Lesson 1 najaidk ko vastu AaOr [msaana ko ilayao This dUr ko vastu AaOr [msaana ko ilayao That.
Mr. Ko Ko ICT for Sec 1 – Semester 2 2013. ICT for Sec 1 O Compulsory - Everybody must attend....
-
Upload
victor-leavey -
Category
Documents
-
view
216 -
download
1
Transcript of Mr. Ko Ko ICT for Sec 1 – Semester 2 2013. ICT for Sec 1 O Compulsory - Everybody must attend....
Mr. Ko KoICT for Sec 1 – Semester 2 2013
ICT for Sec 1O Compulsory - Everybody must attend. Part
of the curriculum.O Examinable - Will be graded and reflected
in the report book by the end of the semester.
O Assignment/Test - ICT consists of a few modules such as CyberWellness, FreeMind, Google Sketchup, etc. O Each module will have either a test or an
assignment.O Classroom Participation
AdministrationO Log in to the Computer
O Username: NRICO Password: **** (default password if you have not
changed it)O New Password: ****
O Log in to the Web PortalO Username: NRICO Password: ****
O Make sure you are able to access the school computer and the web portal by the end of the 1st lesson.
CyberWellness
What is CyberWellness?
AgendaO Intellectual PropertyO Social EngineeringO Cyber-Bullying
What is Intellectual Property (IP) ?
What is IP?O Intellectual Property (IP) refers
to the product of your mind or intellect.
O It can be an invention or innovation, special names and images used in trade, original designs or an expression of an idea.
O In Singapore, laws exist to protect such IP
Definition from IPOS Website www.ipos.gov.sg
Intellectual PropertyO PatentsO Trade MarksO Copyright
What is a Patent?
Patents IWhat is a patent?OA Patent is a monopoly right given by the Government to the owner of an invention to enable him to prevent others from using, copying or making the invention without his consent in the country in which he has obtained patent protection.
Patents IIWhat can be a patent?OCan be a product or a process that gives a new technical solution to a problem. OCan be a new method of doing things, the composition of a new product, or a technical improvement on how certain objects work.
Patents IIIHow long is a Patent?O20 years from the Date of Filing the patent application
Patents IVWhat are the benefits of a Patent?Oprevent others from exploiting the invention,Oraise funds for business, Olicense it to third parties for commercial returns or Osell the patented invention for a sum of money.
Patents V
What are the Criteria for a Product/Process to be a Patent?
O NewO Inventive StepO Industrial Application
Patents VI
Where to search for Singapore Patents?Owww.epatents.gov.sg (ePatents)
What is a Trade Mark?
Trade Marks I
What is a Trade Mark?OA Trade Mark is a sign used by a person in the course of business or trade to distinguish his goods or services from those of other traders.
Trade Marks IIWhat constitute a Trade Mark?OA registered trade mark has to be capable of being represented graphically. This sign can be any letter, word, name, signature, numeral, device, brand, heading, label, ticket, shape, colour, aspect of packaging or a combination of these.
Trade Marks IIIHow do you identify a registered trade mark?O® indicates that the mark is a registered trade mark and hence protected under the trade mark law. O™ is just a symbol used to indicate that the mark is being used by the company as a trade mark. It does not denote that the mark is registered nor protected under the trade mark law.
Trade Marks IVWhat are the benefits of using a trade mark?Omay use it to better protect market share (i.e. profits) by barring others from copying it; Omay license it to third parties for commercial returns (e.g. through a franchise); Omay sell the mark outright for a specified value (e.g. in a company acquisition); or Omay use the mark to raise equity for business undertakings.
What is a Copyright?
Copyright IWhat is copyright?OCopyright protects works like novels, computer programs, plays, sheet music and paintings.OGenerally, the author of a copyright work has the right to reproduce, publish, perform, communicate and adapt his work. These different exclusive rights form the bundle of rights that we call copyright. These rights enable a copyright owner to control the commercial exploitation of his work.
Copyright IIWhat are the works that can be protected by copyright?OCopyright protects literary, dramatic, musical and artistic works. OOther subject matter like films, sound recordings, broadcasts, cable programmes and published works are also protected under copyright.
Copyright IIIWhat are the subject matters not protected by copyright?Oideas or concepts (e.g. a new business idea or a concept for a new game show);Odiscoveries (e.g. a research finding that has not been known before);Oprocedures (e.g. the steps involved when applying for a travel visa);Omethods (e.g. the unique solution to a mathematical problem);Oworks or other subject matter that have not been made in a tangible form in a recording or writing (e.g. a speech or a dance that has not been written or recorded); Osubject matter which is not of original authorship (e.g. works which contain information in the public domain).
Copyright IVHow does copyright in Singapore works?OAn author automatically enjoys copyright protection as soon as he creates and expresses his work in a tangible form. ONo need to file for registration to get copyright protection.
Copyright VWhat is the copyright symbol ©?OA notice of a claim by the copyright owner that copyright exists. OIt does not give the copyright owner any substantive right and is therefore not crucial to the enjoyment of copyright protection.
Exercises on IPO Research on what is a Trade Secret.O Research on what is the different
between Trade Secret & Patent?O 1 table = 1 team (15 min)
O Each Team will then need to share with the class on their findings.
What is Social Engineering?
Social EngineeringWhat is social engineering?OThe art of manipulating people into performing actions or divulging confidential information.
OReference: http://en.wikipedia.org/wiki/Social_engineering_(security)
Real-life Samples
Real-life Samples
What is Phishing?
PhishingWhat is Phishing?OA technique of fraudulently obtaining private information. OTypically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN.
Real-life Samples
Real-life Samples
Real-life Samples
Exercises on Social Engineering
O Research on what are the other methods of social engineering besides those that are discussed in class?
O Research on how can we prevent being a victim of social engineering?
O 1 table = 1 team (15 min)
O Each Team will then need to share with the class on their findings.
Recommended Password
OAt least one Capital LetterOAt least one Small LetterOAt least one NumberOAt least one Special Character OMinimum 6 CharactersEg> wb#12?Mtg_
Password Length & Time to Crack
What is Cyber Bullying?
Cyber BullyingWhat is Cyber Bullying?OCyber bullying is a form of bullying which uses electronic devices such as computers and mobile phones. OIt involves the use of information and communication technology (ICT) such as internet and mobile phones to deliberately harm others.
OReference from http://www.damaisec.moe.edu.sg/cos/o.x?c=/wbn/pagetree&func=view&rid=1060991
Examples of Cyber Bullying
O Harrassment - Repeatedly sending offensive, rude and insulting messages
O Denigration - Sending/posting cruel gossip or rumors about a person online to damage his or her reputation
O Exclusion - Deliberately excluding a person from online activities such as a chat
Preventing Cyber Bullying
O Don’t send messages at angry moments When people are angry, they tend to pass insensitive/ rude remarks, which may results in flaming. (Flaming is the sending of repeated, aggressive messages through the Internet.)
O Be polite to others online Pupils should be reminded to respect others by being polite both online and offline. Rude online behaviour may encourage others to “flame” them.
Dealing with Cyber Bullying I
O Tell to an adult / talk to a trusted friendThis applies whether the pupil is a victim or witness of cyber bullying. Let them know that adults can help, e.g. parents can help to report the bullying to the school or the police. Let the pupils know they can approach form teacher or school counsellor for help. Also let the pupils know about the availability of some helplines in Singapore.
O SOS - http://www.samaritans.org.sg/
O 24-hour hotline at: 1800-221 4444
Dealing with Cyber Bullying II
O Don’t respond to a rude/ mean email or text messageOnline bullies get satisfaction when they succeed in getting the victim angry or upset. Remind pupils not to give cyber bullies that satisfaction!
Dealing with Cyber Bullying III
O Stay away from the phone, chat or email for a few daysThe bully may just get bored and stop! Besides pupils don’t have to be always online, they can engage in offline activities such as spend time with families and friends
Dealing with Cyber Bullying IV
O Report the bullying to the AuthoritiesMost websites allow user to report abuse, e.g. MSN and MySpace. Pupils will have to preserve the evidence to lodge the complaint. Just a note, it takes a lot of effort and time to get service providers to respond to the complaints.
Exercise on Cyber Bullying
OResearch on one of the following topic:1. Cyber bullying incidents2. Cyber Attacks and explain one.3. Social Engineering Attack4. How to prevent Phishing
O1 table = 1 team (15 min)
O Each Team will then need to share with the class on their findings.
Test on CyberWellness
O1A - 18 July 2013O1B - 22 July 2013O1C - 16 July 2013O1D - 29 July 2013O1E - 19 July 2013O1F - 16 July 2013