8447779800, Low rate Call girls in Tughlakabad Delhi NCR
Software. intranet. e crime
1. • Software is a series of instructions to
perform computer functions.
• Known as a program
• Software is necessary for hardware
to operate.
JOHNSON, ERIC. "Computer Software." Encyclopedia of
Communication and Information. Ed. Jorge Reina Schement. Vol. 1.
New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual
Reference Library. Web. 26 Sep. 2011.
2. • 1944 John von Neumann developed
practical use of software.
• Opened the door for more software
development.
JOHNSON, ERIC. "Computer Software." Encyclopedia of
Communication and Information. Ed. Jorge Reina Schement. Vol. 1.
New York: Macmillan Reference USA, 2002. 165-170. Gale Virtual
Reference Library. Web. 26 Sep. 2011.
3. System software
• Operating systems & Application
programs
• Communication • Entertainment
software software
• Utility software • Education
software
SAMSON, WANDA. "Software." Encyclopedia of Business and Finance.
Ed. Burton S. Kaliski. Vol. 2. New York: Macmillan Reference USA,
2001. 780-783. Gale Virtual Reference Library. Web. 26 Sep. 2011.
4. Is the practice of linking computing devices
together with hardware and software that
supports data communications across these
devices.
Networking
5. LAN- Local Area Network
WLAN- Wireless Local Area Network
WAN- Wide Area Network
MAN- Metropolitan Area Network
SAN- Storage/Service/Server Area Network
CAN- Campus/Controller/Cluster Area
Network
PAN- Personal Area Network
DAN- Desk Area Network
Types of computer networks
6. Intranet
a computer network within an organization to share
information, limiting access only to employees or other
authorized users, usually with a password.
7. Uses of Intranets
to deliver tools and applications, through the
emailing system
for collaboration, such as teleconferencing or
video conferencing
search corporate directories
keep track of sales
view customer relationship management tools
view individuals project management to
advance productivity
and as a corporate culture-change platform
8.
9. Benefits of Intranets
solves problem of linking different types of
computers and integrates different operating
systems
easy to use and inexpensive for both the
company and employees
increases productivity and teamwork within the
work force through calendars, emails, forums,
and shared documents
10. Defined as a network device that enforces
an organization’s security policy
Blocks out unwanted internet traffic based
on content
Also used to block access to certain
websites
Firewalls
11. Personal firewall works well for home use.
These types of firewalls protect only one
computer.
Departmental: for more than one
computer but not for a company as large
as the bigger corporations
Enterprise: Used for bigger companies
with thousands of employees
Firewall Categories
13. or cybercrime, refers to any crime that involves
a computer and a network. The computer may have been
used in the commission of a crime, or it may be the
target. Netcrime refers to criminal exploitation of
the Internet.
14. An outside intruder through the use of a public
telephone network connected to the computer
An employee or unauthorized person within the
organization using a terminal or microcomputer
15. personal or financial gain
entertainment
revenge
personal favor
challenge of beating the system
accident
vandalism
18. Theft in computer crime may refer to either unauthorized removal of physical
items such as hardware or unauthorized removal or copying of data or
information.
Computer / Internet Fraud is the use of information technology to commit
fraud. In the United States, computer fraud is specifically proscribed by the
Computer Fraud and Abuse Act, which provides for jail time and fines.
The Internet has provided a unique opportunity and environment for
copyright infringement. This type of computer crime encompasses use of
software, music, etc which is not appropriately acquired ( purchased).
Attacks on organizational information systems may be either physical or
logical. There are several instances of web sites, products, and individuals
being libeled or attacked by individuals or groups.
19. 1. A person who enjoys computer technology and spends/wastes (lots of
own) time learning/using/playing with computer systems.
2. A person who uses a computer to commit break into unauthorized data.
Cracker - always criminal; from Criminal Hacker
A computer-savvy person who attempts to gain unauthorized or illegal
access to computer systems.
2 types of Crackers:
Black Hat Crackers
White Hat Crackers
21. Types:
Illegally downloading music or videos is
called pirating.
Finding a picture or piece of writing on
the Internet and claiming it as your own is
called plagiarism.
Using technology to steal and use
someone else's personal information is
called identity theft.
Editor's Notes
Makes sharing information between employees on the same network safe. The firewallls prevent unwanted incoming internet traffic so that employees do not compromise confidential information.