group i ict state junior high school 1 bantul 2010/2011

37
Group I ICT State Junior High School 1 Bantul 2010/2011

Upload: edgar-armstrong

Post on 23-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Group I ICT State Junior High School 1 Bantul 2010/2011

Group IICT

State Junior High School 1 Bantul 2010/2011

Page 2: Group I ICT State Junior High School 1 Bantul 2010/2011

Member of group 1

• Bazfa Azzah Zhorifah (08)• Ivan Fata A (18)• Nastiti Dwi Setiyani (24)• Mayszea Prawika Firdausya (22)

Page 3: Group I ICT State Junior High School 1 Bantul 2010/2011

Internet

Page 4: Group I ICT State Junior High School 1 Bantul 2010/2011

 Information

Services

Page 5: Group I ICT State Junior High School 1 Bantul 2010/2011

Competency StandardsUsing the Internet to obtain information.

Basic CompetenceAccessing some sites to obtain useful

information.

Page 6: Group I ICT State Junior High School 1 Bantul 2010/2011

Machine Tracking Information Managing Information from the Internet

Downloading Files Copy and Paste

Computer Virus and InternetCybercrime and Data Security

EXIT

Page 7: Group I ICT State Junior High School 1 Bantul 2010/2011

A. Machine Tracking Information

The address on the internet the amount of hundreds of millions. Several large companies have made search engine to help Internet users find the address / information. Using search engines helps Internet users to find information easily.

Page 8: Group I ICT State Junior High School 1 Bantul 2010/2011

1. Google

Google was founded by Larry Page & Sergey Brin. Google has been using web search technology, image, google news, google groups, google maps and more.

In August 2007, google is a search engine on the web is most often used with a market share of 53.6 %.

www.google.com

Page 9: Group I ICT State Junior High School 1 Bantul 2010/2011

2. Yahoo

Yahoo pioneered by Jerry Yang and David Filo in January 1994. Yahoo provides internet services globally. Yahoo is famous for its web portal, Yahoo search, Yahoo directory, Yahoo mail, news, advertising, Yahoo maps, and social media websites and services.

www.yahoo.com

Page 10: Group I ICT State Junior High School 1 Bantul 2010/2011

3. Altavista AtaVista is

a web search engine owned by Yahoo. AltaVista was once one of the most populat search engines but it’s popularity declined with the rise of Google. Yahoo plans on discontiniuing AltaVista, as it is underperforming.

www.altavista.com

Page 11: Group I ICT State Junior High School 1 Bantul 2010/2011

4. Lycos Lycos is a

search engine and web portal establised in 1994. Lycos also encompasses a network of email, webhosting, social networking and entertainment websites.

Lycos began as a research project by Michael Loren Mauldin of Carnegei Mellon University in 1994.

www.lycos.com

Page 12: Group I ICT State Junior High School 1 Bantul 2010/2011

B. Managing Information from the Internet

Page 13: Group I ICT State Junior High School 1 Bantul 2010/2011

1. Open a web page

• Pick a web page• Right-click on the

text link from the website On the menu that appears, click Open

Page 14: Group I ICT State Junior High School 1 Bantul 2010/2011

2. Saving web pages

With Mozilla Firefox: Click menu File -

> Save Page As ... Dialog box will

appear "Save As" -> Save. This web page is stored.

Page 15: Group I ICT State Junior High School 1 Bantul 2010/2011

3. Storing images on the Web

Right click the image that is in store.

Click Save this image. Save Picture dialog box appea

rs. Write the name of a stored

image-> Save

Page 16: Group I ICT State Junior High School 1 Bantul 2010/2011

4. Print a Web Page

Click the File menu -> Print -> choose the printer that is used and adjust the printing -> print.

Page 17: Group I ICT State Junior High School 1 Bantul 2010/2011

C. Downloading files

• Click the Open button. If we want to download the file, click the save button.

• Specify the name of the file to be downloaded.

• Click the Save button.• Wait until the download file is

complete.• Click the Open button to open

the downloaded file.

Page 18: Group I ICT State Junior High School 1 Bantul 2010/2011

D. Copy & Paste

• Activate web pages to be copied.• Block all text to be copied.• From the Edit menu, click Copy.• Launch Word and create a new

document.• In the Word window, from

the Edit menu click paste.• Keep the Word document.

Page 19: Group I ICT State Junior High School 1 Bantul 2010/2011

E. Cybercrime and Data Security

Computer crime / cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Net crime refers, more precisely, to criminal exploitation of the Internet.

Page 20: Group I ICT State Junior High School 1 Bantul 2010/2011

Characteristics of Cybercrime

In the development of conventional crime cbercrime is known as:

1. Blue collar crime 2. White  collar crime

Page 21: Group I ICT State Junior High School 1 Bantul 2010/2011

Unique characteristics of cybercrime

1. The scope of crime 2. The nature of the

crime 3. Perpetrators

of crime 4. Evil mode5. Types

of losses caused

Page 22: Group I ICT State Junior High School 1 Bantul 2010/2011

Classification Cybercrime

a. Cyber piracyThe use of computer

technology to reprint the software / information and then distribute the through computer technology.

b. Cyber trespassThe use of computer

technology to improve acces to the computer system of an organization or individual.

Page 23: Group I ICT State Junior High School 1 Bantul 2010/2011

c. Cyber vandalism The use computer

technology to create programs that disrupt to the process of electronic transmission and destroy computer data.

b. Estimated future development of cybercrime is expented to further increse along with technological development / globalization in the field of information and commnunication technology.

Page 24: Group I ICT State Junior High School 1 Bantul 2010/2011

Data and network securityWorking methods used by hackers and

crackers to infiltrate into a computer network:1. Spoofing

Form of intrusion by way of falsifying the identity of the user so that hackers could login to a computer network illegally.

2. ScannerUsing a program will automatically detect

the weakness of the security system of a computer network in a locak network or computer another network.

3. Sniffer Network an analyzer serves as a

monitoring network and networked for a computer.

Page 25: Group I ICT State Junior High School 1 Bantul 2010/2011

4. Password crackerThis program can open the

encrypted pass word. In addition, there is a password cracker that works by destroying the password security syatem.

5. Destructive devices The form of viruses are made to

destroy the data. To maintain data security when data is sent been stored in a computer network, then developed several techniques to secure data.

Page 26: Group I ICT State Junior High School 1 Bantul 2010/2011

Technical data security1. Internet Firewall serves

To prevent acces from outside parties to internal systems.

How it works:• Firewall filters

Filtering communication to occur only as needed, only certain app;ications that are allowed to pass and only a computer with a spesifict identity that can relate.

• Proxy FirewallAllowing users to acces the internet from

within the broadnest, but from the outside internet can only acces one specific computer.

Page 27: Group I ICT State Junior High School 1 Bantul 2010/2011

2.      KriptografiCrytogaphy is the art of encrypting data.

The data is sent encrypted before sent over the internet. On the desstination computer, the data is restored to its original form, so it canbe read and understood by the recipient.

The process that occur in cryptography:• Encryption process is to transform the original

data into code data. This happens sender computer, before the data is sent.

• Descryption process password is the process of restoring data to original data. This happened shortly after the data recipient computer received, so the recipient can understand the data sent.

Page 28: Group I ICT State Junior High School 1 Bantul 2010/2011

3. Secure Socket Layer (SSL)

Line data is transmitted over the internet through many transitions and controlled by many people. This causes the transmission of data over the internet prone by tapping. According to research, there is no computer network and data communications really safe. The technolohy is made only to reduce the rissks that might occur.

Page 29: Group I ICT State Junior High School 1 Bantul 2010/2011

F. Computer Virus and Internet

Computer viruses : a computer program that can duplicate / copy it self and spread by inserting copies of it self into other programs or documents.

Computer viruses can be analogous to a biological virus that spreads by inserting it self into living cells.

Page 30: Group I ICT State Junior High School 1 Bantul 2010/2011

The properties and characteristics of computer virus

• Very small compared to victims

• Having the ability to multiply• Require the

victim to stay alive• Requires a

certain medium to spread.

Page 31: Group I ICT State Junior High School 1 Bantul 2010/2011

The types of computer virus

• Worm - multiplies himself on the hard disk. This makes the computer resources will worm it becomes full.

• Trojan - Taking the data on infected computers and sends it to the Trojan maker itself.

• Backdoor - Almost the same with a Trojan. However, Backdoor usually resembles the files fine. For example games.

• Spyware - Virus that monitors the infected computer.

Page 32: Group I ICT State Junior High School 1 Bantul 2010/2011

• Rogue - a program that mimics the antivirus program and show antiviral activity as normal, and giving false warnings about the virus.

• Root kits - A virus that works like an ordinary computer system works.Polymorphic virus - A virus that likes to change so as not to be detected.

• Metamorphic viruses - viruses that change the encoding itself to be more difficult to detect.

• Mobile Viruses - A virus that runs on mobile phones and can cause various effects.

Page 33: Group I ICT State Junior High School 1 Bantul 2010/2011

How computer viruses work

Computer viruses generally can damage the computer software and can not directly damage the computer hardware but can cause damage by over-loading a program that forces the process to a specifict device.

Page 34: Group I ICT State Junior High School 1 Bantul 2010/2011

dNegative effects of computer

viruses is to multiply himself, which makes the computer resources to be reduced significantly viruses based on the Windows operating system. The remaining attacking Linux/GNU, Free BSD, OS/2IBM and Sun Operating system. Malihnant virus that will damage the hardware.

Page 35: Group I ICT State Junior High School 1 Bantul 2010/2011

How to cope with computer virusess

Using antivirus software. It can detect and remove computer viruses. Computer can be removed with databases, heuristics or ratings of the program it self.

Page 36: Group I ICT State Junior High School 1 Bantul 2010/2011

THANK YOUFOR YOUR ATTENDTION

Page 37: Group I ICT State Junior High School 1 Bantul 2010/2011

http://mapeltik9smp.blogspot.com/2011/01/search-engine-atau-mesin-pencari.htmlhttp://id.wikipedia.org/wiki/Googlehttp://id.wikipedia.org/wiki/Yahoohttp://en.wikipedia.org/wiki/AltaVistahttp://en.wikipedia.org/wiki/Lycoshttp://sekedar-tutorial.blogspot.com/2010/07/cara-menyimpan-halaman-web-atau.htmlhttp://annequeentina.blogspot.com/2008/11/mencari-dan-mengelola-informasi.htmlhttp://en.wikipedia.org/wiki/Cybercrimehttp://latifaulfah.blogspot.com/2010/02/pengertian-cybercrime.htmlhttp://creativityimages.blogspot.com/2010/04/bagaimana-menjaga-keamanan-kita-saat.htmlhttp://id.wikipedia.org/wiki/Virus_komputerhttp://mazrawul84.wordpress.com/2010/10/25/apa-yang-dimaksud-dengan-virus-komputer/