• Software is a series of instructions to perform computer functions. • Known as a program • Software is necessary for hardware to operate. JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
• Software is a series of instructions to perform computer functions.
• Known as a program
• Software is necessary for hardware to operate.
JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.
• 1944 John von Neumann developed practical use of software.
• Opened the door for more software development.
JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.
System software • Operating systems & Application programs
• Communication software
• Utility software
• Entertainment software
• Education software
SAMSON, WANDA. "Software." Encyclopedia of Business and Finance. Ed. Burton S. Kaliski. Vol. 2. New York: Macmillan Reference USA, 2001. 780-783. Gale Virtual Reference Library. Web. 26 Sep. 2011.
Networking
Is the practice of linking computing devices together with hardware and software that
supports data communications across these devices.
Types of computer networks
LAN- Local Area Network
WLAN- Wireless Local Area Network
WAN- Wide Area Network
MAN- Metropolitan Area Network
SAN- Storage/Service/Server Area Network
CAN- Campus/Controller/Cluster Area Network
PAN- Personal Area Network
DAN- Desk Area Network
Intranet a computer network within an organization to share
information, limiting access only to employees or other authorized users, usually with a password.
Uses of Intranets
to deliver tools and applications, through the emailing system
for collaboration, such as teleconferencing or video conferencing
search corporate directories
keep track of sales
view customer relationship management tools
view individuals project management to advance productivity
and as a corporate culture-change platform
Benefits of Intranets
solves problem of linking different types of computers and integrates different operating systems
easy to use and inexpensive for both the company and employees
increases productivity and teamwork within the work force through calendars, emails, forums, and shared documents
Firewalls
Defined as a network device that enforces an organization’s security policy
Blocks out unwanted internet traffic based on content
Also used to block access to certain websites
Firewall Categories
Personal firewall works well for home use. These types of firewalls protect only one computer.
Departmental: for more than one computer but not for a company as large as the bigger corporations
Enterprise: Used for bigger companies with thousands of employees
Firewall diagramF
or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet.
An outside intruder through the use of a public telephone network connected to the computer
An employee or unauthorized person within the organization using a terminal or microcomputer
personal or financial gain
entertainment
revenge
personal favor
challenge of beating the system
accident
vandalism
Banks
Hospitals
Police
Stores
Individuals
Government agencies…
Theft in computer crime may refer to either unauthorized removal of physical items such as hardware or unauthorized removal or copying of data or information.
Computer / Internet Fraud is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines.
The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased).
Attacks on organizational information systems may be either physical or logical. There are several instances of web sites, products, and individuals being libeled or attacked by individuals or groups.
1. A person who enjoys computer technology and spends/wastes (lots of own) time learning/using/playing with computer systems.
2. A person who uses a computer to commit break into unauthorized data.
Cracker - always criminal; from Criminal Hacker
A computer-savvy person who attempts to gain unauthorized or illegal access to computer systems.
2 types of Crackers: Black Hat Crackers
White Hat Crackers
Virus
Trojan Horse
Worm
Logic Bomb
Micro Virus
Spyware
Password Sniffers…
Types:
Illegally downloading music or videos is called pirating.
Finding a picture or piece of writing on the Internet and claiming it as your own is called plagiarism.
Using technology to steal and use someone else's personal information is called identity theft.