We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
GEE-LIE Notes
1. Weak Passwords:
‘Simple or reused passwords can be easily compromised.
Recovery: Implement strong password policies, encourage
the use of password managers, and enable multi-factor
authentication (MFA).
2. Unpatched Software:
Outdated software can be exploited by attackers
Recovery: Regularly update and patch all software and
systems. Implement automated patch management
solutions where possible.
3, Misconfigured Security
Settings Default settings can leave systems exposed,
Recovery: Conduct regular security audits and
configuration reviews. Harden configurations based on
best practices.
4. Phishing Attacks
Social engineering can trick users into revealing sensitive
information,
Recovery: Provide training on recognizing phishing
attempts and implement email filtering solutions. Regularly
test employees with simulated phishing attacks.
5. Inadequate Network Security
Unprotected networks can be breached.
Recovery: Use firewalls, intrusion detection/prevention
systems, and segment networks to limit access. Regularly
assess network security.
6. Insufficient Data
Encryption Data at rest and in transit may be vulnerable.
Recovery: Implement encryption protocols for data
storage and transmission. Ensure encryption keys are
‘managed securely.
7. Lack of Security
Monitoring Without proper monitoring, threats can go
undetected.
Recovery: Utilize security information and event
‘management (SIEM) systems and conduct regular audits to
monitor for anomalies.
8. Poorly Managed User Permissions
Excessive permissions can lead to data breaches.
Recovery: Implement the principle of least privilege (PoLP)
and regularly review user access rights.
9. loT Vulnerabilities
Internet of Things devices may lack security features.
Recovery: Change default credentials, update firmware
regularly, and segment lot devices on a separate network.
10. Backup Failures
Inadequate backup can lead to data loss during incidents.
Recovery: Regularly test backups, ensure they are stored
securely, and consider using offsite or cloud solutions for
redundancy.GEE-LIE Notes
1. Artificial Intelligence and Machine Learning,
Increasingly integrated into various applications, Al and ML
are enhancing decision- making, automation, and
personalization,
Ce
MACHINE
age a nes
MMs ed
2. Cloud Computing
The shift to cloud services continues, with businesses
adopting hybrid and multi- cloud strategies for flexibility
and cost efficiency.
3. Cybersecurity
{As threats become more sophisticated, organizations are
investing more in advanced cybersecurity measures,
including zero-trust models and Al-driven security
solutions.
/ wp
pe ws
Cyb i fc
er securi
El obectse y Ol v
4. Edge Computing
With the growth of loT devices, processing data closer to
the source is becoming crucial to reduce latency and
bandwidth use.
5. 5G Technology
‘The rollout of 5G networks is enabling faster connectivity
and supporting new applications, particularly in loT and.
smart cities.
6. Blockchai
Beyond cryptocurrencies, blockchain is being explored for
secure transactions, supply chain transparency, and
identity verificationGEE-LIE Notes
Human societies and technology have grown inextricably linked
since technical systems like mobile phones, computers, TV, etc.
are produced by humans and reflect the very basis of a
population's needs and lifestyle. Although technology improves
the lifestyle of human beings, it is also a major concern for
future generations. Nowadays, people are excessively using
technology which reduces their physical activities and directly
affects their health,
What is Society?
Society is defined as the group of among human beings
sharing social relationships. Or in other words, a society is
‘a group of people that lives together in a community that
includes some form of government, along with some rules
and economy.
Impact of Technology on Society
We utilize and rely on technology in our daily lives, and our
‘technical requirements and demands continue to grow.
Technology is used by humans to explore, connect, study,
land do work. The manner in which we use technology
decides whether its effects are beneficial or detrimental
for society.
Impact of Technology on Society
We utilize and rely on technology in our daily lives, and our
technical requirements and demands continue to grow.
Technology is used by humans to explore, connect, study,
and do work. The manner in which we use technology
decides whether its effects are beneficial or detrimental
for society.
Negative Impacts of Technology on S
What is Technology?
Technology is defined as the body of knowledge that deals
with the innovation, invention, and application of technical,
‘means, as well as their interrelationship with life, society,
and the environment. Or in other words, technology means
‘the use of scientific knowledge to achieve some specific
goal or create applications that are used in industry or in
everyday life. So, if we are using some scientific knowledge
to achieve some goal means we are using technology.
Positive Impacts of Technology on Society
Technology has a more positive impact on humans or
society as compared to negative. It makes our life easier
and reward us by providing resources or tool that make our
life much easier. Following are some positive changes that
technology brings to our life:
Positive Impacts of Technology on Society
Technology has a more positive impact on humans or
society as compared to negative. It makes our life easier
and reward us by providing resources or tool that make our
life much easier. Following are some positive changes that
technology brings to our life:
Limproved Communication
2, Improved Education and Learning process
3, Mechanized Agriculture
4. Easy to access information
iety
‘As we know that everything present on this planet has both
advantages and disadvantages. The same goes for
technology it also has negative impacts on society and
some other negative impacts are:
1 Increase in Unemployment
2. Increase in Pollution
3. Increase in Health and Mental Concerns
4. Increase in Cybercrime.GEE-LIE Notes
Information Technology (IT) influences
culture in several significant ways:
1. Globalization of Culture
‘Cultural Exchange - It facilitates the rapid sharing of
cultural content across borders, allowing people to
‘experience music, art, food, and traditions from around the
world.
Emergence of Global Trends - Platforms like social media
‘can quickly popularize cultural phenomena, creating
shared global experiences.
3. Shifts in Communication Styles
New Languages and Dialects- The internet has birthed new
forms of communication, including memes, emojis, and
shorthand, influencing language evolution.
Influence of Social Media- Online platforms can change
how we express ourselves, often prioritizing brevity and.
visual storytelling over traditional narratives.
5. Social Movements and Activism
‘Amplification of Voices- IT provides a platform for
marginalized groups to share their stories, mobilizing
‘support and fostering social change.
‘Cultural Awareness- Social media campaigns can raise
awareness about social issues, encouraging discussions
about race, gender, and other cultural topics.
7. Formation of Online Communities
Niche Cuttures- IT enables the formation of online
‘communities centered around specific interests, hobbies,
or identities, fostering subcultures that may not exist
offline.
Shared Experiences- Virtual spaces allow individuals to
connect over shared interests, creating a sense of
belonging and community.
2. Creation and Consumption of Media
Digital Content Creation - IT empowers individuals to
create and share their own content, leading to a
democratization of cultural production. Anyone can
become a creator through blogs, YouTube, and social
media.
Streaming Services - Platforms like Netflix and Spotify
reshape how people consume music and films, leading to
shifts in what is popular and how culture is disseminated,
4, Preservation of Heritage
Digital Archiving- Technology allows for the preservation
of languages, stories, and traditions that might otherwise
be lost, helping to maintain cultural identity.
‘Access to Cultural Resources - Online museums, virtual
tours, and archives make cultural heritage accessible toa
global audience.
6. Impact on Values and Norms
Changing Norms- Online interactions can shift societal
norms regarding privacy, communication, and behavior,
influencing what is considered acceptable or trendy.
Influence of Influencers- Social media influencers shape
cultural values and consumer behavior, often dictating
trends in fashion, lifestyle, and social issues.
ITis a powerful force in shaping culture, enabling both the
preservation of traditions and the emergence of new
cultural forms. As technology continues to evolve, its
impact on culture will likely grow, leading to new
dynamics in how we create, share, and understand
cultural expressions.GEE-LIE Notes
1. Cybersecurity Threats Data breaches:
increasing incidents of data breaches can expose sensitive
information, leading to financial loss and reputational
damage. Malware and ransomware: attacks can disrupt
operations, steal data, or extort organizations, posing
significant risks.
3. Digital divide Access inequality:
there is a gap between those with access to technology
and those without, leading to disparities in education, job
opportunities, and information access. Technological
\iteracy: not everyone has the skils to effectively use
technology, exacerbating inequalities.
5. Misinformation and disinformation
Spread of fake news: the ease of sharing information
online can lead to the rapid dissemination of false
information, affecting public opinion and decision- making.
Manipulation: social media and other platforms can be
used to manipulate information and influence behaviors,
undermining trust.
7. Ethical issues Al bias:
algorithms can perpetuate biases present in training data,
leading to unfair treatment in areas like hiring, lending, and
law enforcement.
Surveillance technology: the use of surveillance tools
raises ethical concerns about civil liberties and the balance
between security and privacy.
9, Dependence on technology Vulnerability to outage:
increasing reliance on technology makes individuals and
organizations vulnerable to outages or technical failures.
Loss of interpersonal skills: overreliance on digital
communication can lead to diminished face-to-face social
skills
2. Privacy concerns Data colle
extensive collection of personal data raises questions
about user consent and how that data is used or shared.
Surveillance: technologies that monitor user behavior can
infringe on privacy right and create a culture of
surveillance.
4, Impact on employment Job displacement:
automation and Al can lead to job loss in certain sectors,
raising concerns about unemployment. Skill gaps: the rapid
evolution of technology requires continuous learning,
leading to challenges in workforce Ladaptation.
6. Mental health impacts Social media pressure:
the pervasive use of social mediia can contribute to anxiety,
depression, and feelings of inadequacy due to comparison
with others. Addiction and screen time: excessive use of
technology can lead to addiction and decreased
productivity, affecting overall well-being.
8. Environmental impact E-waste:
the rapid turnover of technology contributes to electronic
waste, which poses environmental challenges and health
risks.
Energy consumption: data centers and digital
infrastructure consume significant amounts of energy,
contributing to carbon - emissions.
While IT offers transformative benefits, it also poses
significant challenges that require careful consideration
and proactive measures. Addressing these issues is.
essential to ensure that technology serves as a force for
good in society.