Top Banner
Software is a series of instructions to perform computer functions. Known as a program Software is necessary for hardware to operate. JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Software. intranet. e crime

• Software is a series of instructions to perform computer functions.

• Known as a program

• Software is necessary for hardware to operate.

JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.

Page 2: Software. intranet. e crime

• 1944 John von Neumann developed practical use of software.

• Opened the door for more software development.

JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.

Page 3: Software. intranet. e crime

System software • Operating systems & Application programs

• Communication software

• Utility software

• Entertainment software

• Education software

SAMSON, WANDA. "Software." Encyclopedia of Business and Finance. Ed. Burton S. Kaliski. Vol. 2. New York: Macmillan Reference USA, 2001. 780-783. Gale Virtual Reference Library. Web. 26 Sep. 2011.

Page 4: Software. intranet. e crime

Networking

Is the practice of linking computing devices together with hardware and software that

supports data communications across these devices.

Page 5: Software. intranet. e crime

Types of computer networks

LAN- Local Area Network

WLAN- Wireless Local Area Network

WAN- Wide Area Network

MAN- Metropolitan Area Network

SAN- Storage/Service/Server Area Network

CAN- Campus/Controller/Cluster Area Network

PAN- Personal Area Network

DAN- Desk Area Network

Page 6: Software. intranet. e crime

Intranet a computer network within an organization to share

information, limiting access only to employees or other authorized users, usually with a password.

Page 7: Software. intranet. e crime

Uses of Intranets

to deliver tools and applications, through the emailing system

for collaboration, such as teleconferencing or video conferencing

search corporate directories

keep track of sales

view customer relationship management tools

view individuals project management to advance productivity

and as a corporate culture-change platform

Page 8: Software. intranet. e crime
Page 9: Software. intranet. e crime

Benefits of Intranets

solves problem of linking different types of computers and integrates different operating systems

easy to use and inexpensive for both the company and employees

increases productivity and teamwork within the work force through calendars, emails, forums, and shared documents

Page 10: Software. intranet. e crime

Firewalls

Defined as a network device that enforces an organization’s security policy

Blocks out unwanted internet traffic based on content

Also used to block access to certain websites

Page 11: Software. intranet. e crime

Firewall Categories

Personal firewall works well for home use. These types of firewalls protect only one computer.

Departmental: for more than one computer but not for a company as large as the bigger corporations

Enterprise: Used for bigger companies with thousands of employees

Page 12: Software. intranet. e crime

Firewall diagramF

Page 13: Software. intranet. e crime

or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet.

Page 14: Software. intranet. e crime

An outside intruder through the use of a public telephone network connected to the computer

An employee or unauthorized person within the organization using a terminal or microcomputer

Page 15: Software. intranet. e crime

personal or financial gain

entertainment

revenge

personal favor

challenge of beating the system

accident

vandalism

Page 16: Software. intranet. e crime

Banks

Hospitals

Police

Stores

Individuals

Government agencies…

Page 17: Software. intranet. e crime
Page 18: Software. intranet. e crime

Theft in computer crime may refer to either unauthorized removal of physical items such as hardware or unauthorized removal or copying of data or information.

Computer / Internet Fraud is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines.

The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased).

Attacks on organizational information systems may be either physical or logical. There are several instances of web sites, products, and individuals being libeled or attacked by individuals or groups.

Page 19: Software. intranet. e crime

1. A person who enjoys computer technology and spends/wastes (lots of own) time learning/using/playing with computer systems.

2. A person who uses a computer to commit break into unauthorized data.

Cracker - always criminal; from Criminal Hacker

A computer-savvy person who attempts to gain unauthorized or illegal access to computer systems.

2 types of Crackers: Black Hat Crackers

White Hat Crackers

Page 20: Software. intranet. e crime

Virus

Trojan Horse

Worm

Logic Bomb

Micro Virus

Spyware

Password Sniffers…

Page 21: Software. intranet. e crime

Types:

Illegally downloading music or videos is called pirating.

Finding a picture or piece of writing on the Internet and claiming it as your own is called plagiarism.

Using technology to steal and use someone else's personal information is called identity theft.