Presentation is loading. Please wait.

Presentation is loading. Please wait.

(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology.

Similar presentations


Presentation on theme: "(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology."— Presentation transcript:

1 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology IT 101 Week Five Thursday Professor, Stephen W. Foster Information Technology Program New Jersey Institute of Technology

2 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 2 Admin. HW Reasons for HW grades 1. HW that just answers the question gets a “B” 2. HW that is incomplete gets “D” 3. HW that is sloppy and / or illegible will also get a lower grade 4. Very good essay papers do not begin with: “Yes” I have used an anti-virus program before 5. “A” essay papers begin: “Due to the alarming and overwhelming threat of worms, Trojans, and hackers, I installed an anti-virus software on my computer” 6. “No” HW will be assigned next week so that you can study for your Mid-Term

3 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 3 Course Syllabus Week 1: Overall Course discussion and Computers and You (Ch. 1) Week 2: Projects Assigned and The Internet and The World Wide Web (Ch. 2) Week 3: Wired and Wireless Communications (CH. 3) Week 4: Submit Project Topic & Sources and System Software (Ch. 4) Week 5: Application Software: Tools for Productivity (Ch. 5) Week 6: Inside The System Unit (Ch. 6) Week 7: Tuesday Midterm Exam (first six weeks) & (Thursday) Input/Output and Storage (Ch. 7) Week 8: Networks: Communicating and Sharing Resources (Ch. 8) Week 9: Piracy, Crime and Security (Ch. 9) Week 10: Programming Languages & Program development (Ch. 11) Week 11: Databases and Information Systems (Ch. 12) Week 12: Project Report Due & Project Presentations Begin System Analysis and Design (Ch. 13) Week 13: Project Presentations and Enterprise Computing (Ch. 14) plus Week 14: Project Presentations and Careers and Certifications (Ch. 10) Week 15: Final Exam

4 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 4 Admin. Mid-Term exam will be given on Tuesday Oct. 17 th (do not miss your class) Week 12: “All” Project Reports Due on (Tuesday) Nov. 21 st & Project Presentations Will Also Begin

5 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 5 Wk 5 HW Tuesday, Chapter 5 - Applications, page 212 "Short Answer" questions 1 and 5, (40 grade points) Thursday, Chapter 5 - UCITA, write at least a one page essay to discuss: 1) what is UCITA (research the web), 2) pros, 3) cons and 4) your conclusions (60 grade points)

6 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 6 IT Computers 101 Lets Go! Chapter Five – SCADA Systems

7 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 7

8 The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 8 SCADA Systems SCADA - Digital control systems, such as SCADA systems, supervise and control real-world structures like gas pipelines, oil refineries, and power grids -- and they can be manipulated remotely. Supervisory Control and Data Acquisition Systems -- were primarily designed to be stand alone devices that, looked at a particular thing, like a gas pipeline, or something in an oil refinery, or something like that, and simply report information back, originally over a telephone line. Now, the main vulnerabilities of SCADA systems are built from the fact that we've taken something of very limited control, and we have now connected it up to an Internet that is accessible by many other people. So more people have access to the SCADA system than was ever intended to have. *PBS.ORG - Frontline Cyber War - Vulnerabilities of SCADA Systems

9 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 9 SCADA Systems Also, to make SCADA systems cost-effective in the future, we no longer build special purpose operating systems for them. We put on standard vendor operating systems, with additional vulnerabilities that are well known. So now we have systems that are well understood, connected to the Internet, but still providing a rather critical function in the element itself. I liken it very much to my own thermostat at home. My thermostat at home is protected, because I keep my front door locked, so no one can come in and change my heat around. If I add a wireless element to my thermostat, suddenly I can control it from my computer. I can turn the heat up when I'm at work, so the house is warm when I get home. I can understand every month exactly what my fluctuations are in temperature.

10 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 10 SCADA Systems Unfortunately, because it's wireless, someone could sit outside my house, now, in the car, with a laptop, and at 4:00 in the morning turn off my heat, in the dead of winter. Or I could be away on vacation, and they could turn it off so my pipes would freeze. SCADA systems are a lot like this. We had walls around SCADA systems for a long time, and we have poked holes in those walls to give us more cost effective access to those SCADA systems, with all of the vulnerabilities that that implies. http://www.pbs.org\frontline cyber war! vulnerabilities scada systems PBS.mht http://www.htservices.com/index.htm\SCADA supervisory control data acquisition factory laboratory industrial automation applications systems software manufacturing.mht

11 (c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 11 Good Luck! Mid-Term exam will be given on Tuesday Oct. 17th (do not miss your class) NJIT has undergone a remarkable transformation, growing from a college principally characterized as an undergraduate teaching college to a nationally recognized scientific technological research university. 2003 Top 10 Technology Universities by R&D Expenditure 1. Massachusetts Institute of Technology 2. Georgia Institute of Technology 3. California Institute of Technology 4. Virginia Polytechnic Institute 5. Carnegie Mellon University 6. Texas Tech University 7. New Jersey Institute of Technology 8. Rensselaer Polytechnic Institute 9. Northeastern University 10. Michigan Technological University


Download ppt "(c) 2006 Stephen W. Foster The Edge in Knowledge New Jersey Institute of Technology (c) 2006 Stephen W. Foster 1 Introduction to Information Technology."

Similar presentations


Ads by Google