INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

Post on 23-Dec-2015

218 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

INTRODUCTION TO INFORMATION TECHNOLOGYCourse Code: AFC 04

SECTION A:COMPUTER HARDWARE AND OPERATING SYSTEMS1. Computer hardware, software and operating systems

2. Core Windows tasks

3. Security and safeguarding your work

CHAPTER 1:COMPUTER HARDWARE, SOFTWARE AND OPERATING SYSTEMS1. Introduction to computer systems

2. Software and operating systems

INTRODUCTION TO COMPUTER SYSTEMS

The central processing unit (CPU) Input devices Output devices Storage devices

COMPUTER SYSTEMS

Input Process Output Storage

COMPUTER HARDWARE

• CPU

• RAM

• Mother Board

• Hard Drive

• Optical Drive

• Input / Output

• Peripheral Devices

SYSTEM ARCHITECTURES

Centralized

Decentralized

Network

Client Server Computing

SERVER

• A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide a network service

ServerWeb Server

Data ServerFile Server / Cloud

StoragePrint Server

Game Server

THE CENTRAL PROCESSING UNIT (CPU)

• Arithmetic logic unit (ALU)

• Control Unit (CU)

• Register

• Cache

• Buses

TYPES OF COMPUTER

Supercomputers

Mainframe

Mini-computers

Desk-top personal computers (PCs)

Portable laptops and notebooks computers

INPUT DEVICES

• Keyboards

• Touch Sensitive Screens and touch pads

• MICR

• OMR

• OCR

• Mice, Trackballs

• VTE (Voice Data Entry)

• Barcodes and QR Codes, EPOS

• Digital Camera

OUTPUT DEVICES

• Monitor / LCD / LED

• Printers

• Speakers

• Storage Devices

• Projector

PRINTERS

• Dot matrix• Thermal

Impact Printers

• Inkjet• Laser

Non Impact

STORAGE DEVICES

Primary Storage• RAM (Volatile/Temporary)

Secondary Storage• Flash Memory• Floppy Disk• CD• DVD• Blue Ray• Magnetic Tap• Cloud Drive

Tertiary Storage

Off-line Storage

SOFTWARE & OPERATING SYSTEM

System Software• Operating System• Utility Software• Communication Software

Application Software• Off-the-Shelf• Bespoke

Programming tools and Language Translator• C++, C#, Java, HTML

CHAPTER 3:SECURITY AND SAFEGUARDING YOUR WORK

1. INTRODUCTION TO COMPUTER SECURITY

INTRODUCTION TO COMPUTER SECURITY

The Internet

• Recorded keystrokes and stolen passwords • Spam (unwanted) and phishing (attempts to illicit confidential

information)emails

• Infection of other systems

THE INTERNET

• Harvesting and selling email addresses and passwords

• Accessing restricted, personal or client information

• Illegally distributing music, movies and software

THE INTERNET

• Hiding programs that launch attacks on other computers

• Generating large volumes of data transfers, slowing down the entire

system

THE BUSINESS IMPACT OF THE ABOVE SECURITY VIOLATIONS

• Risk to security and integrity of personal or confidential information e.g.identity theft, data corruption or destruction, unavailability of criticalinformation in an emergency.

• Loss of valuable business information.

• Loss of employee and public trust, embarrassment, adverse publicity,media coverage and news reports .

• Costly reporting requirements in the case of a compromise of certain types

of personal, financial and health information

• Internal disciplinary action(s) up to and including termination of

employment, as well as possible penalties, prosecution and the potential for

sanctions / lawsuits

THE BUSINESS IMPACT OF THE ABOVE SECURITY VIOLATIONS

BUSINESSES WILL HAVE AN INTERNET USAGE POLICY

• Limiting internet use to business purposes

• Notification of the ability to track internet usage

• Prohibiting access to sites that are offensive to gender, sexuality, religion,

nationality or politics

BUSINESSES WILL HAVE AN INTERNET USAGE POLICY

• Ensuring that downloads only occur from a safe and reputable website

• Prohibiting downloading executable (program) files as well as pirated

music, movies or software

• Prohibiting providing the users’ business email address to limit the

likelihood of SPAM and PHISHING

• Consequences of violation

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

• Use strong, cryptic passwords that can't be easily guessed - keep them

secret and change frequently.

• Make sure the computer's operating system and applications are protected

with all necessary security patches and updates.

• Make sure the computer is protected with up-to-date antivirus and antispyware software.

• Users should avoid clicking on unknown or unsolicited links or attachments,

and downloading unknown files or programs onto their computer.

• Avoid sending information via standard, unencrypted Wi-Fi (which is

especially easy for hackers to intercept). Encrypted Wi-Fi scrambles the

signal making it useless to hackers unless they have the codes to decrypt

It.

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

• Using "https" in the URL before entering any sensitive information or a

password. (The "s" stands for "secure".)

• Avoid standard, unencrypted e-mail and unencrypted Instant Messaging

(IM)

• Backup data frequently. Keep one backup copy off-site (i.e. at a separate

physical location)

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

• Perform frequent systems maintenance to ensure performance does not

erode

• Update hardware to keep pace with the speed of change of the software it

supports

• Take out adequate insurance cover for systems and software

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

• Invest in an uninterruptable power supply

• Document systems and keep the documentation up-to-date for system

amendments

EMAIL USAGE POLICY

• Prohibiting the use of personal email accounts for business matters

• Check email regularly

• Organize emails efficiently

• Use of professional standards and courtesy in messages

• Prohibit email use for unlawful purposes (copyright infringement, obscenity,

slander, fraud, computer tampering, etc.)

• Prohibiting email use outside your firm’s policies

• Prohibiting sending large attachments

EMAIL USAGE POLICY

• Prohibiting opening email attachments from unknown sources (as they may

contain malicious software)

• Prohibiting accessing email accounts of other individuals

• Prohibiting sharing email account passwords

EMAIL USAGE POLICY

• Prohibiting excessive personal use of your firm’s email

• Notification that the firm will monitor email

• Reporting of misuse

• Disciplinary action for any breach of policy

EMAIL USAGE POLICY

LOGGING OF USER-DATA

• Internet sites visited

• Log-in and log-out times (to calculate hours worked)

• Emails sent and received

• Idle time

• Which files and programs have been accessed

• Key strokes

• Conversations made using VoIP

• Number of log-in attempts and entries of an incorrect password

• Details of documents faxed and sent to a printer

LOGGING OF USER-DATA

WINDOWS ADMINISTRATOR ACCOUNTS

• Application (program) events

• Security-related events

• Setup events

• System events

• Forwarded events (events forwarded from other computers)

SAFEGUARDING STORED DATA

• Maintain version-control of files so that you are always working on the latest

version of a document. This is particularly important with documents that

require editorial input from multiple users.

• Employ a DBMS (database management system) to control access to

shared files to avoid editing conflicts

• Routinely checking the accuracy of standing data

• Avoid data duplication with stored data as this can lead to inconsistency in

master files and loss of integrity of client, customer or employee data .

QUESTION?

top related