LAW, PROCEDURES AND SECURITY MANAGEMENT: Security, Data Protection and Privacy
10. security procedures
-
Upload
siti-muhammed -
Category
Documents
-
view
270 -
download
0
Transcript of 10. security procedures
![Page 1: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/1.jpg)
INTRODUCTION TO ICT
SECURITY PROCEDURES
![Page 2: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/2.jpg)
PENGENALAN KEPADA ICT
PROSEDUR-PROSEDUR KESELAMATAN
![Page 3: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/3.jpg)
DATA PROTECTION
We need to protect the data in the computer as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors.
There are a few ways to protect the information namely:– make backup files– detect the virus and clean the computer– warn others on virus attacks
![Page 4: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/4.jpg)
PERLINDUNGAN DATA
Kita perlu melindungi data di dalam komputer yang mana ia mungkin akan hilang atau rosak disebabkan oleh beberapa virus atau kejadian tidak diingini seperti kebakaran, banjir, petir, kegagalan mesin dan juga kesilapan manusia.
Terdapat beberapa cara bagi melindungi maklumat:– Membuat fail sokongan (simpanan)– Mengesan virus dan membersihkan komputer dari
virus– Memberi amaran kepada orang lain berkenaan
serangan virus
![Page 5: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/5.jpg)
DATA PROTECTION
1) BACKUP FILES
Users can do backups of file systems by:
– keeping the duplicated files in external storage such as in the floppy disk and thumb drive
– do backup frequently
![Page 6: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/6.jpg)
PERLINDUNGAN DATA
1) FAIL-FAIL SOKONGAN
Pengguna boleh melakukan sokongan bagi sistem fail dengan:
– Menyimpan fail-fail pendua di dalam simpanan luaran seperti disket dan thumb drive
– Melakukan sokongan dengan kerap
![Page 7: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/7.jpg)
DATA PROTECTION
2) DETECT VIRUS AND DO CLEANUP A computer virus is able to affect and infect the way
the computer works. Viruses can be detected when we run an antivirus program. We can also delete the infected files and documents.
3) WARN OTHERS ON VIRUS ATTACK We can warn others on virus attacks or new viruses
by sending e-mails to them.
![Page 8: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/8.jpg)
PERLINDUNGAN DATA2) MENGESAN VIRUS DAN LAKUKAN PEMBERSIHAN Virus komputer berupaya untuk memberi kesan dan
menjangkiti cara bagaimana komputer bekerja. Virus boleh dikesan apabila kita mengoperasikan program antivirus. Kita juga boleh memadam fail dan dokumen yang dijangkiti.
3) MEMBERI AMARAN KEPADA ORANG LAIN BERKENAAN SERANGAN VIRUS
Kita boleh memberi amaran kepada orang lain berkenaan serangan virus atau virus baru dengan menghantar e-mail kepada mereka.
![Page 9: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/9.jpg)
DETECTING ILLEGAL ACCESS TO SYSTEMS
The computer system is able to detect any illegal access to the system by a user who does not have any authorisation.
Basically, a corporation will simply use tcpwrappers and tripwire to detect any illegal access to their system.
User's access will be reviewed periodically by computer operations.
![Page 10: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/10.jpg)
MENGESAN AKSES SECARA TIDAK SAH TERHADAP SISTEM
Sistem komputer berupaya untuk mengesan sebarang akses tidak sah terhadap sistem oleh pengguna yang tidak mempunyai pengesahan.
Secara asasnya, sesebuah syarikat menggunakan tcpwrappers dan tripwire bagi mengesan sebarang akses tidak sah terhadap komputer mereka.
Akses pengguna akan dipaparkan secara berwaktu oleh operasi komputer.
![Page 11: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/11.jpg)
DETECTING ILLEGAL ACCESS TO SYSTEMS
TCPWRAPPERS
Tcpwrappers will control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.
![Page 12: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/12.jpg)
MENGESAN AKSES TIDAK SAH TERHADAP SISTEM
TCPWRAPPERS
Tcpwrappers akan mengawal akses pada tahap aplikasi, berbanding pada tahap soket seperti iptables dan ipchains. Sistem akan mengoperasikan tcpwrappers bagi merekod akses kepada ftp, tftp, rch, rlogin, rexec dan telnet.
Tcpwrappers menghentikan percubaan perhubungan
Memeriksa fail-fail konfigurasinya
Akan menentukan samada mahu menerima atau menolak permintaan
![Page 13: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/13.jpg)
DETECTING ILLEGAL ACCESS TO SYSTEMS
TRIPWIRETripwire will detect and report on any
changes in the thousands of strategic system files.
The system will run tripwire to determine if system files have changed.
![Page 14: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/14.jpg)
MENGESAN AKSES TIDAK SAH TERHADAP SISTEM
TRIPWIRETripwire akan mengesan dan melapor
sebarang perubahan di dalam beribu-ribu fail sistem strategik.
Sistem ini akan mengoperasikan tripwire bagi menentukan jika fail sistem telah berubah.
![Page 15: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/15.jpg)
PREVENTING ILLEGAL ACCESS TO SYSTEMS
Have any of you ever been to an airport? Do you know the do’s and don’ts when you are at the airport?
There are things that cannot be taken inside the airplane. It is for the purpose of security procedures.
It is the same as computer systems. It would not allow any unauthorised users to simply access the system.
Ways to prevent illegal access to systems:1) Run anlpassword to make password cracking difficult.2) Run tcpwrappers to check if the name for an ip address
can be provided by DNC3) Use a callback system to prevent unauthorised use of
stolen passwords.
![Page 16: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/16.jpg)
MENCEGAH AKSES TIDAK SAH TERHADAP SISTEM
Adakah antara kamu pernah ke lapangan terbang? Adakah kamu tahu apa yang boleh dan tidak boleh dilakukan apabila kamu berada di lapangan terbang?
Terdapat beberapa perkara yang tidak boleh dilakukan di dalam kapal terbang. Ia bertujuan bagi prosedur keselamatan.
Ia adalah sama dengan sistem komputer. Ia tidak membenarkan sebarang akses tanpa kebenaran menggunakan sistem dengan mudah.
Cara bagi mencegah akses tidak sah terhadap sistem:1) Mengoperasikan anlpassword bagi menyukarkan pemecahan
kata laluan.2) Mengoperasikan tcpwrappers untuk memeriksa jika nama bagi
sesebuah alamat IP boleh disediakan oleh DNC3) Menggunakan sistem panggil kembali bagi mengelakkan
penggunaan tanpa kebenaran bagi kecurian kata laluan.
![Page 17: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/17.jpg)
PREVENTING ILLEGAL ROOT ACCESS
To prevent any illegal root access, we should have Sudo, so that people can perform on some machine without getting access to the entire root if that is not required. In addition, with Sudo we did not have to give out the root password.
Sudo stands for (Superuser do) and is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user (normally in the form of the system's superuser).
Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.
![Page 18: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/18.jpg)
MENCEGAH AKSES ROOT TIDAK SAH
Bagi mencegah sebarang akses root/sumber tidak sah, kita perlu mempunyai Sudo, jadi ia boleh dilaksanakan pada beberapa mesin tanpa mendapatkan akses pada keseluruhan sumber jika ia tidak diperlukan. Tambahan pula, dengan Sudo kita tidak akan kehilangan kata laluan root.
Sudo adalah kata ganti kepada (Superuser do) dan adalah sebuah program di dalam Unix, Linux dan sistem pengendalian yang sama seperti Mac OS X yang membenarkan pengguna untuk mengoperasikan program di dalam bentuk pengguna lain.
Sudo membenarkan pengguna yang dibenarkan untuk melaksanakan arahan sepertimana pengguna super atau pengguna lain, sepertimana yang ditentukan oleh fail sudo.
![Page 19: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/19.jpg)
PATCH
Patch supplies small updates to software, provided that the source code is available.
Patch is a name of an UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file.
![Page 20: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/20.jpg)
PATCH
Patch menyediakan sedikit kemaskini kepada perisian, menyediakan supaya kod sumber adalah tersedia.
Patch adalah nama bagi perisian utiliti bagi UNIX. Ia menggunakan sebuah skrip yang dihasilkan oleh program yang berbeza bagi memulakan fail yang membenarkan perubahan daripada satu fail untuk digunakan secara terus kepada fail yang lain.
![Page 21: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/21.jpg)
INTRODUCTION TO ICT
COMPUTER APPLICATIONS IN THE SOCIETY
![Page 22: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/22.jpg)
PENGENALAN KEPADA ICT
APLIKASI KOMPUTER DI DALAM MASYARAKAT
![Page 23: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/23.jpg)
COMPUTER APPLICATIONS IN THE SOCIETY
People interacts directly with computer in education, finance, government, health care, science, publishing, tourism, and industry.
Computers help them to do their work faster and more efficient by using the software application that consist of special program for specific task.
![Page 24: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/24.jpg)
APLIKASI KOMPUTER DI DALAM MASYARAKAT
Manusia berinteraksi secara terus dengan komputer di dalam pendidikan, kewangan, kerajaan, penjagaan kesihatan, sains, penerbitan, pelancongan dan industri.
Komputer membantu mereka untuk melakukan tugas mereka lebih cepat dan efisyen dengan menggunakan perisian aplikasi yang mengandungi program istimewa bagi tugas yang tertentu.
![Page 25: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/25.jpg)
SOFTWARE APPLICATIONS Software applications are used for many reasons. Such as to enhance
the learning process, to help in business activities, to assist the graphics and multimedia project and to fasilitate communication.
![Page 26: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/26.jpg)
PERISIAN APLIKASI Perisian aplikasi digunakan untuk banyak sebab. Seperti bagi
meningkatkan proses pembelajaran, membantu dalam aktiviti perniagaan, membantu dalam projek grafik dan multimedia dan bagi kemudahan komunikasi.
![Page 27: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/27.jpg)
SOFTWARE APPLICATIONS PACKAGES
![Page 28: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/28.jpg)
PERISIAN APLIKASI PAKEJ
![Page 29: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/29.jpg)
HOME AND EDUCATION Today, computers are used in schools, colleges and
universities in order to promote better education by using computers.
In the labs, students use software packages to complete their assignments. At the same time, some educators use the computer-based training and web-based training as replacements for lecture presentation.
Some of the software applications that are usually used in schools and universities include Microsoft Office, Adobe Photoshop, Macromedia Flash, AutoCAD, Macromedia Dreamweaver and Macromedia Director.
![Page 30: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/30.jpg)
RUMAH DAN PENDIDIKAN Kini, komputer digunakan disekolah, kolej dan universiti
dalam mempromosikan pendidikan yang baik dengan menggunakan komputer.
Di dalam makmal, pelajar menggunakan perisian pakej bagi menyiapkan tugasan mereka. Pada masa yang sama, sebilangan pendidik menggunakan latihan berasaskan komputer dan berasaskan web sebagai pengganti kepada persembahan kuliah.
Beberapa perisian aplikasi yang selalunya digunakan di sekolah dan universiti termasuklah Microsoft Office, Adobe Photoshop, Macromedia Flash, AutoCAD, Macromedia Dreamweaver and Macromedia Director.
![Page 31: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/31.jpg)
COMPUTERS FOR HIGHER EDUCATION
Open Distance Learning (ODL) or online learning can be implemented as computers are the main medium in delivering the knowledge from one location to the other locations.
This type of learning consists of online forum, discussion, quizzes, test questions and many more.
The example of the Open Distance Learning institution is the Open University of Malaysia (www.oum.edu.my).
![Page 32: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/32.jpg)
KOMPUTER BAGI PENDIDIKAN TINGGI
Open Distance Learning (ODL) atau pembelajaran atas talian boleh dilaksanakan dengan komputer sebagai medium utama dalam penghantaran pengetahuan dari satu lokasi ke lokasi yang lain.
Pembelajaran jenis ini mengandungi forum atas talian, perbincangan, kuiz, soalan ujian dan banyak lagi.
Contoh bagi institusi Open Distance Learning adalah Open University of Malaysia (www.oum.edu.my).
![Page 33: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/33.jpg)
BUSINESS
People use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans.
Accounting software helps companies to record and report their financial transactions. Examples of these software applications include MYOB, Intuit Quick Books and Peachtree Complete Accounting.
![Page 34: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/34.jpg)
PERNIAGAAN
Manusia mengunakan perisian kewangan atau perakaunan bagi buku pemeriksaan baki, membayar bil, mengesan pendapatan dan perbelanjaan seseorang, mengurus pelaburan dan menilai perancangan kewangan mereka.
Perisian perakaunan membantu syarikat untuk merekod dan melaporkan transaksi kewangan mereka. Contoh bagi perisian aplikasi ini adalah MYOB, Intuit Quick Books dan Peachtree Complete Accounting.
![Page 35: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/35.jpg)
BUSINESS
COMPUTERS IN BANKING In the banking sector, many financial institutions
offer online banking.People can access their financial records from
anywhere in the world. One example of online banking is Maybank2u. (www.maybank2u.com)
Most of the packages on banking offer a variety of online services. Which requires access to the web.
For example we can track our investment online, compare insurance rates and do online banking.
![Page 36: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/36.jpg)
PERNIAGAAN
KOMPUTER DALAM PERBANKANDi dalam sektor perbankan, banyak institusi kewangan
menawarkan perbankan atas talian.Pengguna dapat mengakses rekod kewangan mereka
dimana-mana sahaja. Satu contoh bagi perbankan atas talian adalah Maybank2u. (www.maybank2u.com)
Kebanyakan pakej pada perbankan atas talian menawarkan pelbagai perkhidmatan atas talian yang mana memerlukan akses kepada laman web.
Sebagai contoh kita boleh menjejak pelaburan kita secara atas talian, membandingkan kadar insurans dan melakukan perbankan atas talian.
![Page 37: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/37.jpg)
INDUSTRY
By using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product.
Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network.
Examples of companies using this system are Proton(www.proton.com.my) and Perodua (www.perodua.com.my).
![Page 38: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/38.jpg)
INDUSTRI
Dengan mengunakan sistem CAM, komputer boleh merekod pekerja sebenar, material, mesin dan masa digunakan bagi mengeluarkan produk-produk tertentu.
Komputer memproses data ini dan mengemaskini secara automatik inventori, pengeluaran, pembayaran dan rekod perakaunan pada rangkaian syarikat.
Contoh bagi syarikat yang mengunakan sistem ini adalah Proton(www.proton.com.my) dan Perodua (www.perodua.com.my).
![Page 39: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/39.jpg)
GRAPHICS AND MULTIMEDIA
Computers are crucial in publishing especially in the process of making works available to the public. These works include magazines, books, newspapers, music and film production.
Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs.
Computer-Aided Design, Desktop Publishing, Paint/Image Editing, Video and Audio Editing and Multimedia Authoring are among the popular applications software.
![Page 40: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/40.jpg)
GRAPHICS AND MULTIMEDIA
Komputer adalah penting di dalam penerbitan terutamanya di dalam proses menyediakan pekerjaan kepada orang ramai. Kerja-kerja ini termasuklah di dalam majalah, buku-buku, surat kabar, muzik dan produksi filem.
Perisian aplikasi istimewa digunakan bagi membantu pereka grafik untuk membangunkan grafik, teks, fotograf dan mengubah lagu.
Computer-Aided Design, Desktop Publishing, Paint/Image Editing, Video and Audio Editing dan Multimedia Authoring adalah di antara perisian aplikasi yang popular.
![Page 41: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/41.jpg)
COMMUNICATION
Most government offices or agencies have websites in order to provide citizens with up-to-date or latest information.
Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing.
![Page 42: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/42.jpg)
KOMUNIKASI
Kebanyakan pejabat atau agensi kerajaan mempunyai laman web bagi menyediakan rakyat dengan kemaskini atau maklumat terkini.
Contoh bagi perisian aplikasi yang digunakan bagi komunikasi termasuklah e-mail, pelayar web, newsgroups, mesej segera dan persidangan video.
![Page 43: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/43.jpg)
COMMUNICATION
People can access government websites to:– check information on taxes (www.hasil.org.my)– apply for permits and licenses (www.jpj.gov.my)– check for MyKad (www.jpn.gov.my)– pay parking tickets and check summons
(www.jpj.gov.my)– renew vehicle registration (www.jpj.gov.my)– register online for IPTA/IPTS application
(www.moe.gov.my)
![Page 44: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/44.jpg)
KOMUNIKASI
Penguna boleh mengakses laman web kerajaan untuk:
– Memeriksa maklumat cukai (www.hasil.org.my)
– Memohon permit dan lesen (www.jpj.gov.my)
– Memeriksa MyKad (www.jpn.gov.my)
– Membayar tiket letak kenderaan dan saman (www.jpj.gov.my)
– Memperbaharui pendaftaran kenderaan (www.jpj.gov.my)
– Mendaftar atas talian bagi permohonan IPTA/IPTS (www.moe.gov.my)
![Page 45: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/45.jpg)
COMPUTERS IN TOURISM
Today, people will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights and car rentals.
They can also purchase ticket online, all payments can be made by using credit card.
![Page 46: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/46.jpg)
KOMPUTER DALAM PERLANCONGAN
Kini, manusia secara atas talian akan mendapatkan semua maklumat yang berkaitan berkenaan pengembaraan. Mereka boleh melawat laman web untuk mendapatkan maklumat berkenaan destinasi, harga, hotel, penerbangan dan sewaan kereta.
Mereka juga boleh membeli tiket secara atas talian, pembayaran boleh dilakukan dengan mengunakan kad kredit.
![Page 47: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/47.jpg)
COMPUTERS IN THE HEALTHCARE
In the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely:– maintaining patient records– monitoring patients’ vital sign– assisting doctors, nurses and technicians with
medical tests by using computer and computerised devices .
– using medical software to help with researching and diagnosing health conditions.
![Page 48: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/48.jpg)
KOMPUTER DALAM PENJAGAAN KESIHATAN
Di dalam lapangan perubatan, komputer sangat penting dalam menggerakkan operasi. Staf perubatan mengunakan komputer untuk pelbagi tujuan antaranya:– Menyelenggara rekod pesakit– Mengawasi tanda-tanda penting pesakit– Membantu doktor, jururawat dan juruteknik dengan
ujian perubatan dengan mengunakan komputer dan peralatan komputer.
– Mengunakan perisian perubatan bagi membantu penyelidikan dan pengujian keadaan kesihatan.
![Page 49: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/49.jpg)
SCIENCE In the scientific world, computers are used in all fields of
science from biology to astronomy to meteorology and others. These are things that can be done by computers, namely:– collecting, analyzing and modelling data– serving as medium of communication with colleagues
around the world– contributing to new inventions or breakthrough in
surgery, medicine and treatment– imitating functions of the central nervous system,
retina of the eye and others by tiny computers– allowing a deaf person to listen through cochlear
implant
![Page 50: 10. security procedures](https://reader036.fdocuments.net/reader036/viewer/2022081505/5561f3c8d8b42ae04e8b46a1/html5/thumbnails/50.jpg)
SAINS Di dalam dunia saintis, komputer digunakan di dalam
semua lapangan dari biologi ke astronomi ke meteorologi dan lain-lain. Ini adalah perkara yang boleh dilakukan dengan komputer antaranya:– Mengumpul, menganalisa dan permodelan data– Berkhidmat sebagai medium komunikasi dengan kolej-
kolej di seluruh dunia– Menyumbang kepada penciptaan baru di dalam
pembedahan, perubatan dan rawatan– Meniru fungsi bagi sistem saraf pusat, retina mata dan
lain-lain dengan mengunakan komputer kecil.– Membolehkan orang pekak mendengar menerusi
implan koklea