2. Definition:
Software is the set of instruction that enable the
user to communicate with computer and
perform its task . with out software hardware
is nothing.
Example:
without browser you cannot surf internet. In this
way with out operating system you cannot run
browser and do any thing on computer.
3. Two types of software:
System software:
system software is a program that is designs to
run hardware and application programs like
Mac , windows , etc.
Application software:
Application software is designs to help the user
to complete its task. in other words the
applications software are the application that
run on computer .
4. Software's are commonly uses in every field of
life because of the increase of the use of
computer in every field.
Business
Medical field
Home
Education
Industries
Communication
5. Business:
Almost every business uses computer to complete
its daily tasks . from making contacts with
clients, input records and generating reports and
allow business more mannered way as tradition
like paper work.
Marketing:
Computer allows business to make websites,
stunning ads and a complete marketing
operations . marketing videos editing and creating
marketing ads in-home with special software's.
6. At home:
At home computer are used for variety of
purposes . Computer in home providing
training , technical reports, internet for
students , families in participating and for
calculating monthly expenses.
Education:
Computer is used in education in teacher
learning, testing and evaluation ,guidance
purpose and school administration.
7. Computer are also used for beneficial as well as illegal and
destroy purpose . with the help of it people committing ,
stealing data and cause damage other records etc. Uses of
software in hacking purpose and disobey privacy policies
of other . A license agreement is the establish a legal
agreement between customer and the man or company that
develop the software . if a person is use this software with
out purchasing is misuse of software.
Example:
If a person buy software from un authorized site and then he
want to activate it . It not activate because the license is
used by the previous user from which he purchase . and
software id not registered because license is not
transferable.
8. Risk:
Risk is future uncertain events with a probability( امکان( of occurrence
and a potential for loss.
Product risk is the possibility that the system or software might fail to
satisfy or fulfill some reasonable expectation of the customer, user,
or stakeholder. (Some authors also called the ‘Product risks’ as
‘Quality risks’ as they are risks to the quality of the product.)
9. If the software skips some key function
that the customers specified, the users
required or the stakeholders were
promised.
If the software is unreliable and frequently fails to
work.
If software fail in ways that cause financial or other
damage to a user or the company that user works for.
If the software has problems related to a particular
quality characteristic, which might not be
functionality, but rather security, reliability, usability,
maintainability or performance.
10. Definition:
The state of being protect against the unauthorized use of
information especially electronic data or the measure taken to
achieve this,
“the growing use of mobile applications is posing a risk to
information security”.
11. Use of IT across businesses
Fast growth of Internet
Commercialization of Internet
Web site defacement
Theft of confidential data
Financial Frauds
Increased rate of cyber crime issues.
12. Cyber crime is defined as criminal activity involving the
IT infrastructure, including illegal access, illegal interception,
data interference, misuse of devices, ID theft and electronic
fraud.
14. It is the principle that information will
not be disclosed to unauthorized
subjects.
Examples:
Unauthorized network data sniffing.
Listening a phone conversation.
15. It is the protection of system information or process from
intentional or accidental unauthorized changes.
16. It defines that information or resources are available when
required.
17. Information Security does not mean only installing antivirus
and firewalls.
Information security tends to protect hardware, software, data,
procedures, records, supplies and human resources.
Information assets are those resources that store, transport,
create, use or are information.
18. Administrative Controls- Policies, standards,
procedures, guidelines, employee screening, change control,
Security awareness trainings.
Technical Controls- Access controls, encryption, Firewalls,
IDS, IPS,HTTPS.
Physical Controls- controlled physical access to resources,
monitoring, no USB or CDROM etc.