370 likes | 521 Views
Group I. ICT State Junior High School 1 Bantul 2010/2011. Member of group 1. Bazfa Azzah Zhorifah (08) Ivan Fata A (18) Nastiti Dwi Setiyani (24) Mayszea Prawika Firdausya (22). Internet. Information Services. Competency Standards Using the Internet to obtain information .
E N D
Group I ICT State Junior High School 1 Bantul 2010/2011
Member of group 1 • Bazfa Azzah Zhorifah (08) • Ivan Fata A (18) • Nastiti Dwi Setiyani (24) • Mayszea Prawika Firdausya (22)
Competency StandardsUsing the Internet to obtain information. Basic CompetenceAccessing some sites to obtain useful information.
Machine Tracking Information Managing Information from the Internet Downloading Files Copy and Paste Cybercrime and Data Security Computer Virus and Internet EXIT
A. Machine Tracking Information The address on the internet the amount of hundreds of millions.Several largecompanies have made search engine to help Internet users find the address /information. Using search engines helps Internet users to find information easily.
1. Google Google was founded by Larry Page & Sergey Brin. Google has been using web search technology, image, google news, google groups, google maps and more. In August 2007, google is a search engine on the web is most often used with a market share of 53.6 %. www.google.com
2. Yahoo Yahoo pioneered by Jerry Yang and David Filo in January 1994. Yahoo provides internet services globally. Yahoo is famous for its web portal, Yahoo search, Yahoo directory, Yahoo mail, news, advertising, Yahoo maps, and social media websites and services. www.yahoo.com
3. Altavista AtaVista is a web search engine owned by Yahoo. AltaVista was once one of the most populat search engines but it’s popularity declined with the rise of Google. Yahoo plans on discontiniuing AltaVista, as it is underperforming. www.altavista.com
4. Lycos Lycos is a search engine and web portal establised in 1994. Lycos also encompasses a network of email, webhosting, social networking and entertainment websites. Lycos began as a research project by Michael Loren Mauldin of Carnegei Mellon University in 1994. www.lycos.com
1. Open a web page • Pick a web page • Right-click on the text link from the websiteOnthe menu that appears, click Open
2. Saving web pages With Mozilla Firefox: • Click menu File -> Save Page As ... • Dialog box will appear "Save As" -> Save. This web page is stored.
3. Storing images on the Web • Right click the image that is in store. • Click Save this image. • Save Picture dialog box appears. • Write the name of a stored image-> Save
4. Print a Web Page Click the File menu -> Print-> choose the printer that is used and adjust the printing ->print.
C. Downloading files • Click the Open button. If we want to download the file, click the save button. • Specify the name of the file to be downloaded. • Click the Save button. • Wait until the download file is complete. • Click the Open button to open the downloaded file.
D. Copy & Paste • Activate web pages to be copied. • Block all text to be copied. • From the Edit menu, click Copy. • Launch Word and create a new document. • In the Word window, from the Edit menu click paste. • Keep the Word document.
E. Cybercrime and Data Security Computer crime / cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.Net crime refers, more precisely, to criminal exploitation of the Internet.
Characteristics of Cybercrime In the development of conventional crime cbercrime is known as: 1. Blue collar crime 2. White collar crime
Unique characteristics of cybercrime 1. The scope of crime 2. The nature of the crime 3. Perpetrators of crime 4. Evil mode 5. Types of losses caused
Classification Cybercrime a. Cyber piracy The use of computer technology to reprint the software / information and then distribute the through computer technology. b. Cyber trespass The use of computer technology to improve acces to the computer system of an organization or individual.
c. Cyber vandalism The use computer technology to create programs that disrupt to the process of electronic transmission and destroy computer data. b. Estimated future development of cybercrime is expented to further increse along with technological development / globalization in the field of information and commnunication technology.
Data and network security Working methods used by hackers and crackers to infiltrate into a computer network: 1. Spoofing Form of intrusion by way of falsifying the identity of the user so that hackers could login to a computer network illegally. 2. Scanner Using a program will automatically detect the weakness of the security system of a computer network in a locak network or computer another network. 3. Sniffer Network an analyzer serves as a monitoring network and networked for a computer.
4. Password cracker This program can open the encrypted pass word. In addition, there is a password cracker that works by destroying the password security syatem. 5. Destructive devices The form of viruses are made to destroy the data. To maintain data security when data is sent been stored in a computer network, then developed several techniques to secure data.
Technical data security 1. Internet Firewall serves To prevent acces from outside parties to internal systems. How it works: • Firewall filters Filtering communication to occur only as needed, only certain app;ications that are allowed to pass and only a computer with a spesifict identity that can relate. • Proxy Firewall Allowing users to acces the internet from within the broadnest, but from the outside internet can only acces one specific computer.
2. Kriptografi Crytogaphy is the art of encrypting data. The data is sent encrypted before sent over the internet. On the desstination computer, the data is restored to its original form, so it canbe read and understood by the recipient. The process that occur in cryptography: • Encryption process is to transform the original data into code data. This happens sender computer, before the data is sent. • Descryption process password is the process of restoring data to original data. This happened shortly after the data recipient computer received, so the recipient can understand the data sent.
3. Secure Socket Layer (SSL) Line data is transmitted over the internet through many transitions and controlled by many people. This causes the transmission of data over the internet prone by tapping. According to research, there is no computer network and data communications really safe. The technolohy is made only to reduce the rissks that might occur.
F. Computer Virus and Internet Computer viruses : a computer program that can duplicate / copy it self and spread by inserting copies of it self into other programs or documents. Computer viruses can be analogous to a biological virus that spreads by inserting it self into living cells.
The properties and characteristics of computer virus • Very small compared to victims • Having the ability to multiply • Require the victim to stay alive • Requires a certain medium to spread.
The types of computer virus • Worm - multiplies himself on the hard disk. This makes the computer resourceswill worm it becomes full. • Trojan - Taking the data on infected computers and sends it to the Trojan maker itself. • Backdoor - Almost the same with a Trojan. However, Backdoor usually resembles the files fine. For example games. • Spyware - Virus that monitors the infected computer.
Rogue - a program that mimics the antivirus program and show antiviral activity asnormal, and giving false warnings about the virus. • Root kits - A virus that works like an ordinary computer system works.Polymorphic virus - A virus that likes to change so as not to be detected. • Metamorphic viruses - viruses that change the encoding itself to be more difficult to detect. • Mobile Viruses - A virus that runs on mobile phones and can cause various effects.
How computer viruses work Computer viruses generally can damage the computer software and can not directly damage the computer hardware but can cause damage by over-loading a program that forces the process to a specifict device.
d Negative effects of computer viruses is to multiply himself, which makes the computer resources to be reduced significantly viruses based on the Windows operating system. The remaining attacking Linux/GNU, Free BSD, OS/2IBM and Sun Operating system. Malihnant virus that will damage the hardware.
How to cope with computer virusess Using antivirus software. It can detect and remove computer viruses. Computer can be removed with databases, heuristics or ratings of the program it self.
THANK YOU FOR YOUR ATTENDTION
http://mapeltik9smp.blogspot.com/2011/01/search-engine-atau-mesin-pencari.htmlhttp://mapeltik9smp.blogspot.com/2011/01/search-engine-atau-mesin-pencari.html http://id.wikipedia.org/wiki/Google http://id.wikipedia.org/wiki/Yahoo http://en.wikipedia.org/wiki/AltaVista http://en.wikipedia.org/wiki/Lycos http://sekedar-tutorial.blogspot.com/2010/07/cara-menyimpan-halaman-web-atau.html http://annequeentina.blogspot.com/2008/11/mencari-dan-mengelola-informasi.html http://en.wikipedia.org/wiki/Cybercrime http://latifaulfah.blogspot.com/2010/02/pengertian-cybercrime.html http://creativityimages.blogspot.com/2010/04/bagaimana-menjaga-keamanan-kita-saat.html http://id.wikipedia.org/wiki/Virus_komputer http://mazrawul84.wordpress.com/2010/10/25/apa-yang-dimaksud-dengan-virus-komputer/