INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.
-
Upload
phebe-mcbride -
Category
Documents
-
view
218 -
download
0
Transcript of INTRODUCTION TO INFORMATION TECHNOLOGY Course Code: AFC 04.
SECTION A:COMPUTER HARDWARE AND OPERATING SYSTEMS1. Computer hardware, software and operating systems
2. Core Windows tasks
3. Security and safeguarding your work
CHAPTER 1:COMPUTER HARDWARE, SOFTWARE AND OPERATING SYSTEMS1. Introduction to computer systems
2. Software and operating systems
INTRODUCTION TO COMPUTER SYSTEMS
The central processing unit (CPU) Input devices Output devices Storage devices
COMPUTER HARDWARE
• CPU
• RAM
• Mother Board
• Hard Drive
• Optical Drive
• Input / Output
• Peripheral Devices
SERVER
• A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide a network service
ServerWeb Server
Data ServerFile Server / Cloud
StoragePrint Server
Game Server
THE CENTRAL PROCESSING UNIT (CPU)
• Arithmetic logic unit (ALU)
• Control Unit (CU)
• Register
• Cache
• Buses
TYPES OF COMPUTER
Supercomputers
Mainframe
Mini-computers
Desk-top personal computers (PCs)
Portable laptops and notebooks computers
INPUT DEVICES
• Keyboards
• Touch Sensitive Screens and touch pads
• MICR
• OMR
• OCR
• Mice, Trackballs
• VTE (Voice Data Entry)
• Barcodes and QR Codes, EPOS
• Digital Camera
STORAGE DEVICES
Primary Storage• RAM (Volatile/Temporary)
Secondary Storage• Flash Memory• Floppy Disk• CD• DVD• Blue Ray• Magnetic Tap• Cloud Drive
Tertiary Storage
Off-line Storage
SOFTWARE & OPERATING SYSTEM
System Software• Operating System• Utility Software• Communication Software
Application Software• Off-the-Shelf• Bespoke
Programming tools and Language Translator• C++, C#, Java, HTML
INTRODUCTION TO COMPUTER SECURITY
The Internet
• Recorded keystrokes and stolen passwords • Spam (unwanted) and phishing (attempts to illicit confidential
information)emails
• Infection of other systems
THE INTERNET
• Harvesting and selling email addresses and passwords
• Accessing restricted, personal or client information
• Illegally distributing music, movies and software
THE INTERNET
• Hiding programs that launch attacks on other computers
• Generating large volumes of data transfers, slowing down the entire
system
THE BUSINESS IMPACT OF THE ABOVE SECURITY VIOLATIONS
• Risk to security and integrity of personal or confidential information e.g.identity theft, data corruption or destruction, unavailability of criticalinformation in an emergency.
• Loss of valuable business information.
• Loss of employee and public trust, embarrassment, adverse publicity,media coverage and news reports .
• Costly reporting requirements in the case of a compromise of certain types
of personal, financial and health information
• Internal disciplinary action(s) up to and including termination of
employment, as well as possible penalties, prosecution and the potential for
sanctions / lawsuits
THE BUSINESS IMPACT OF THE ABOVE SECURITY VIOLATIONS
BUSINESSES WILL HAVE AN INTERNET USAGE POLICY
• Limiting internet use to business purposes
• Notification of the ability to track internet usage
• Prohibiting access to sites that are offensive to gender, sexuality, religion,
nationality or politics
BUSINESSES WILL HAVE AN INTERNET USAGE POLICY
• Ensuring that downloads only occur from a safe and reputable website
• Prohibiting downloading executable (program) files as well as pirated
music, movies or software
• Prohibiting providing the users’ business email address to limit the
likelihood of SPAM and PHISHING
• Consequences of violation
SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE
• Use strong, cryptic passwords that can't be easily guessed - keep them
secret and change frequently.
• Make sure the computer's operating system and applications are protected
with all necessary security patches and updates.
• Make sure the computer is protected with up-to-date antivirus and antispyware software.
• Users should avoid clicking on unknown or unsolicited links or attachments,
and downloading unknown files or programs onto their computer.
• Avoid sending information via standard, unencrypted Wi-Fi (which is
especially easy for hackers to intercept). Encrypted Wi-Fi scrambles the
signal making it useless to hackers unless they have the codes to decrypt
It.
SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE
• Using "https" in the URL before entering any sensitive information or a
password. (The "s" stands for "secure".)
• Avoid standard, unencrypted e-mail and unencrypted Instant Messaging
(IM)
• Backup data frequently. Keep one backup copy off-site (i.e. at a separate
physical location)
SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE
• Perform frequent systems maintenance to ensure performance does not
erode
• Update hardware to keep pace with the speed of change of the software it
supports
• Take out adequate insurance cover for systems and software
SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE
SAFEGUARDING DATA – CONTROLS AND BEST PRACTICE
• Invest in an uninterruptable power supply
• Document systems and keep the documentation up-to-date for system
amendments
EMAIL USAGE POLICY
• Prohibiting the use of personal email accounts for business matters
• Check email regularly
• Organize emails efficiently
• Use of professional standards and courtesy in messages
• Prohibit email use for unlawful purposes (copyright infringement, obscenity,
slander, fraud, computer tampering, etc.)
• Prohibiting email use outside your firm’s policies
• Prohibiting sending large attachments
EMAIL USAGE POLICY
• Prohibiting opening email attachments from unknown sources (as they may
contain malicious software)
• Prohibiting accessing email accounts of other individuals
• Prohibiting sharing email account passwords
EMAIL USAGE POLICY
• Prohibiting excessive personal use of your firm’s email
• Notification that the firm will monitor email
• Reporting of misuse
• Disciplinary action for any breach of policy
EMAIL USAGE POLICY
LOGGING OF USER-DATA
• Internet sites visited
• Log-in and log-out times (to calculate hours worked)
• Emails sent and received
• Idle time
• Which files and programs have been accessed
• Key strokes
• Conversations made using VoIP
• Number of log-in attempts and entries of an incorrect password
• Details of documents faxed and sent to a printer
LOGGING OF USER-DATA
WINDOWS ADMINISTRATOR ACCOUNTS
• Application (program) events
• Security-related events
• Setup events
• System events
• Forwarded events (events forwarded from other computers)
SAFEGUARDING STORED DATA
• Maintain version-control of files so that you are always working on the latest
version of a document. This is particularly important with documents that
require editorial input from multiple users.
• Employ a DBMS (database management system) to control access to
shared files to avoid editing conflicts
• Routinely checking the accuracy of standing data
• Avoid data duplication with stored data as this can lead to inconsistency in
master files and loss of integrity of client, customer or employee data .