Professional Documents
Culture Documents
tribute, regardless
such as mobile phones, telephone, internet, etc. to locate, save, of their technical knowledge.
send, and edit information.
Web 2.0 is pronounced web-two-point-o.
When we make a video call, we use the internet. When we send
a text or make a call, we use cellular networks. When we run out The meaning of the term Web 2.0 has evolved over time, but it
of load or battery, we use payphones which use a telephone has come include social media as a major component. Although
network. Having a unified way to communicate is one of the community has always been a part of the web, new web
goals of ICT. In terms of economics, ICT has saved companies a applications such as AJAX and more modern browsers began
lot of resources (time and money) with the kind of providing opportunities for people to express themselves online
communication technology they use, nowadays. In a similar way, as never before, and to combine applications to create a more
we spend less because of ICT. As it normally costs us a peso to integrated web. By 2005, the term Web 2.0 was well-established,
send a text message or SMS, with the internet, we can send and companies such as Google made huge strides to integrate
multiple messages and only be charged by a fraction. information online. For example, a website that reviews
restaurants may use social media, user-generated content,
Philippines is dub as the “ICT Hub of Asia.” photographs from Flickr, Google maps, and content from around
the web to create a more complete user experience.
Because of huge growth of ICT-related jobs, one of which is BPO
(Business Process Outsourcing) or call centers. To a certain extent, Web 2.0 is just an overused buzzword. On
the other hand, there is a genuine difference between the
Dub – to call brochure-ware websites in the early '90s versus the rich web apps
According to the 2013 edition of Measuring the Information of the modern web.
System Society by the International Telecommunication Union, Features of WEB 2.0
there are 106.8 cellphones per 100 Filipinos in the year 2012. that
would mean that for every 100 Filipinos you meet, there is a high 1. Folksonomy - allows users to categorize and classify/arrange
chance that they have a cellphone and approximately for the information using freely chosen keywords (e.g., tagging).
seven of them, the have two.
Popular social networking sites such as Twitter, Instgram,
In a data gathered by the Annual Survey of Philippine Business Facbook, etc. use tags that start with the pound sign (#). This is
and Industries, NSO, in 2010, the ICT industry shares 19.3% of also referred to as hashtag.
the total employment population here in the Philippines.
2. Rich User Experience - content is dynamic and is responsive
To add to these statistics, Time Magazine’s “The Selfiest Cities to user’s input. An example would be a website that shows local
around the World” of 2013 places two cities from the Philippines content.
in the top 1 and top 10 spots. The study was conducted using
Instagram, a popular photo application. In the case of social networking sites, when logged on, your
account is used to modify what you see in their website
The internet has been a vital tool to our modern lives that is why
it is also important to make the best of the internet. 3. User Participation - the owner of the website is not the on one
who is able to put content. Others are able to place a content of
When the World Wide Web was invented, most web pages were their own by means of comments, reviews, and evaluation. Some
static. Static (also known as flat page or stationary page) in the websites allow readers to comment on an article, participate in a
sense that the page is “as is” and cannot be manipulated by the poll, or review a specific product.
user. The content is also the same for all users. This is referred to
as Web 1.0 or the mostly read-only web. 4. Software as a Service - users will subscribe to a software only
when needed rather than purchasing them. This is a cheaper
However, the World Wide Web is more than just static pages. option if you do not always need to use a software.
Pretty soon, Web 2.0 came to the picture.
For instance, Google Docs is a free web-based application that
Web2.0 is the evolution of Web 1.0 by adding dynamic web allows the user to create and edit word processing and
pages – the user is able to see a website differently than others. spreadsheet documents online. When you need a software, like
Examples of Web 2.0 include social networking sites, blogs, Word Processor, you can purchase it for a one-time huge amount
wikis, video sharing sites, hosted services, and web applications. and install it in your computer and it is yours forever. Software
Web 2.0 allows users to interact with the page: instead of just as a service allows you to rent a software for a minimal fee.
reading a page, the user may be able to comment or create a user
account. Web 2.0 also allows users to use web browsers, instead 5. Mass Participation - diverse information sharing through
of just using their operating system. Browsers can now be used universal web access. Since most users can use the internet, web
for their user interface, application software (or web 2.0’s content is based on people from various cultures.
applications), even for file storage. Most websites that we visit
today are Web 2.0
Web 3.0 and the Semantic Web
Cyber criminals can be very patient when trying to discover - Blocking data
your offline identity.They'll casually slip it into conversation, - Modifying data
hoping that you won't notice. They remember everything you tell
them and might stick around for a long time trying to get you to - Copying data
slip up and reveal something.
- Disrupting the performance of computers or computer networks
The more personal information you reveal in cyberspace, the
Unlike computer viruses and worms, Trojans are not able to self-
more in danger you are putting yourself and your family in. You
replicate.
must always be on your guard, cyber defenders! Even the littlest
things that seem so harmless can be dangerous to share over time. Spyware is a type of malware that's hard to detect. It collects
information about your surfing habits, browsing history, or
personal information (such as credit card numbers), and often
uses the Internet to pass this information along to third parties
Internet is defined as the information superhighway.
without you knowing. Keyloggers are a type of spyware that
This means that anyone has access to this highway, can place monitors your keystrokes.
information, and can grab that information. Any information,
even things that you have set privately, can be accessed one way
or another. This is why facebook continue to improve their Keyloggers – used to record the keystroke done by the users. This
security features. The threat of cybercrime is very real. While you is done to steal their password or any other sensitive information.
may not experience the threat now, whatever information we It can record email, messages, or any information you type using
share today could affect our future. your keyboard.
Worms can spread through email attachments, instant messaging Adware is the name given to programs that are designed to
programs, file-sharing programs, social networking sites, display advertisements on your computer, redirect your search
network shares, removable drives, and software vulnerabilities. requests to advertising websites and collect marketing-type data
about you – for example, the types of websites that you visit – so
A Trojan horse or Trojan is a type of malware that is often that customised adverts can be displayed.
disguised as legitimate software. Trojans can be employed by
cyber-thieves and hackers trying to gain access to users' systems. Adware – that collects data with your consent – should not be
Users are typically tricked by some form of social engineering confused with Trojanspyware programs that collect information,
into loading and executing Trojans on their systems. Once without your permission. If Adware does not notify you that it is
gathering information, it is regarded as malicious – for example, Activity 2
malware that uses Trojan-Spy behaviour.
Community Problem: ___________________________
Vicinity: _____________________________________
Campaign Name: ______________________________
There are two main ways in which Adware can get onto your Type of Social Media Used: ______________________
computer: Website Used: ________________________________
Via freeware or shareware What will be the content of your social media site?
Adware can be included within some freeware or shareware
programs – as a legitimate way of generating advertising ___________________________________________________
revenues that help to fund the development and distribution of the ___________________________________________________
freeware or shareware program. ___________________________________________________
___________________________________________________
Infected websites ___________________________________________________
A visit to an infected website can result in unauthorised ___________________________________________________
installation of Adware on your machine. Hacker technologies are ___________________________________________________
often used. For instance, your computer can be penetrated via a ___________________________________________________
browser vulnerability, and Trojans that are designed for stealthy ___________________________________________________
installation can be used. Adware programs that work in this way ___________________________________________________
are often called Browser Hijackers. ___________________________________________________
b. Spam is the electronic equivalent of the ‘junk mail’ that arrives ___________________________________________________
on your doormat or in your postbox. However, spam is more than ___________________________________________________
just annoying. It can be dangerous – especially if it’s part of a ___________________________________________________
phishing scam. ___________________________________________________
___________________________________________________
Spam emails are sent out in mass quantities by spammers ___________________________________________________
and cybercriminals that are looking to do one or more of the
following: Why did you choose that type of social media?
Make money from the small percentage of recipients that actually ___________________________________________________
respond to the message ___________________________________________________
___________________________________________________
Run phishing scams – in order to obtain passwords, credit card ___________________________________________________
numbers, bank account details and more ___________________________________________________
___________________________________________________
Spread malicious code onto recipients’ computers
___________________________________________________
c. Phishing This is done by sending you an email that will direct ___________________________________________________
the user to visit a website and be asked to update his/her ___________________________________________________
username, password, credit card, or personal information. ___________________________________________________
___________________________________________________
Pharming – a more complicated way of phishing where it exploits ___________________________________________________
the DNS (Domain Name Service) system. ___________________________________________________
___________________________________________________
Phishing is a type of Internet fraud that seeks to acquire a user’s
___________________________________________________
credentials by deception. It includes theft of passwords, credit
___________________________________________________
card numbers, bank account details and other confidential
information. Why did you choose that website?
Phishing messages usually take the form of fake notifications ___________________________________________________
from banks, providers, e-pay systems and other organizations. ___________________________________________________
The notification will try to encourage a recipient, for one reason ___________________________________________________
or another, to urgently enter/update their personal data. Such ___________________________________________________
excuses usually relate to loss of data, system breakdown, etc. ___________________________________________________
___________________________________________________
Phishing attacks are becoming more advanced in their
___________________________________________________
exploitation of social engineering techniques. In most cases,
___________________________________________________
fraudsters try to frighten a recipient by providing a seemingly
___________________________________________________
important reason that the recipient should divulge their personal
___________________________________________________
data. Such messages usually contain threats to block an account
___________________________________________________
if a recipient does not fulfill the requirements therein. For
___________________________________________________
instance, “if you do not provide your personal data by the end of
___________________________________________________
the week, your account will be blocked”. Ironically, it is not
___________________________________________________
unknown for phishers to make reference to the necessity of
___________________________________________________
improving anti-phishing systems as one of the reasons for the
___________________________________________________
disclosure of confidential information. A typical ruse might be “if
___________________________________________________
you want to secure yourself against phishing, click the link and
enter your user name and password”.
4. Copyright