Information and Communications Technology

This is still under development

Get Started. It's Free
or sign up with your email address
Rocket clouds
Information and Communications Technology by Mind Map: Information and Communications Technology

1. Current State of ICT Technologies

1.1. WEB 2.0

1.1.1. History

1.1.2. Elements

1.1.3. Tools

1.1.4. Technologies

1.1.4.1. Adobo Flash

1.1.4.2. Microsoft Silverlight

1.1.4.3. JavaScript

1.1.4.4. Torrent

1.2. Web 2.0 to Web 3.0

1.2.1. Expanded Definition

1.2.1.1. Ubiquitous Connectivity

1.2.1.2. Network Computing

1.2.1.3. Open Technologies

1.2.1.4. Open Identity

1.2.1.5. The Intelligent Web

1.2.2. Ubiquitus Computing

1.2.3. More Intelligent Web

1.2.3.1. Technologogical Convergence

1.2.3.1.1. Digital Convergence

1.2.3.1.2. Telecommunication Convergence

1.2.3.1.3. Media Convergence

1.3. Social and Assistive Media

1.3.1. Social Media

1.3.1.1. Microblogging

1.3.1.2. Social Curation

1.3.1.3. Wikis

1.3.2. Assistive Media

1.4. Educational Technology

1.4.1. Learning Management System

1.4.2. Social Media and Peer-to-Peer Platforms

1.4.3. Conferencing Applications

1.4.3.1. Online Meeting

1.4.3.2. Two-Way Audio

2. Online Safety, Security, Ethics and Etiquette

2.1. Your Online Data

2.1.1. Traditional Data

2.1.2. Internet of Things and Big Data

2.2. Online Security Threats and Attacks

2.2.1. Malicious Programs

2.2.1.1. Virus

2.2.1.2. Worms

2.2.1.3. Trojans

2.2.1.4. Bots

2.2.2. Phishing

2.3. Cybersecurity

2.4. Fighting Against Security Threats

2.4.1. Best Practices for Combating Malware Threats

2.4.1.1. Ensure that your operating system is up to date

2.4.1.2. Install an anti-virus software in your PC's

2.4.1.3. Firewall should always be enabled

2.4.1.4. Assure that the file to be downloaded is safe

2.4.1.5. Be cautious accepting or agreeing to prompts

2.4.2. Points to Ponder to Secure your Own Data

2.4.2.1. Use browsers in a private manner

2.4.2.2. You should take care when choosing a username or alias for your online identity

2.4.2.3. Choose your passwords wisely

2.4.2.4. Be careful when sharing documents, pictures, and other online resources via blogs or emails

2.4.2.5. Be aware of shoulder surfing

2.4.2.6. Verify data is encrypted

2.4.2.7. Be aware of social engineering

2.4.2.8. Use two-factor authentication if it is available

2.4.2.9. When connecting via Wi-Fi, log on to a secure network using WEP or WPA

2.5. Netiquette and Internet Chat Rooms

2.5.1. Email

2.5.2. Group Chat

2.5.3. Usenet

3. Contextualized Online Search and Research Skills

3.1. Search Engines