(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.

Slides:



Advertisements
Similar presentations
Security metrics in SCADA system Master of Computer and Information Science Student: Nguyen Duc Nam Supervisor: Elena Sitnikova.
Advertisements

4 Information Security.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Introduction to Software Testing Chapter 9.3 Challenges in Testing Software Test Criteria and the Future of Testing Paul Ammann & Jeff Offutt
CGS 1000-SPRING 2008 Introduction to Computers and TechnologyIntroduction to Computers and Technology.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2010.
Brainstorm About Computer Networks Take 3-4 minutes to write –Include your name (I’ll collect and read, but not grade) What are some network applications?
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Carnegie Mellon Communications, Organizations & Technology Course Organization Syllabus Prithvi N. Rao H. John Heinz III School of Public Policy.
Introduction to Computers. Michael R. Izzo
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
IMS1805 Systems Analysis Topic 1(c): Analysis and Information Systems.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
COMP 14 – 02: Introduction to Programming Andrew Leaver-Fay August 31, 2005 Monday/Wednesday 3-4:15 pm Peabody 217 Friday 3-3:50pm Peabody 217.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
How S.M.A.R.T are your goals?. When setting a goal make sure it is… Specific M A R T Specific means… EXACT or CLEAR Saying that you want to do well in.
Moodle (Course Management Systems). Introduction.
Information Modeling and Database System
Welcome to CS 115! Introduction to Programming. Class URL Please write this down!
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
George W. Woodruff School of Mechanical Engineering, Georgia Tech ME6405 ME 6405/ME 4447 Introduction to Mechatronics Instructor: Professor Charles Ume.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Introduction to CPSC Introduction to CPSC Information Technology.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Cyber crime & Security Prepared by : Rughani Zarana.
Course Introduction Advanced Information Modeling and Database System แบบจำลองสารสนเทศและระบบฐานข้อมูลขั้นสูง Thursday –
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
7 Information Security.
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
WELCOME TO 7 TH GRADE ADVANCED SCIENCE Mrs. L. Krumgalz.
CGS 1000-FALL 2009 Intro to Computers & Tech. Topics  Syllabus  Faculty Website  Campus Cruiser Introduction to Computers and Technology.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for the Final Exam December 8, 2008.
+ Introduction to Class IST210 Class Lecture. + Course Objectives Understand the importance of data, databases, and database management Design and implement.
Introduction to LIS508 Thomas Krichel
(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 11 CHAPTER INFORMATION TECHNOLOGY, THE INTERNET, AND YOU.
SEC835 Security in Databases and Web applications Presentation.
Networking Basics 8th Grade
Engineering Practicum Baltimore Polytechnic Institute M. Scott
Dr. Jeff Cummings MIS323 Business Telecommunications.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Computer skills level one. Grades Distribution: 5% first Quiz 20% first MidTerm Exame. 5% Second Quiz 20% second MidTerm Exame. 10% (Project || participation.
IMS 4212: Course Introduction 1 Dr. Lawrence West, Management Dept., University of Central Florida ISM 4212 Dr. Larry West
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Basics Attendance & Progress RulesResources Class Syllabus
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Responsibilities CS 4501 / 6501 Software Testing
Common Methods Used to Commit Computer Crimes
E 96 Introduction to Engineering Design Peter Reiher UCLA
Responsibilities CS 4640 Programming Languages for Web Applications
How SCADA Systems Work?.
CIS 560Competitive Success/tutorialrank.com
CIS 560 Education for Service-- tutorialrank.com.
Design and Implementation of Software for the Web
Pima Medical Institute Online Education
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Pima Medical Institute Online Education
Information Technology and E-Commerce
Presentation transcript:

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology IT 101 Week Five Thursday Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 2 Admin. HW Reasons for HW grades 1. HW that just answers the question gets a “B” 2. HW that is incomplete gets “D” 3. HW that is sloppy and / or illegible will also get a lower grade 4. Very good essay papers do not begin with: “Yes” I have used an anti-virus program before 5. “A” essay papers begin: “Due to the alarming and overwhelming threat of worms, Trojans, and hackers, I installed an anti-virus software on my computer” 6. “No” HW will be assigned next week so that you can study for your Mid-Term

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 3 Course Syllabus Week 1: Overall Course discussion and Computers and You (Ch. 1) Week 2: Projects Assigned and The Internet and The World Wide Web (Ch. 2) Week 3: Wired and Wireless Communications (CH. 3) Week 4: Submit Project Topic & Sources and System Software (Ch. 4) Week 5: Application Software: Tools for Productivity (Ch. 5) Week 6: Inside The System Unit (Ch. 6) Week 7: Tuesday Midterm Exam (first six weeks) & (Thursday) Input/Output and Storage (Ch. 7) Week 8: Networks: Communicating and Sharing Resources (Ch. 8) Week 9: Piracy, Crime and Security (Ch. 9) Week 10: Programming Languages & Program development (Ch. 11) Week 11: Databases and Information Systems (Ch. 12) Week 12: Project Report Due & Project Presentations Begin System Analysis and Design (Ch. 13) Week 13: Project Presentations and Enterprise Computing (Ch. 14) plus Week 14: Project Presentations and Careers and Certifications (Ch. 10) Week 15: Final Exam

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 4 Admin. Mid-Term exam will be given on Tuesday Oct. 17 th (do not miss your class) Week 12: “All” Project Reports Due on (Tuesday) Nov. 21 st & Project Presentations Will Also Begin

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 5 Wk 5 HW Tuesday, Chapter 5 - Applications, page 212 "Short Answer" questions 1 and 5, (40 grade points) Thursday, Chapter 5 - UCITA, write at least a one page essay to discuss: 1) what is UCITA (research the web), 2) pros, 3) cons and 4) your conclusions (60 grade points)

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 6 IT Computers 101 Lets Go! Chapter Five – SCADA Systems

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 7

The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 8 SCADA Systems SCADA - Digital control systems, such as SCADA systems, supervise and control real-world structures like gas pipelines, oil refineries, and power grids -- and they can be manipulated remotely. Supervisory Control and Data Acquisition Systems -- were primarily designed to be stand alone devices that, looked at a particular thing, like a gas pipeline, or something in an oil refinery, or something like that, and simply report information back, originally over a telephone line. Now, the main vulnerabilities of SCADA systems are built from the fact that we've taken something of very limited control, and we have now connected it up to an Internet that is accessible by many other people. So more people have access to the SCADA system than was ever intended to have. *PBS.ORG - Frontline Cyber War - Vulnerabilities of SCADA Systems

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 9 SCADA Systems Also, to make SCADA systems cost-effective in the future, we no longer build special purpose operating systems for them. We put on standard vendor operating systems, with additional vulnerabilities that are well known. So now we have systems that are well understood, connected to the Internet, but still providing a rather critical function in the element itself. I liken it very much to my own thermostat at home. My thermostat at home is protected, because I keep my front door locked, so no one can come in and change my heat around. If I add a wireless element to my thermostat, suddenly I can control it from my computer. I can turn the heat up when I'm at work, so the house is warm when I get home. I can understand every month exactly what my fluctuations are in temperature.

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 10 SCADA Systems Unfortunately, because it's wireless, someone could sit outside my house, now, in the car, with a laptop, and at 4:00 in the morning turn off my heat, in the dead of winter. Or I could be away on vacation, and they could turn it off so my pipes would freeze. SCADA systems are a lot like this. We had walls around SCADA systems for a long time, and we have poked holes in those walls to give us more cost effective access to those SCADA systems, with all of the vulnerabilities that that implies. cyber war! vulnerabilities scada systems PBS.mht supervisory control data acquisition factory laboratory industrial automation applications systems software manufacturing.mht

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 11 Good Luck! Mid-Term exam will be given on Tuesday Oct. 17th (do not miss your class) NJIT has undergone a remarkable transformation, growing from a college principally characterized as an undergraduate teaching college to a nationally recognized scientific technological research university Top 10 Technology Universities by R&D Expenditure 1. Massachusetts Institute of Technology 2. Georgia Institute of Technology 3. California Institute of Technology 4. Virginia Polytechnic Institute 5. Carnegie Mellon University 6. Texas Tech University 7. New Jersey Institute of Technology 8. Rensselaer Polytechnic Institute 9. Northeastern University 10. Michigan Technological University