SlideShare a Scribd company logo
1 of 21
• Software is a series of instructions to
    perform computer functions.

  • Known as a program

  • Software is necessary for hardware
    to operate.

JOHNSON, ERIC. "Computer Software." Encyclopedia of
Communication and Information. Ed. Jorge Reina Schement. Vol. 1.
New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual
Reference Library. Web. 26 Sep. 2011.
•   1944 John von Neumann developed
                   practical use of software.
           •   Opened the door for more software
                         development.



JOHNSON, ERIC. "Computer Software." Encyclopedia of
Communication and Information. Ed. Jorge Reina Schement. Vol. 1.
New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual
Reference Library. Web. 26 Sep. 2011.
System software
   • Operating systems & Application
   programs
   • Communication                • Entertainment
     software                       software

   • Utility software             • Education
                                    software
SAMSON, WANDA. "Software." Encyclopedia of Business and Finance.
Ed. Burton S. Kaliski. Vol. 2. New York: Macmillan Reference USA,
2001. 780-783. Gale Virtual Reference Library. Web. 26 Sep. 2011.
Is the practice of linking computing devices
  together with hardware and software that
 supports data communications across these
                     devices.




Networking
 LAN- Local Area Network
 WLAN- Wireless Local Area Network
 WAN- Wide Area Network
 MAN- Metropolitan Area Network
 SAN- Storage/Service/Server Area Network
 CAN- Campus/Controller/Cluster Area
  Network
 PAN- Personal Area Network
 DAN- Desk Area Network




Types of computer networks
Intranet
   a computer network within an organization to share
    information, limiting access only to employees or other
    authorized users, usually with a password.
Uses of Intranets
  to deliver tools and applications, through the
   emailing system
  for collaboration, such as teleconferencing or
   video conferencing
  search corporate directories
  keep track of sales
  view customer relationship management tools
  view individuals project management to
   advance productivity
  and as a corporate culture-change platform
Benefits of Intranets
   solves problem of linking different types of
    computers and integrates different operating
    systems
   easy to use and inexpensive for both the
    company and employees
   increases productivity and teamwork within the
    work force through calendars, emails, forums,
    and shared documents
 Defined as a network device that enforces
  an organization’s security policy
 Blocks out unwanted internet traffic based
  on content
 Also used to block access to certain
  websites




Firewalls
 Personal firewall works well for home use.
  These types of firewalls protect only one
  computer.
 Departmental: for more than one
  computer but not for a company as large
  as the bigger corporations
 Enterprise: Used for bigger companies
  with thousands of employees




Firewall Categories
Firewall diagram
             F
or cybercrime, refers to any crime that involves
a computer and a network. The computer may have been
used in the commission of a crime, or it may be the
target. Netcrime refers to criminal exploitation of
the Internet.
 An outside intruder through the use of a public
  telephone network connected to the computer
 An employee or unauthorized person within the
  organization using a terminal or microcomputer
 personal or financial gain
 entertainment
 revenge
 personal favor
 challenge of beating the system
 accident
 vandalism
 Banks
 Hospitals
 Police
 Stores
 Individuals
 Government agencies…
   Theft in computer crime may refer to either unauthorized removal of physical
  items such as hardware or unauthorized removal or copying of data or
  information.
 Computer / Internet Fraud is the use of information technology to commit
  fraud. In the United States, computer fraud is specifically proscribed by the
  Computer Fraud and Abuse Act, which provides for jail time and fines.
 The Internet has provided a unique opportunity and environment for
  copyright infringement. This type of computer crime encompasses use of
  software, music, etc which is not appropriately acquired ( purchased).
 Attacks on organizational information systems may be either physical or
  logical. There are several instances of web sites, products, and individuals
  being libeled or attacked by individuals or groups.
 1. A person who enjoys computer technology and spends/wastes (lots of
  own) time learning/using/playing with computer systems.
 2. A person who uses a computer to commit break into unauthorized data.
Cracker - always criminal; from Criminal Hacker
  A computer-savvy person who attempts to gain unauthorized or illegal
  access to computer systems.
2 types of Crackers:
   Black Hat Crackers
   White Hat Crackers
 Virus
 Trojan Horse
 Worm
 Logic Bomb
 Micro Virus
 Spyware
 Password Sniffers…
Types:
 Illegally downloading music or videos is
  called pirating.
 Finding a picture or piece of writing on
  the Internet and claiming it as your own is
  called plagiarism.
 Using technology to steal and use
  someone else's personal information is
  called identity theft.

More Related Content

What's hot

Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computerRodz Tech
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethicsbadak sumbu
 

What's hot (20)

Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 

Similar to Software. intranet. e crime

Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxJohnsmithAlberto2
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 akibrutry
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 

Similar to Software. intranet. e crime (20)

Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptxModule-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
Module-III-Unit-II-Trend-and-Issues-in-Information-Technology.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Technology
TechnologyTechnology
Technology
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
Information security
Information securityInformation security
Information security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Presentation1
Presentation1Presentation1
Presentation1
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 

Recently uploaded

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Recently uploaded (20)

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

Software. intranet. e crime

  • 1. • Software is a series of instructions to perform computer functions. • Known as a program • Software is necessary for hardware to operate. JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.
  • 2. 1944 John von Neumann developed practical use of software. • Opened the door for more software development. JOHNSON, ERIC. "Computer Software." Encyclopedia of Communication and Information. Ed. Jorge Reina Schement. Vol. 1. New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual Reference Library. Web. 26 Sep. 2011.
  • 3. System software • Operating systems & Application programs • Communication • Entertainment software software • Utility software • Education software SAMSON, WANDA. "Software." Encyclopedia of Business and Finance. Ed. Burton S. Kaliski. Vol. 2. New York: Macmillan Reference USA, 2001. 780-783. Gale Virtual Reference Library. Web. 26 Sep. 2011.
  • 4. Is the practice of linking computing devices together with hardware and software that supports data communications across these devices. Networking
  • 5.  LAN- Local Area Network  WLAN- Wireless Local Area Network  WAN- Wide Area Network  MAN- Metropolitan Area Network  SAN- Storage/Service/Server Area Network  CAN- Campus/Controller/Cluster Area Network  PAN- Personal Area Network  DAN- Desk Area Network Types of computer networks
  • 6. Intranet  a computer network within an organization to share information, limiting access only to employees or other authorized users, usually with a password.
  • 7. Uses of Intranets  to deliver tools and applications, through the emailing system  for collaboration, such as teleconferencing or video conferencing  search corporate directories  keep track of sales  view customer relationship management tools  view individuals project management to advance productivity  and as a corporate culture-change platform
  • 8.
  • 9. Benefits of Intranets  solves problem of linking different types of computers and integrates different operating systems  easy to use and inexpensive for both the company and employees  increases productivity and teamwork within the work force through calendars, emails, forums, and shared documents
  • 10.  Defined as a network device that enforces an organization’s security policy  Blocks out unwanted internet traffic based on content  Also used to block access to certain websites Firewalls
  • 11.  Personal firewall works well for home use. These types of firewalls protect only one computer.  Departmental: for more than one computer but not for a company as large as the bigger corporations  Enterprise: Used for bigger companies with thousands of employees Firewall Categories
  • 13. or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet.
  • 14.  An outside intruder through the use of a public telephone network connected to the computer  An employee or unauthorized person within the organization using a terminal or microcomputer
  • 15.  personal or financial gain  entertainment  revenge  personal favor  challenge of beating the system  accident  vandalism
  • 16.  Banks  Hospitals  Police  Stores  Individuals  Government agencies…
  • 17.
  • 18. Theft in computer crime may refer to either unauthorized removal of physical items such as hardware or unauthorized removal or copying of data or information.  Computer / Internet Fraud is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines.  The Internet has provided a unique opportunity and environment for copyright infringement. This type of computer crime encompasses use of software, music, etc which is not appropriately acquired ( purchased).  Attacks on organizational information systems may be either physical or logical. There are several instances of web sites, products, and individuals being libeled or attacked by individuals or groups.
  • 19.  1. A person who enjoys computer technology and spends/wastes (lots of own) time learning/using/playing with computer systems.  2. A person who uses a computer to commit break into unauthorized data. Cracker - always criminal; from Criminal Hacker A computer-savvy person who attempts to gain unauthorized or illegal access to computer systems. 2 types of Crackers:  Black Hat Crackers  White Hat Crackers
  • 20.  Virus  Trojan Horse  Worm  Logic Bomb  Micro Virus  Spyware  Password Sniffers…
  • 21. Types:  Illegally downloading music or videos is called pirating.  Finding a picture or piece of writing on the Internet and claiming it as your own is called plagiarism.  Using technology to steal and use someone else's personal information is called identity theft.

Editor's Notes

  1. Makes sharing information between employees on the same network safe. The firewallls prevent unwanted incoming internet traffic so that employees do not compromise confidential information.