Reviewer APC 5

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

CHAPTER 1: Managing Information Technology 6.

Bandwidth

Information Technology - Name of technique 7. Security versus ease of access


which is used for handling and providing the
8. Access to external data services
information
Managing the application portfolio
Information technology management - IT
management is the discipline whereby all of the • Most companies cannot operate without
information technology resources of a firm are software applications – they are critical asset
managed in accordance with its needs and
priorities. • Just as physical infrastructure, software
portfolio needs managed as an asset
CHALLENGES…
Managing the application portfolio
❑ Rapid technological change
A company must know:
❑ Exploding applications and data
❑ What software it owns
❑ Frequent External Shocks
❑ Where it is located
MANAGING THE ASSETS IN AN IS
ORGANIZATON ❑ What it does

IS leadership must manage these organizational ❑ How effective it is


assets: ❑ What condition it is in
❑ Human Resources INFORMATION TECHNOLOGY MANAGEMENT
❑ Organizational data SYSTEM ISSUES

1. Developing effective change management


❑ Physical Infrastructure
system
❑ Application Portfolio
2. Ethical use of IT
Developing Human Resource
3. Determining an outsourcing strategy
Provide specialized IT training for IS
4. Deploying global information systems
professionals and others
5. Ensuring regular performance measurement
Improving the physical infrastructure

Infrastructure management issues addressed


here are:

1. Location Chapter 2 - Information Resource Management

2. The workstation

3. Supported operating systems

4. Redundancy

5. Supported communications p
• It is more than just protecting hardware and
software from being crashed

• It is protecting the information resources that


keep the company operating

• Goals are to ensure

1. Data integrity, availability and confidentiality


2. Business continuity

Information Technology Security

• Confidentiality

✓Maintaining the privacy of data

• Integrity

✓Detecting that the data is not tampered with

• Authentication
Chapter 3 - Security of Information Technology
✓Establishing proof of identity
What is Security?
• Nonrepudiation
1. Freedom from risk or danger; safety.
✓Ability to prove that the sender sent the data
2. Freedom from doubt, anxiety, or fear;
confidence. • Access Control

3. Something that gives or assures safety 4. Is ✓Access to information resources are regulated
the protection of assets. • Availability
The three main aspects are: ✓Computer assets are available to authorized
• Prevention parties when needed

• Detection

• Re-action Security

Why do we need Security? Measures of Information Technology

• Protect vital information while still allowing Firewall


access to those who need it Digital Certificate /Signature Encryption
• Provide authentication and access control for Anti-Virus
resources
FIREWALL
• Guarantee availability of resources
Information Technology Security
• A firewall stops information being changed or • In cryptography, encryption is the process of
stolen • It limits entry into a network to
transforming information (referred to as
authorized users and content
plaintext) using an algorithm (called a cipher) to
• Entry can then be controlled by registration make it unreadable to anyone except those
and password possessing special knowledge, usually referred
to as a key.
• But employees represent the biggest single
threat to networks • The reverse process, i.e., to make the
encrypted information readable again, is
• Employees have access to security procedures
referred to as DECRYPTION.
and know where important data is stored
USES OF ENCRYPTION

• Encryption can be used to protect data "at


Digital
rest", such as files on computers and storage
Certificates / Signature devices (e.g. USB flash drives). ➢Digital rights
management systems which prevent
• Digital signatures used to create commercial
unauthorized use or reproduction of
systems using public key encryption often using
copyrighted material and protect software
trusted third parties to send owner
against reverse engineering
identification and copy of public key
• Encryption is also used to protect data in
• Use of digital certificates:
transit
• Secret key (symmetric) encryption (both
• Encryption, by itself, can protect the
parties have an identical key known only to
confidentiality of messages.
them, but not a safe method)

• Public key (asymmetric) encryption (keys used


by sender and receiver are different but related VIRUSES
by a numerical code
Viruses

Worm
Digital Certificates / Signature

Digital certificates may include


• Computer programs that corrupt or delete
• User identification data files • Sent as attachments or embedded in
other files
• Issuing authority identification and digital
signature • User’s public key • Can spread itself over a network, doesn’t
need to be sent
• Expiry date of certificate
Types of Virus
• Class of certificate
Transient Virus
• Digital identification code for the certificate
• Attaches itself to specific program
ENCRYPTION
• Is run every time the program is run
Resident Virus

• Once loaded operates for duration of What is Risk?


computer’s use
• A possibility that THREAT exploits a
Logic Bomb VULNERABILITY in an asset and causes damage
or loss to the asset.
• Triggers when a given condition is met, such
as clock on computer matching a specified time • THREAT – Something that can potentially
cause damage to an organization, IT system or
Trojan Horse
network.
• Malicious program that hides within a friendly
• VULNERABILTY – A weakness in the
program
organization, IT Systems or network that can be
What is an Anti Virus? exploited by the threat

• Anti-virus is a software (computer program)


that scans files or your computer's memory for
certain patterns that may indicate an infection.
The patterns it looks for are based on the
signatures, or fingerprints, of known viruses.
Risks in Information and Technology
Once a virus is detected in the wild, the Anti-
Virus companies then release these new
patterns for your Anti virus software to use.
These updates come out daily by some Fraud
vendors. Virus authors are continually releasing Service
new and updated viruses, so it is important that
you have the latest definitions installed on your Interruptions and Delays
computer. Intrusions Information Manipulation
What is an Anti-Virus? Information Theft
Once you have installed an anti virus package, Error
you should scan your entire computer
periodically. Always leave your Anti-virus Denial of Service Attacks
software running so it can provide constant
Malicious Software
protection.
Website
Automatic scans- Depending what software you
choose; you may be able to configure it to Defacements Extortion
automatically scan specific files or directories
and prompt you at set intervals to perform
complete scans. Sniffing Spoofing Con Artists Phishing

Fraud
Risks in Information and Technology • Accessing or using a computer with the intent
to commit a fraudulent or other criminal act. •
Chapter 4
This can refer to illegally obtaining restricted
data or confidential financial information, Website Defacements
damaging or destroying information contained
• Is an act of gaining unauthorized access to an
in a computer.
environment or website. Extortion
Service Interruptions and Delays
• The practice of trying to get something
• An interruption in transmission that renders through force, threats or blackmail Sniffing
the Service unusable due to a total loss of signal
• Process of monitoring and capturing all data
for the Service
packets passing through given network •
Intrusions Sniffers are used by network/system
administrator to monitor and troubleshoot
• the act of wrongfully entering upon, seizing,
network traffic. Attackers use sniffers to capture
or taking possession of the property or
data packets containing sensitive information
information of another individual
such as password, account information etc.
Information Manipulation
Spoofing
• trying to get someone to believe something
• Specific type of cyber-attack in which
untrue is deceit. The type of communication
someone attempts to use a computer, device,
created by such deceitful intent is called a
or network to trick other computer networks by
deceptive message
masquerading as a legitimate entity
Information Theft
Con Artists
• Also known as identity fraud, is a crime in
• A person who cheats or tricks others by
which an imposter obtains key pieces of
persuading them to believe something that is
personally identifiable information (PII), such as
not true
Social Security or driver's license numbers, to
impersonate someone else. Phishing

Error • Type of online scam where criminals


impersonate legitimate organizations via email,
• An act or statement that is not right or true or
text message, advertisement or other means in
proper.
order to steal sensitive information.
• Error is used for failure to follow a model
correctly.
ISO
Denial of Service Attacks
272002:2005 - Defines Information Security as
• An attack meant to shut down a machine or
a prevention of the following:
network, making it inaccessible to its intended
users. Ensuring that

Malicious Software information is accessible only to those


Authorized to have access
• Any type of software that is intended to harm
or hack the user. • Attempt to steal your Safeguarding the
information, or they might simply do it for
accuracy and
malicious reasons.
completeness of information or personal data, and generating
profit
information and

processing methods
Computer Criminals
Ensuring that authorized users have access to
information and

associated assets when required Organized Crime

•Confidentiality • Individuals and groups with ongoing working

•Integrity relationships who make their living

•Availability primarily through activities that one or more


states deem illegal and criminal

Terrorist
Computer Criminals
• A person who uses unlawful violence and
intimidation, especially against civilians, in the
Hacker
pursuit of political aims.
• A person who uses computers to gain
Insider
unauthorized access to data
• A person within a group or
Script Kiddies
organization,
• a relatively unskilled individual who uses
especially someone privy to information
scripts or programs, such as a web shell, unavailable to

developed by others to attack computer others.


systems and networks and

deface websites,

according to the

programming and

hacking cultures

Cyber-Criminals

• People who use


INFORMATION TECHNOLOGY Contents:
technology to commit malicious activities on
⮚ Introduction
digital systems or
⮚ History of IT
networks with the

intention of stealing sensitive company ⮚ Present role of IT


⮚ Hardware and Software The new communication technology enables
people located in different places to work
⮚ Advantages & Disadvantages of IT together as if they were in the same office. Big
⮚ Benefits from IT multinational companies are already exploiting
this technology to achieve better use of the
1 resources of their seperate offices. In this way
projects can be shared between offices with
the application of the best expertise, and
INFORMATION around the clock

TECHNOLOGY 4

Information technology is a contemporary term


that describes the combination of computer
5
technology (hardware and software) with
telecommunications technology (data, image, Computer Use
and voice networks).
The purpose of a computer is to process data
2 into information

 Data consist of the raw facts and figures that


are processed into information
In some companies, this is referred to as
 Information is data that has been summarized
Management Information Services (or MIS) or
or otherwise manipulated for use in desicion
simply as Information Services (or IS).
making
These innovations enable the processing and
Hardware and Software
storage of enormous amounts of information,
along with rapid distribution of information  Hardware consist of all the machinery and
through communication networks equipment in a computer system
 IT has enabled the globalisation of the  Software , or programs , consist of all the
economy and competition, and caused large- electronic instructions that tell the computer
scale changes in many industries how to perform a task
 IT is also bringing a major shift in the job 6
market; resulting in a more polarised
occupational structure, consisting of Hardware and software

highly skilled=well paid jobs revolution

lower skilled=low wages 3  The diminishing cost of personal computers


has put computing power within the reach of
Communication: Basic need for most human even the smallest contractors.
activities
 Rapidly developing hardware performance,
Tarditional- telephone, fax, mail... coupled with the development of storage
drives with very large volumes, modems,
In the new information era- e-mail, internet,
scanners, and back up devices has made the
video conferencing
computer suitable for storage and distribution How is information technology being used in
of drawings and other data in electronic education?
format.
❖ E-mail
 The evolution of servers, network cards,
modems and routers have linked computers ❖ Distance learning
together providing a forum for community How are computers being used in health and
collaboration. medicine?
7 ❖ Telemedicine
Internet
❖ Robots
The value of the Internet to construction
How will computers affect my financial matters?
companies derives from its ability to easily ❖ Virtual money
connect globally to a vast amount of data,
which would otherwise have taken more time ❖ Micro-Credits
and money to organise. By exploiting the 10
resources of the Internet construction
companies can gain the following benefits. History and Development of Information
Technology
 Acceleration in the distribution of knowledge
resources within and out with the company  In the 1960s and 1970s, the term information
Promotion and marketing for the company technology (IT) was a little known phrase that
8 was used by those who worked in places like
banks and hospitals to store information. With
On-line services: The rapid development of the the paradigm shift to computing technology
Internet and the World Wide Web has enabled and "paperless" workplaces, information
many services that traditionally required face to technology has come to be a household phrase.
face meetings to be delivered on-line. It defines an industry that uses computers,
Internet distance learning: opportunities of networking, software programming, and other
university education, widening access to higher equipment and processes to store, process,
education (delivering teaching and learning to transmit, and protect information.
people who cannot attend lectures)-increases a 11
country’s competitiveness in a global market.
Software development and computer
E-business: Internet provides a virtual market
place for buyers, suppliers, distributors and programming were best left to the computer
sellers to exchange information, negotiate and scientists and mathematical engineers, due to
trade their complicated nature. As time passed and
technology advanced, such as with the advent
Teleworking: Flexibility in working conditions, of the personal computer in the 1980s and its
less office space, more productive workers. everyday use in the home and the workplace,
9 the world moved into the information age.

12
In fact, advances in information technology not
only provides a positive effect. Many also
Modern Technology
brought along the negative impact of
By the early 21st century, nearly every child in information technology advances.
the Western world, and many in other parts of
15
the world, knew how to use a personal
computer. Businesses' information technology Here's a positive impact of information
departments have gone from using storage technology development.
tapes created by a single computer operator to
 Make it easier for companies or individual
interconnected networks of employee
business transaction-based information
workstations that store information in a server
technology or so-called E Commerce.
farm, often somewhere away from the main
business site.  Simplify access to information needed for
various purposes.
13
16

Besides positive impacts, advances in


Technology facilitate our life
information technology have a negative effect.
Technology and information may be regarded as
 The rapid advancement in information
two things are mutually binding. Both support
technology, internet and other media, facilitate
functions that are fairly similar. Advances in
the entry of banned sites and violence.
technology are always facilitate the delivery of
information. The rate information from one  Ease of transactions via the Internet will
country can spread rapidly to other countries, provide opportunities to perform transacts
even to all countries, through increasingly forbidden, such as drug and contraband
sophisticated technology. transactions.
Advances in information technology provide As a result, anything that is required is
completed in quick time to be done by utilizing
enormous benefit in human survival.
flash technology as well. Finally, human life can
Information technology can provide facilities in
not be separated from the flow of information
various aspects of life. One area of life that has
technology.
a close relationship with the use of information
technology is the world of work. 17
14

Impact of Advanced Information Technology The Role of IT


Advances in information technology is to be  It is accepted that telecommunication is a
basic infrastructure necessary for economic and
grateful and appreciated as a remarkable
social development of a country.
achievement. Therefore, we must take
advantage of advances in information  This is even becoming more strong than ever
technology is to do positive things. Why is that? as information related economic activities are
growing.  Information and communications
technology may be described as the support of
the central nervous system of complex
societies, transmitting and processing
Thank you for your attention 21
information and commands among the various
parts of such societies.

 Internet plays a fundamental function in IT


role 18

Benefits from IT

Information and communications technology


carries on high promise both in human and
economic terms.

Benefits could be obtained in:

 Education

 Job training

 Health care

 Food security

 Environment management

 Government efficiency

19

IT is useful in all areas Many tourism businesses


are involved in developing their internet
services including traditional travel agents, tour
operators, national tourist offices, airlines,
hotels and other accommodation providers and
car hire firms.

20

You might also like