and styles, increasing retention
rates.
OPPORTUNITIES
Digital tools promote inclusivity, allowing students from diverse backgrounds to engage. They also
support teacher-student interactions and provide global exposure.
CHALLENGES
Data privacy, digital fatigue, and inequality in access are ongoing issues. Schools in lower-income
countries, for example, may lack the resources for equitable online learning experiences.
IMPACT OF IT ON CULTURE AND SOCIAL INTERACTIONSIMPACT OF IT ON CULTURE AND SOCIAL
INTERACTIONS
• Digital Communication Platforms : The rise of platforms like WhatsApp, Instagram, and
Twitter has reshaped social norms, values, and behaviors. Global communication and
instant information exchange have expanded social circles and cultural exchange.
• POSITIVES :
o Increased awareness of global issues
o greater connectivity,
o opportunities for self- expression,
o democratization of information.
• NEGATIVES :
o Cyberbullying
o spread of misinformation
o polarization due to echo chambers
o mental health impacts from social media overuse
• Emergence of Digital Communities : From niche forums to large social media groups,
digital communities allow individuals to connect over shared interests, identities, and
goals. These platforms offer new forms of support and activism but also challenge
traditional notions of identity and privacy.
EMERGING TECHNOLOGIES
Emerging technology is a term generally used to describe a new technology, but it may also refer
to the continuing development of an existing technology; it can have slightly different meaning when used
in different areas, such as media, business, science, or education.
Artificial Intelligence is the field of developing computers and robots that are capable of
behaving in ways that both mimic and go beyond human capabilities. AI-enabled programs can analyze
and contextualize data to provide information or automatically trigger actions without human
interference.
• Narrow AI: Also known as Weak AI, this system is designed to carry out one
particular job. Weak AI systems include video games like personal assistants
like Amazon's Alexa and Apple's Siri.
• General AI: This type includes strong artificial intelligence systems that carry on
the tasks considered to be human-like. They tend to be more complex and
complicated and can be found in applications like self-driving cars or hospital
operating rooms.
4 KINDS OF AI
• Reactive machines perceive the world in front of them and react. They can
carry out specific commands and requests, but they cannot store memory or
rely on past experiences to inform their decision making in real time. This makes
reactive machines useful for completing a limited number of specialized duties.
Examples include Netflix’s recommendation engine and IBM’s Deep Blue (used
to play chess).
• Limited memory AI has the ability to store previous data and predictions when
gathering information and making decisions. Essentially, it looks into the past
for clues to predict what may come next. Limited memory AI is created when a
team continuously trains a model in how to analyze and utilize new data, or an
AI environment is built so models can be automatically trained and renewed.
Examples include ChatGPT and self-driving cars.
• Theory of mind is a type of AI that does not actually exist yet, but it describes
the idea of an AI system that can perceive and understand human emotions,
and then use that information to predict future actions and make decisions on
its own.
BENEFITS
DISADVANTAGES
• Job Displacement
• Bias and Discrimination
• Hallucinations
• Privacy Concerns
• Ethical Concerns
• Environmental Costs
APPLICATIONS
• Healthcare
• Retail
• Customer Service
• Manufacturing
• Finance
• Marketing
• Gaming
• Military
EXAMPLES
• Generative AI Tools
• Smart Assistants
• Self-Driving Cars
• Wearables
• Visual Filters
MACHINE LEARNING (ML)
Machine learning is the science of teaching computers to learn from data and make decisions
without being explicitly programmed to do so.
Deep learning, a subset of machine learning, uses sophisticated neural networks to perform
what is essentially an advanced form of predictive analytics.
SUPERVISED LEARNING : trains models on labeled data sets, enabling them to accurately
recognize patterns, predict outcomes or classify new data.
UNSUPERVISED LEARNING : trains models to sort through unlabeled data sets to find
underlying relationships or clusters.
BENEFITS
RISKS
• Job layoffs
• Lack of human element
• Ingrained biases
ML APPLICATIONS
• Speech recognition
• Customer service
• Computer vision
• Recommendation engines
• Robotic process automation (RPA)
• Automated stock trading
• Fraud detection
BIG DATA
Big data refers to extremely large and complex data sets that cannot be easily managed or
analyzed with traditional data processing tools, particularly spreadsheets. Big data includes structured
data, like an inventory database or list of financial transactions; unstructured data, such as social posts
or videos; and mixed data sets, like those used to train large language models for AI.
• Volume
• Velocity
• Variety
• Veracity
• Value
BENEFITS
• Better insights
• Decision-making
• Personalized customer experiences
• Improved operational efficiency.
USE CASES
DATA ANALYTICS
Data analytics is the process of collecting, transforming, and organizing data in order to draw
conclusions, make predictions, and drive informed decision making. It can be used by different entities,
such as businesses, to optimize their performance and maximize their profits. This is done by using
software and other tools to gather and analyze raw data.
• Descriptive analytics
• Diagnostic analytics
• Predictive analytics
• Prescriptive analytics
• Gathering Data
• Data Management
• Statistical Analysis
• Data Presentation
BLOCKCHAIN TECHNOLOGY
In a blockchain system, fraud and data tampering are prevented because data can’t be altered
without the permission of a quorum of the parties. If someone tries to alter data, all participants will be
alerted and will know who make the attempt.
BENEFITS
• More Security
• Improved Accuracy
• Higher Efficiency
CHALLENGES
• Transaction Limitations
• Energy Consumption
• Scalability Issues
• Regulation Concerns
CRYPTOCURRENCIES
Cryptocurrency is a digital payment system that doesn't rely on banks to verify transactions. It’s
a peer-to-peer system that can enable anyone anywhere to send and receive payments. Instead of being
physical money carried around and exchanged in the real world, cryptocurrency payments exist purely as
digital entries to an online database describing specific transactions. When you transfer cryptocurrency
funds, the transactions are recorded in a public ledger. Cryptocurrency is stored in digital wallets.
ADVANTAGES
DISADVANTAGES
FINTECH
Financial Technology refers to the use of technology and innovation to improve, automate, and
enhance the delivery of financial services. It encompasses a wide range of applications, from digital
banking and mobile payments to cryptocurrencies, decentralized finance (DeFi), robo-advisors, and
blockchain. Fintech aims to make financial transactions more accessible, secure, and efficient for
consumers and businesses alike.
• Robo-advisors are apps or online platforms that optimally invest your money
automatically, often for little cost, and are accessible to ordinary individuals.
• Investment apps like Robinhood make it easy to buy and sell stocks, exchange-traded
funds (ETFs), and cryptocurrency from your mobile device, often with little or no
commission.
• Payment apps like PayPal, Venmo, Block (Square), Zelle, and Cash App make it easy to
pay individuals or businesses online and in an instant.
• Personal finance apps such as Mint, YNAB, and Quicken Simplifi let you see all of your
finances in one place, set budgets, pay bills, and so on.
• Crypto apps, including wallets, exchanges, and payment applications, allow you to hold
and transact in cryptocurrencies and digital tokens like Bitcoin and non- fungible tokens
(NFTs).