Presentation on theme: "Mr. Ko Ko ICT for Sec 1 – Semester 2 2013. ICT for Sec 1 O Compulsory - Everybody must attend. Part of the curriculum. O Examinable - Will be graded and."— Presentation transcript:
Mr. Ko Ko ICT for Sec 1 – Semester
ICT for Sec 1 O Compulsory - Everybody must attend. Part of the curriculum. O Examinable - Will be graded and reflected in the report book by the end of the semester. O Assignment/Test - ICT consists of a few modules such as CyberWellness, FreeMind, Google Sketchup, etc. O Each module will have either a test or an assignment. O Classroom Participation
Administration O Log in to the Computer O Username: NRIC O Password: **** (default password if you have not changed it) O New Password: **** O Log in to the Web Portal O Username: NRIC O Password: **** O Make sure you are able to access the school computer and the web portal by the end of the 1 st lesson.
What is CyberWellness?
Agenda O Intellectual Property O Social Engineering O Cyber-Bullying
What is Intellectual Property (IP) ?
What is IP? O Intellectual Property (IP) refers to the product of your mind or intellect. O It can be an invention or innovation, special names and images used in trade, original designs or an expression of an idea. O In Singapore, laws exist to protect such IP Definition from IPOS Website
Intellectual Property O Patents O Trade Marks O Copyright
What is a Patent?
Patents I What is a patent? O A Patent is a monopoly right given by the Government to the owner of an invention to enable him to prevent others from using, copying or making the invention without his consent in the country in which he has obtained patent protection.
Patents II What can be a patent? O Can be a product or a process that gives a new technical solution to a problem. O Can be a new method of doing things, the composition of a new product, or a technical improvement on how certain objects work.
Patents III How long is a Patent? O 20 years from the Date of Filing the patent application
Patents IV What are the benefits of a Patent? O prevent others from exploiting the invention, O raise funds for business, O license it to third parties for commercial returns or O sell the patented invention for a sum of money.
Patents V What are the Criteria for a Product/Process to be a Patent? O New O Inventive Step O Industrial Application
Patents VI Where to search for Singapore Patents? O (ePatents)
What is a Trade Mark?
Trade Marks I What is a Trade Mark? O A Trade Mark is a sign used by a person in the course of business or trade to distinguish his goods or services from those of other traders.
Trade Marks II What constitute a Trade Mark? O A registered trade mark has to be capable of being represented graphically. This sign can be any letter, word, name, signature, numeral, device, brand, heading, label, ticket, shape, colour, aspect of packaging or a combination of these.
Trade Marks III How do you identify a registered trade mark? O ® indicates that the mark is a registered trade mark and hence protected under the trade mark law. O ™ is just a symbol used to indicate that the mark is being used by the company as a trade mark. It does not denote that the mark is registered nor protected under the trade mark law.
Trade Marks IV What are the benefits of using a trade mark? O may use it to better protect market share (i.e. profits) by barring others from copying it; O may license it to third parties for commercial returns (e.g. through a franchise); O may sell the mark outright for a specified value (e.g. in a company acquisition); or O may use the mark to raise equity for business undertakings.
What is a Copyright?
Copyright I What is copyright? O Copyright protects works like novels, computer programs, plays, sheet music and paintings. O Generally, the author of a copyright work has the right to reproduce, publish, perform, communicate and adapt his work. These different exclusive rights form the bundle of rights that we call copyright. These rights enable a copyright owner to control the commercial exploitation of his work.
Copyright II What are the works that can be protected by copyright? O Copyright protects literary, dramatic, musical and artistic works. O Other subject matter like films, sound recordings, broadcasts, cable programmes and published works are also protected under copyright.
Copyright III What are the subject matters not protected by copyright? O ideas or concepts (e.g. a new business idea or a concept for a new game show); O discoveries (e.g. a research finding that has not been known before); O procedures (e.g. the steps involved when applying for a travel visa); O methods (e.g. the unique solution to a mathematical problem); O works or other subject matter that have not been made in a tangible form in a recording or writing (e.g. a speech or a dance that has not been written or recorded); O subject matter which is not of original authorship (e.g. works which contain information in the public domain).
Copyright IV How does copyright in Singapore works? O An author automatically enjoys copyright protection as soon as he creates and expresses his work in a tangible form. O No need to file for registration to get copyright protection.
Exercises on IP O Research on what is a Trade Secret. O Research on what is the different between Trade Secret & Patent? O 1 table = 1 team (15 min) O Each Team will then need to share with the class on their findings.
What is Social Engineering?
Social Engineering What is social engineering? O The art of manipulating people into performing actions or divulging confidential information. O Reference: cial_engineering_(security) cial_engineering_(security)
What is Phishing?
Phishing What is Phishing? O A technique of fraudulently obtaining private information. O Typically, the phisher sends an e- mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided. The usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN.
Exercises on Social Engineering O Research on what are the other methods of social engineering besides those that are discussed in class? O Research on how can we prevent being a victim of social engineering? O 1 table = 1 team (15 min) O Each Team will then need to share with the class on their findings.
Recommended Password O At least one Capital Letter O At least one Small Letter O At least one Number O At least one Special Character O Minimum 6 Characters Eg> wb#12?Mtg_
Password Length & Time to Crack
What is Cyber Bullying?
Cyber Bullying What is Cyber Bullying? O Cyber bullying is a form of bullying which uses electronic devices such as computers and mobile phones. O It involves the use of information and communication technology (ICT) such as internet and mobile phones to deliberately harm others. O Reference from /o.x?c=/wbn/pagetree&func=view&ri d= /o.x?c=/wbn/pagetree&func=view&ri d=
Examples of Cyber Bullying O Harrassment - Repeatedly sending offensive, rude and insulting messages O Denigration - Sending/posting cruel gossip or rumors about a person online to damage his or her reputation O Exclusion - Deliberately excluding a person from online activities such as a chat
Preventing Cyber Bullying O Don’t send messages at angry moments When people are angry, they tend to pass insensitive/ rude remarks, which may results in flaming. (Flaming is the sending of repeated, aggressive messages through the Internet.) O Be polite to others online Pupils should be reminded to respect others by being polite both online and offline. Rude online behaviour may encourage others to “flame” them.
Dealing with Cyber Bullying I O Tell to an adult / talk to a trusted friend This applies whether the pupil is a victim or witness of cyber bullying. Let them know that adults can help, e.g. parents can help to report the bullying to the school or the police. Let the pupils know they can approach form teacher or school counsellor for help. Also let the pupils know about the availability of some helplines in Singapore. O SOS - O 24-hour hotline at:
Dealing with Cyber Bullying II O Don’t respond to a rude/ mean or text message Online bullies get satisfaction when they succeed in getting the victim angry or upset. Remind pupils not to give cyber bullies that satisfaction!
Dealing with Cyber Bullying III O Stay away from the phone, chat or for a few days The bully may just get bored and stop! Besides pupils don’t have to be always online, they can engage in offline activities such as spend time with families and friends
Dealing with Cyber Bullying IV O Report the bullying to the Authorities Most websites allow user to report abuse, e.g. MSN and MySpace. Pupils will have to preserve the evidence to lodge the complaint. Just a note, it takes a lot of effort and time to get service providers to respond to the complaints.
Exercise on Cyber Bullying O Research on one of the following topic: 1. Cyber bullying incidents 2. Cyber Attacks and explain one. 3. Social Engineering Attack 4. How to prevent Phishing O 1 table = 1 team (15 min) O Each Team will then need to share with the class on their findings.
Test on CyberWellness O 1A - 18 July 2013 O 1B - 22 July 2013 O 1C - 16 July 2013 O 1D - 29 July 2013 O 1E - 19 July 2013 O 1F - 16 July 2013