group i ict state junior high school 1 bantul 2010/2011
TRANSCRIPT
Group IICT
State Junior High School 1 Bantul 2010/2011
Member of group 1
• Bazfa Azzah Zhorifah (08)• Ivan Fata A (18)• Nastiti Dwi Setiyani (24)• Mayszea Prawika Firdausya (22)
Internet
Information
Services
Competency StandardsUsing the Internet to obtain information.
Basic CompetenceAccessing some sites to obtain useful
information.
Machine Tracking Information Managing Information from the Internet
Downloading Files Copy and Paste
Computer Virus and InternetCybercrime and Data Security
EXIT
A. Machine Tracking Information
The address on the internet the amount of hundreds of millions. Several large companies have made search engine to help Internet users find the address / information. Using search engines helps Internet users to find information easily.
1. Google
Google was founded by Larry Page & Sergey Brin. Google has been using web search technology, image, google news, google groups, google maps and more.
In August 2007, google is a search engine on the web is most often used with a market share of 53.6 %.
www.google.com
2. Yahoo
Yahoo pioneered by Jerry Yang and David Filo in January 1994. Yahoo provides internet services globally. Yahoo is famous for its web portal, Yahoo search, Yahoo directory, Yahoo mail, news, advertising, Yahoo maps, and social media websites and services.
www.yahoo.com
3. Altavista AtaVista is
a web search engine owned by Yahoo. AltaVista was once one of the most populat search engines but it’s popularity declined with the rise of Google. Yahoo plans on discontiniuing AltaVista, as it is underperforming.
www.altavista.com
4. Lycos Lycos is a
search engine and web portal establised in 1994. Lycos also encompasses a network of email, webhosting, social networking and entertainment websites.
Lycos began as a research project by Michael Loren Mauldin of Carnegei Mellon University in 1994.
www.lycos.com
B. Managing Information from the Internet
1. Open a web page
• Pick a web page• Right-click on the
text link from the website On the menu that appears, click Open
2. Saving web pages
With Mozilla Firefox: Click menu File -
> Save Page As ... Dialog box will
appear "Save As" -> Save. This web page is stored.
3. Storing images on the Web
Right click the image that is in store.
Click Save this image. Save Picture dialog box appea
rs. Write the name of a stored
image-> Save
4. Print a Web Page
Click the File menu -> Print -> choose the printer that is used and adjust the printing -> print.
C. Downloading files
• Click the Open button. If we want to download the file, click the save button.
• Specify the name of the file to be downloaded.
• Click the Save button.• Wait until the download file is
complete.• Click the Open button to open
the downloaded file.
D. Copy & Paste
• Activate web pages to be copied.• Block all text to be copied.• From the Edit menu, click Copy.• Launch Word and create a new
document.• In the Word window, from
the Edit menu click paste.• Keep the Word document.
E. Cybercrime and Data Security
Computer crime / cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Net crime refers, more precisely, to criminal exploitation of the Internet.
Characteristics of Cybercrime
In the development of conventional crime cbercrime is known as:
1. Blue collar crime 2. White collar crime
Unique characteristics of cybercrime
1. The scope of crime 2. The nature of the
crime 3. Perpetrators
of crime 4. Evil mode5. Types
of losses caused
Classification Cybercrime
a. Cyber piracyThe use of computer
technology to reprint the software / information and then distribute the through computer technology.
b. Cyber trespassThe use of computer
technology to improve acces to the computer system of an organization or individual.
c. Cyber vandalism The use computer
technology to create programs that disrupt to the process of electronic transmission and destroy computer data.
b. Estimated future development of cybercrime is expented to further increse along with technological development / globalization in the field of information and commnunication technology.
Data and network securityWorking methods used by hackers and
crackers to infiltrate into a computer network:1. Spoofing
Form of intrusion by way of falsifying the identity of the user so that hackers could login to a computer network illegally.
2. ScannerUsing a program will automatically detect
the weakness of the security system of a computer network in a locak network or computer another network.
3. Sniffer Network an analyzer serves as a
monitoring network and networked for a computer.
4. Password crackerThis program can open the
encrypted pass word. In addition, there is a password cracker that works by destroying the password security syatem.
5. Destructive devices The form of viruses are made to
destroy the data. To maintain data security when data is sent been stored in a computer network, then developed several techniques to secure data.
Technical data security1. Internet Firewall serves
To prevent acces from outside parties to internal systems.
How it works:• Firewall filters
Filtering communication to occur only as needed, only certain app;ications that are allowed to pass and only a computer with a spesifict identity that can relate.
• Proxy FirewallAllowing users to acces the internet from
within the broadnest, but from the outside internet can only acces one specific computer.
2. KriptografiCrytogaphy is the art of encrypting data.
The data is sent encrypted before sent over the internet. On the desstination computer, the data is restored to its original form, so it canbe read and understood by the recipient.
The process that occur in cryptography:• Encryption process is to transform the original
data into code data. This happens sender computer, before the data is sent.
• Descryption process password is the process of restoring data to original data. This happened shortly after the data recipient computer received, so the recipient can understand the data sent.
3. Secure Socket Layer (SSL)
Line data is transmitted over the internet through many transitions and controlled by many people. This causes the transmission of data over the internet prone by tapping. According to research, there is no computer network and data communications really safe. The technolohy is made only to reduce the rissks that might occur.
F. Computer Virus and Internet
Computer viruses : a computer program that can duplicate / copy it self and spread by inserting copies of it self into other programs or documents.
Computer viruses can be analogous to a biological virus that spreads by inserting it self into living cells.
The properties and characteristics of computer virus
• Very small compared to victims
• Having the ability to multiply• Require the
victim to stay alive• Requires a
certain medium to spread.
The types of computer virus
• Worm - multiplies himself on the hard disk. This makes the computer resources will worm it becomes full.
• Trojan - Taking the data on infected computers and sends it to the Trojan maker itself.
• Backdoor - Almost the same with a Trojan. However, Backdoor usually resembles the files fine. For example games.
• Spyware - Virus that monitors the infected computer.
• Rogue - a program that mimics the antivirus program and show antiviral activity as normal, and giving false warnings about the virus.
• Root kits - A virus that works like an ordinary computer system works.Polymorphic virus - A virus that likes to change so as not to be detected.
• Metamorphic viruses - viruses that change the encoding itself to be more difficult to detect.
• Mobile Viruses - A virus that runs on mobile phones and can cause various effects.
How computer viruses work
Computer viruses generally can damage the computer software and can not directly damage the computer hardware but can cause damage by over-loading a program that forces the process to a specifict device.
dNegative effects of computer
viruses is to multiply himself, which makes the computer resources to be reduced significantly viruses based on the Windows operating system. The remaining attacking Linux/GNU, Free BSD, OS/2IBM and Sun Operating system. Malihnant virus that will damage the hardware.
How to cope with computer virusess
Using antivirus software. It can detect and remove computer viruses. Computer can be removed with databases, heuristics or ratings of the program it self.
THANK YOUFOR YOUR ATTENDTION
http://mapeltik9smp.blogspot.com/2011/01/search-engine-atau-mesin-pencari.htmlhttp://id.wikipedia.org/wiki/Googlehttp://id.wikipedia.org/wiki/Yahoohttp://en.wikipedia.org/wiki/AltaVistahttp://en.wikipedia.org/wiki/Lycoshttp://sekedar-tutorial.blogspot.com/2010/07/cara-menyimpan-halaman-web-atau.htmlhttp://annequeentina.blogspot.com/2008/11/mencari-dan-mengelola-informasi.htmlhttp://en.wikipedia.org/wiki/Cybercrimehttp://latifaulfah.blogspot.com/2010/02/pengertian-cybercrime.htmlhttp://creativityimages.blogspot.com/2010/04/bagaimana-menjaga-keamanan-kita-saat.htmlhttp://id.wikipedia.org/wiki/Virus_komputerhttp://mazrawul84.wordpress.com/2010/10/25/apa-yang-dimaksud-dengan-virus-komputer/