Top Banner
INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04
37

INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

Dec 23, 2015

Download

Documents

Phebe McBride
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

INTRODUCTION TO INFORMATION TECHNOLOGYCourse Code: AFC 04

Page 2: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SECTION A:COMPUTER HARDWARE AND OPERATING SYSTEMS1. Computer hardware, software and operating systems

2. Core Windows tasks

3. Security and safeguarding your work

Page 3: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

CHAPTER 1:COMPUTER HARDWARE, SOFTWARE AND OPERATING SYSTEMS1. Introduction to computer systems

2. Software and operating systems

Page 4: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

INTRODUCTION TO COMPUTER SYSTEMS

The central processing unit (CPU) Input devices Output devices Storage devices

Page 5: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

COMPUTER SYSTEMS

Input Process Output Storage

Page 6: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

COMPUTER HARDWARE

• CPU

• RAM

• Mother Board

• Hard Drive

• Optical Drive

• Input / Output

• Peripheral Devices

Page 7: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SYSTEM ARCHITECTURES

Centralized

Decentralized

Network

Client Server Computing

Page 8: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SERVER

• A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide a network service

ServerWeb Server

Data ServerFile Server / Cloud

StoragePrint Server

Game Server

Page 9: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

THE CENTRAL PROCESSING UNIT (CPU)

• Arithmetic logic unit (ALU)

• Control Unit (CU)

• Register

• Cache

• Buses

Page 10: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

TYPES OF COMPUTER

Supercomputers

Mainframe

Mini-computers

Desk-top personal computers (PCs)

Portable laptops and notebooks computers

Page 11: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

INPUT DEVICES

• Keyboards

• Touch Sensitive Screens and touch pads

• MICR

• OMR

• OCR

• Mice, Trackballs

• VTE (Voice Data Entry)

• Barcodes and QR Codes, EPOS

• Digital Camera

Page 12: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

OUTPUT DEVICES

• Monitor / LCD / LED

• Printers

• Speakers

• Storage Devices

• Projector

Page 13: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

PRINTERS

• Dot matrix• Thermal

Impact Printers

• Inkjet• Laser

Non Impact

Page 14: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

STORAGE DEVICES

Primary Storage• RAM (Volatile/Temporary)

Secondary Storage• Flash Memory• Floppy Disk• CD• DVD• Blue Ray• Magnetic Tap• Cloud Drive

Tertiary Storage

Off-line Storage

Page 15: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SOFTWARE & OPERATING SYSTEM

System Software• Operating System• Utility Software• Communication Software

Application Software• Off-the-Shelf• Bespoke

Programming tools and Language Translator• C++, C#, Java, HTML

Page 16: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

CHAPTER 3:SECURITY AND SAFEGUARDING YOUR WORK

1. INTRODUCTION TO COMPUTER SECURITY

Page 17: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

INTRODUCTION TO COMPUTER SECURITY

The Internet

• Recorded keystrokes and stolen passwords • Spam (unwanted) and phishing (attempts to illicit confidential

information)emails

• Infection of other systems

Page 18: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

THE INTERNET

• Harvesting and selling email addresses and passwords

• Accessing restricted, personal or client information

• Illegally distributing music, movies and software

Page 19: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

THE INTERNET

• Hiding programs that launch attacks on other computers

• Generating large volumes of data transfers, slowing down the entire

system

Page 20: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

THE BUSINESS IMPACT OF THE ABOVE SECURITY VIOLATIONS

• Risk to security and integrity of personal or confidential information e.g.identity theft, data corruption or destruction, unavailability of criticalinformation in an emergency.

• Loss of valuable business information.

• Loss of employee and public trust, embarrassment, adverse publicity,media coverage and news reports .

Page 21: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Costly reporting requirements in the case of a compromise of certain types

of personal, financial and health information

• Internal disciplinary action(s) up to and including termination of

employment, as well as possible penalties, prosecution and the potential for

sanctions / lawsuits

THE BUSINESS IMPACT OF THE ABOVE SECURITY VIOLATIONS

Page 22: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

BUSINESSES WILL HAVE AN INTERNET USAGE POLICY

• Limiting internet use to business purposes

• Notification of the ability to track internet usage

• Prohibiting access to sites that are offensive to gender, sexuality, religion,

nationality or politics

Page 23: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

BUSINESSES WILL HAVE AN INTERNET USAGE POLICY

• Ensuring that downloads only occur from a safe and reputable website

• Prohibiting downloading executable (program) files as well as pirated

music, movies or software

• Prohibiting providing the users’ business email address to limit the

likelihood of SPAM and PHISHING

• Consequences of violation

Page 24: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

• Use strong, cryptic passwords that can't be easily guessed - keep them

secret and change frequently.

• Make sure the computer's operating system and applications are protected

with all necessary security patches and updates.

• Make sure the computer is protected with up-to-date antivirus and antispyware software.

Page 25: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Users should avoid clicking on unknown or unsolicited links or attachments,

and downloading unknown files or programs onto their computer.

• Avoid sending information via standard, unencrypted Wi-Fi (which is

especially easy for hackers to intercept). Encrypted Wi-Fi scrambles the

signal making it useless to hackers unless they have the codes to decrypt

It.

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

Page 26: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Using "https" in the URL before entering any sensitive information or a

password. (The "s" stands for "secure".)

• Avoid standard, unencrypted e-mail and unencrypted Instant Messaging

(IM)

• Backup data frequently. Keep one backup copy off-site (i.e. at a separate

physical location)

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

Page 27: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Perform frequent systems maintenance to ensure performance does not

erode

• Update hardware to keep pace with the speed of change of the software it

supports

• Take out adequate insurance cover for systems and software

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

Page 28: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE

• Invest in an uninterruptable power supply

• Document systems and keep the documentation up-to-date for system

amendments

Page 29: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

EMAIL USAGE POLICY

• Prohibiting the use of personal email accounts for business matters

• Check email regularly

• Organize emails efficiently

• Use of professional standards and courtesy in messages

Page 30: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Prohibit email use for unlawful purposes (copyright infringement, obscenity,

slander, fraud, computer tampering, etc.)

• Prohibiting email use outside your firm’s policies

• Prohibiting sending large attachments

EMAIL USAGE POLICY

Page 31: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Prohibiting opening email attachments from unknown sources (as they may

contain malicious software)

• Prohibiting accessing email accounts of other individuals

• Prohibiting sharing email account passwords

EMAIL USAGE POLICY

Page 32: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Prohibiting excessive personal use of your firm’s email

• Notification that the firm will monitor email

• Reporting of misuse

• Disciplinary action for any breach of policy

EMAIL USAGE POLICY

Page 33: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

LOGGING OF USER-DATA

• Internet sites visited

• Log-in and log-out times (to calculate hours worked)

• Emails sent and received

• Idle time

• Which files and programs have been accessed

• Key strokes

Page 34: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

• Conversations made using VoIP

• Number of log-in attempts and entries of an incorrect password

• Details of documents faxed and sent to a printer

LOGGING OF USER-DATA

Page 35: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

WINDOWS ADMINISTRATOR ACCOUNTS

• Application (program) events

• Security-related events

• Setup events

• System events

• Forwarded events (events forwarded from other computers)

Page 36: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

SAFEGUARDING STORED DATA

• Maintain version-control of files so that you are always working on the latest

version of a document. This is particularly important with documents that

require editorial input from multiple users.

• Employ a DBMS (database management system) to control access to

shared files to avoid editing conflicts

• Routinely checking the accuracy of standing data

• Avoid data duplication with stored data as this can lead to inconsistency in

master files and loss of integrity of client, customer or employee data .

Page 37: INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.

QUESTION?