topics communication technology internet data security information misuse information systems...
TRANSCRIPT
TopicsCommunication TechnologyInternetData SecurityInformation MisuseInformation SystemsTechnological TrendsImpact of IT
Communication TechnologyData Communication – Transmission of data between two or more computers
Linked Point to Point - Broadcast
Communication TechnologyConfigurations
LANWANMAN
Stand Alone – Not attached to Network
Hub – Central connecting device
Communication TechnologyLayout
StarBusRing
Channel – Medium to transfer data
Communication TechnologyData Flow
SimplexHalf DuplexFull Duplex
Communication TechnologyMedia
CoaxialUTPFibre OpticMicrowaveWireless/Bluetooth/IR/Hotspot
Communication TechnologyChannel Speed -Amount of info channel can handle at one time
InternetInternet – Biggest network, changed from military purposes to commerce, government, educational and entertainment
InternetServices
EmailIRCWWWFTPNewsgroups
InternetConnection
ISPDialupISDNASDLCable
InternetCommunication Terminology
TCP/IPHostIPHTMLURLWebsite
InternetBrowserWebpageHome pageHyper linkSearch EngineElectronic commerce
InternetIntranet – Private network based on internet standardsDistribute documentsShare informationEnable Teleconferencing
Extranet – formed by allowing others the authorized use to an intranet
Data SecurityProtection of computer hardware/software from deliberate or accidental damage
Data SecurityExternal Sources – Protect From:TheftPower outagesNatural DisasterFireDust/Humidity
Data SecurityExternal Sources – How?
CamerasAlarmsBiometricsAccess codesFireproof CabinetsUPS
Data SecurityInternal Sources – Protect From:Clerical ErrorsFiles erased/corruptedVirusesHackers,Unauthorized accessRevenge
Data SecurityInternal Sources – How?
BackupPasswordsNetwork LoggingEncryptionAntivirusFirewalls
Information MisuseInformation:
Used only for intended purposeOwner has right to examine any dataMust be accurateSecurity should be in placeInfo not kept longer than necessary
PropagandaComputer FraudComputer Crime Unauthorized Access Electronic Eavesdropping Industrial espionage Surveillance Copyright and Piracy
Information MisusePropagandaComputer FraudComputer Crime Unauthorized Access Electronic Eavesdropping Industrial espionage Surveillance Copyright and Piracy
Information SystemsComputerized system responsible for collection, processing and distribution of information.
Information SystemsTypes of computer systems:User
Single userMulti user
TaskSingle taskingMulti tasking
Information SystemsTypes of computer systems:Personal ComputerPortable ComputerNetwork ComputersMainframeSuper Computer
Information SystemsAreas:CommerceBankingManufacturingScience and TechnologyEducationLaw Enforcement
Technological TrendsAIDesign
CADDCAMCAE
BusinessTeleconferencingTelemarketing
Technological TrendsDesktop Publishing
Impact of ITChanges in WorkplaceLoss of Jobs/RetrainingHealth Concerns
RSIBackEye
Stress
Impact of ITEnvironment
PowerDisposing of technology
Legal Effects