Reviewer AIS1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

IT What’s inside computer?

•used to refer to the organizational Input Devices


department with main responsibility for • A computer, in the same way will ‘listen’ to
technology. its user by accepting an instruction. This is
Information & Technology called providing an Input.
• all the information the enterprise generates, • Input can be given to a computer in a
variety of ways. One can do this by typing
processes and uses to achieve its goals, as
them out on a keyboard, clicking on
well as the technology to support that something on the screen using a mouse,
throughout the enterprise. speaking through a microphone, etc.
Information Technology • Devices through which, we can give
• Using computers or computer systems to instructions to the computer, or interact with
manage all this information it, are called Input Devices.
• They are used to create, store, retrieve and Output Devices
transmit data or Information across large • Usually it will display its ‘answer’ or results
distances. back to us by displaying it on the screen, or
Information Technology executing the command given to it. This is
• The study, or use, of computer systems for called the output of the computer. Hence
storing, retrieving or sending information’. devices used to share output with the user
(Oxford Dictionary) are called Output Devices.
• They are used to create, store, retrieve and Processing
transmit data or information across large • Between the Input and Output is the crucial
distances, thus they have become step of Processing.
indispensable to our 21st century lives. • Processing takes place in the Central
Why do we need computer? Processing Unit or the CPU. The CPU uses
• We built computers to expand our brains. the instructions, given to it by the user,
• Modern times meant complex problems along with the stored instructions in its
with complex solutions. We needed help. memory to give a result.
• Computers gave us a way to store, retrieve • You could say that the CPU, along with the
and process data. memory units, make up the Processing
• Computers process data and carry out stage in the working of a computer.
complex calculations within a few seconds. • As mentioned earlier, The CPU is the main
• They can also be connected to a network component of the computer that performs
making it possible to share information over calculations, actions and runs programs. It
large distances. is called the Brain of the computer.
How do computers work? • The CPU further consists of the Control Unit
• A computer is an electronic device that can (CU), the Arithmetical and the Logical Unit
receive information, perform actions on the (ALU)
basis of rules and provide an output. • The ALU Performs all the calculations and
• Using these functions a computer can logical operations of the computer,
access, store, process and relay information manipulating numbers in a structured and
to its user. purposeful way.
• It accepts data, makes changes to it, based • Computers understand instructions in
on certain conditions, and displays the combinations of 0s and 1s. Since everything
result.
is expressed in numbers, the Arithmetic and
• Computers understand everything in
Logical Unit becomes crucial.
combinations of 0s and 1s, but also know
how to build complex things out of them. • The Control Unit directs and controls the
This is called Binary Code. operation of the processor. It constantly
• Computers are able to convert these 0s and communicates with the ALU, the memory
1s to mean various things such as in a and the Input/Output devices
game, a web page and even the application. telling them what to do.
• The Control Unit directs and controls the • This translation stage is called Compiling
operation of the processor. It constantly and is done by a program called a
communicates with the ALU, the memory Compiler.
and the Input/Output devices telling them Computer Networking
what to do. Resource Sharing
• The CU reads and interprets instructions. • As computers become more compact, they
• ‘It controls information flow from various were produced in large numbers and
devices of the computer and regulates the gradually they became cheaper in the
timing of the processor’s working. market.
• Handles multiple tasks of fetching, • Pretty soon companies and workspaces had
decoding, executing and storing results and, multiple computing devices. It then became
is obviously indispensable to the working of useful to share data and resources amongst
a computer. a network of machines.
• There are 2 kinds of memory in a computer, • It was cheaper to have a large, shared
Primary memory and Secondary storage drive and have one common printer
memory. among multiple computer systems
• The Secondary Storage is the unit where all Connecting People
the computer’s data and instructions are • They existed mainly to allow the sharing of
stored. This is the permanent memory data and resources within a single
containing data and programs. It is workspace
rewritable. Computer network
• There is another memory called ROM • basically, is a group of two or more
(Read Only Memory) where essential computing devices, connected using a
instructions related to the startup of the telecommunications network, allowing them
computer and other vital functions are to share data and resources.
stored. It’s not rewritable. IT Risk Defined
• From the ROM and the Storage, everything 1. The combination of the probability of an
required for immediate use is copied and event and its consequence.
stored in the Memory section. This Memory 2. The business risk associated with the
adoption and use of information technology.
Is temporary and is called the RAM
3. Risk is a function of the likelihood of a given
(Random Access Memory).
threat-source’s exercising a particular
What are computer programs? potential vulnerability and the resulting
• The fundamental use of a computer is to impact of that adverse event on the
work for us, to carry out our instructions. organization
• The computer will execute exactly as it is “An event, that, if it occurs can affect enterprise
instructed to; hence, the task must be goal achievement “
explained in a series of detailed steps. So, a Types of Risks
computer program, in simple terms, is a list Strategic Risk
of instructions for the computer to perform. • risks that involve future business plans and
• All the programs used by a computer are strategies
collectively called software and all the Operational Risk
• potential losses caused by failed processes,
tangible components of a computer are
policies, systems or events that disrupt
called hardware.
business operations.
Programming Language Portfolio Risk
• Instructions are written to the computer in a • risks related to IT achieving its objectives in
language that is partly English and partly optimizing business value
contains connotations understandable by a Project Risk
machine. • involving acquisition, procurement or
• Cannot be directly understood by the funding including risk concerning the
computer, it has to be translated into Binary people, cost, technical aspects and
Code before execution resources of the project
Risk Ownership Digital transformation
Risk • Organizations are adopting digital
• The potential of undesirable or unfavorable technology at a rapid pace, this is a positive
outcome from a given action transformation but while this is generating
Threat new opportunities, it is also creating new
• Natural, environmental, or human event that risks. Adopting advanced technology can be
could cause harm an enabler or a distractor but all have risks.
Vulnerability High velocity IT
• A weakness that could be exploited by a • Organizations are transforming at a break
threat next speed. Agile and DevOps are hot
Inherent Risk topics today in this fast-paced and high
• The level of risk before security measure velocity environment. For most
are applied organizations these aggressive deployment
Residual risk techniques can often evolve so fast that
• The level of risk after security measures are they can create critical vulnerabilities.
applied Aggressive compliance requirements
Risk appetite • Growth of laws, rules and regulations
• The amount of risk an entity is willing to internationally. This is tipping the scale
accept in pursuit of its mission between performance and compliance or
Risk tolerance performance. It forces some organizations
• How much undesirable outcome the risk to become checklist compliant and not focus
taker is willing to accept on the risk-based scenarios that the
company actually faces.
Risk Governance Global disruptions (pandemic)
• Ensure that IT related enterprise risk does Political and social landscape
not exceed risk appetite and risk • Increasing sensitivity to political factors are
tolerance creating extreme social and political
Risk Management divisions that are seemingly non-negotiable.
• Continually identify, assess and reduce IT • In addition, the ease of using social media
risk within the tolerance levels set or web to quickly spread information
by the enterprise whether real or not too many people
instantly are numerically high. This again
maybe creating more vulnerabilities.
Global climate concerns
• Global climate concerns put pressure on
nations and companies to become more
environmentally friendly and this contrived
many decisions that the organization
makes.

Types of Emerging Risk


Cyber threat sophistication
• Although organizations are getting better at
cyber defense, the bad actors are also
becoming increasingly sophisticated in their
tactics, techniques and procedures. Cyber
criminals are successful in large part
because many organizations are not
carrying out due diligence in addressing the
problems.

You might also like