Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing Information Resources and Security

Similar presentations


Presentation on theme: "Managing Information Resources and Security"— Presentation transcript:

1 Managing Information Resources and Security
Chapter 4 and Chapter 5 Managing Information Resources and Security

2 The Network Computing Infrastructure

3 ISPs (Internet Service Providers)
Retail providers that deal with “last mile of service” Offer both narrowband (traditional telephone modem connection at 56.6 Kbps) and broadband (service based on DSL (Digital Subscriber Lines), cable modem, and satellite)

4 Broadband Service Choices
Digital Subscriber Line (DSL): High-speed access through ordinary telephone lines Cable modem: Piggybacks digital access to Internet on top of analog video cable line Satellite: high-speed downloads, slower uploads

5 Internet II: The Future Infrastructure
Internet II: Second era of Internet being built by private corporations, universities, government agencies To appreciate benefits, must understand limitations of the Internet’s current infrastructure Bandwidth limitations Quality of service limitations Network architecture limitations Language development limitations Wired Internet limitations

6 Telephone-based Wireless Internet Access
Different standards Global System for Mobile Communications (GSM): used primarily in Europe Code Division Multiple Access (CDMA): used primarily in U.S. Third generation (3G) cellular networks

7 Web Servers and Web Clients
Web server software: Enables a computer to deliver Web pages written in HTML or XML to clients on network that request this service by sending an HTTP request Basic capabilities: Security services, FTP, search engine, data capture Term Web server also used to refer to physical computer that runs Web server software Web client: Any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages

8 Web Browsers Primary purpose to display Web pages
Internet Explorer (75%) and Mozila (20%) dominate the market Other browsers include: Netscape Opera Safari (for Apple)

9 The Internet and Web: Features
Internet and Web features on which the foundations of e-commerce are built include: Instant messaging Search engines Intelligent agents (bots) Online forums and chat Streaming media Cookies

10 E-mail One of the most used applications of the Internet
Uses a series of protocols to enable messages containing text, images, sound, video clips, etc., to be transferred from one Internet user to another Also allows attachments Can be an effective marketing tool Spam a worsening problem

11 Instant Messaging One of fastest growing forms of online human communication Displays words typed on a computer almost instantly, and recipients can then respond immediately in the same way Different proprietary systems offered by AOL, MSN, Yahoo, and Google

12 Search Engines Identifies Web pages that appear to match keywords (queries) entered by a user, and provides list of best matches based on one or more of a variety of techniques No longer simply search engines, but also shopping tools and advertising vehicles (search engine marketing)

13 Local Area Networks Connects computers and other digital devices within 2000 ft radius Cabling or wireless technology links computers, network interface cards, and software Ethernet Network Operating System (NOS) Client/server or peer-to-peer architecture Star, bus, and ring topologies

14 A local area network (LAN)

15 Network topologies Figure 8-8

16 Wireless Local Area Networks (WLANs)
Wi-Fi: High-speed, fixed broadband wireless LAN. Different versions for home and business market. Limited range WiMax: High-speed, medium range broadband wireless metropolitan area network Bluetooth: Low-speed, short range connection Ultra-Wideband (UWB): Low power, short-range high bandwidth network

17 Wi-Fi Networks

18 Wide Area Networks Span broad geographic distances
Can consist of combination of: Switched lines Dedicated lines Microwave Satellite communications Private WANs expensive to support

19 Wide Area Networks Metropolitan Area Network (MAN)
Scope between LAN and WAN Limited distance; faster and less expensive than WAN Value-Added Networks Private, third-party managed, data only networks Subscription basis

20 Electronic Mail and Groupware
Eliminates telephone tag and costly long-distance telephone charges Groupware Enables work groups at different locations to participate in discussion forums and work on shared documents and projects

21 Voice Mail and Fax Voice mail Fax
Digitizes spoken message and transmits it over a network Fax Digitizes and transmits documents over telephone lines

22 Teleconferencing, Dataconferencing, and Videoconferencing
Ability to confer with a group of people simultaneously Data conferencing Two or more users can edit and modify data files simultaneously Videoconferencing Participants are able to see each other over video screens

23 Electronic Data Interchange
Computer-to-computer exchange between two organizations of standard transaction documents, such as invoices, purchase orders Minimizes paper-handling and data input; lowers transaction costs Transmits structured data with fields, unlike

24 Electronic data interchange (EDI)

25 How Google Works

26 Other Internet and Web Features Relevant to E-commerce
Online forums/chat: Enables users to communicate with each other via computer. Online chat occurs in real time (simultaneously) Streaming media: Enables music, video and other large files to be sent to users in chunks so that when received and played, file comes through uninterrupted

27 Internet II and E-commerce: New and Disruptive Web Features and Services
Blogs: Personal Web page that typically contains a series of chronological entries by its author, and links to related Web pages Really Simple Syndication (RSS): Allows users to have digital content automatically sent to them; typically used for news Podcasting: Audio presentation stored as an audio file and available for download from Web

28 Internet II and E-commerce: New and Disruptive Web Features and Services
Wiki: Allows user to easily add and edit content on a Web page New music and video services: Videocasts; digital video on demand Internet Telephony: Use Voice Over Internet Protocol (VOIP) and Internet’s packet-switched network to transmit voice and other forms of audio communication over the Internet

29 Threats to Information Security
A threat to an information resource is any danger to which a system may be exposed. The exposure of an information resources is the harm, loss or damage that can result if a threat compromises that resource. A system’s vulnerability is the possibility that the system will suffer harm by a threat. Risk is the likelihood that a threat will occur. Information system controls are the procedures, devices, or software aimed at preventing a compromise to the system.

30 Information Threats Viruses. Segments of computer code that performs unintended actions ranging from merely annoying to destructive. Worms. Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication. Trojan horses. Software progams that hide in other computer programs and reveal their designed behavior only when they are activated.

31 Information Threats (Continued)
Back doors or trap doors. Typically a password, known only to the attacker, that allows access to the system without having to go through any security. Denial-of-service. An attacker sends so many information requests to a target system that the target cannot handle them successfully and can crash the entire system. Spam. Unsolicited , usually for purposes of advertising.

32 Information Threats (Continued)
Spyware. Software that gathers user information through the user’s Internet connection without their knowledge (i.e. keylogger, password capture). Cookies. Small amount of information that Web sites store on your computer, temporarily or more-or-less permanently.

33 What is Computer Virus? A Computer Virus is a computer program which distributes copies of itself, even without permission or knowledge of the user. To distribute itself, a virus needs to be executed or interpreted. Viruses often hide themselves inside other programs to be executed. Computer viruses can spread very fast.There are many viruses operating in the general Internet today, and new ones are discovered every day.

34 Computer viruses are software programs that are deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet. Viruses often slow things down and cause other problems in the process. by Microsoft …

35 How a virus works


Download ppt "Managing Information Resources and Security"

Similar presentations


Ads by Google