This action might not be possible to undo. Are you sure you want to continue?
Information technology which is also known as IT, is a dynamic discipline and fastest growing industry. As time move a lot of changes seen in this sector. All these changes were used to improve the way we perform our daily activities. Technology plays a vast role in society these days and has developed in such a way that it is hard for society to live without it. This is because of technology made day to day life easier, not only for individuals but also for big companies’ complete large amount of work daily. Allowing them to perform there work faster and easier. Now day’s information technology is the backbone of every industries and individuals. As requirement increases we need changes in technologies. Some of the general trends in information technology are as followa. Information security b. Cloud computing c. Wireless networking d. Digital forensic e. E-commerce f. Outsourcing g. Social media h. Mobile apps a. Information security“Information security is the collection of technologies, standards, policies and management practices that are applied on information to keep it secure.” In today's high technology environment, organizations are more and more dependent on their information systems. Peoples are concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and attackers (i.e. hackers) are increasing. While the term information security describes the act of ensuring that data will not lost when critical issues arise. These issues include but are not limited to; natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Because of information’s are stored on computers, information assurance is typically dealt with by IT security specialists. Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. While data is transmitted across the network CIA triangle (confidentiality, integrity and availability) is one of the core principles of information security. Confidentiality Integrity Availability Confidently describes the protection of data from unauthorized disclosure. like information of credit/debit card during the online shopping should be confidential. Integrity ensures that data received are exactly same as sent by an authorized entity. No modification, insertion, deletion placed in between the transmission. Availability insuring timely and reliable access to use of information. Means information must be available when it required. Cryptography plays an important role in the whole process of information security. Cryptography is a technique in which information is encrypted using key (symmetric/assymetric) and sent to the receiver. Receiver receives the information then decrypts it using key before use it. b. Cloud computing- Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It is a general term for anything that involves delivering hosted services over the Internet.
cloud computing presents some very interesting features that make it attractive to businesses, especially from a cost perspective. The cloud offers software along with computing infrastructure and platforms on an elastic, pay-per-use model. This affords companies the luxury of only paying for what they use. Technology behemoths such as Microsoft, Google, and Amazon are just three of the companies that are jumping on the bandwagon offering cloud services. Cloud services include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). All of these are delivered over the Internet. In the cloud, customers only pay for the resources they actually use, just like the way we pay for our water and electricity. IaaS
credit card fraud etc. The associated costs for running and maintaining the hardware are paid by the provider. repeatability. and enhancement. videos. These applications are hosted and maintained by the service provider. networks.) on an “as-needed” basis. e tc. and “cloud” systems are very much within the scope of the discipline. each with potentially different operating systems and varying peripheral hardware. organizations outsource their hardware needs to a service provider. services. standalone computers to working on networks with multiple computers. comparison. SaaS In the cloud. Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. We are dependent upon it for our daily needs also. servers. Digital forensic- “The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority. operating systems. PaaS provides excellent flexibility in that the operating system can be modified or upgraded frequently. and audio (in both analog and digital format). chain of custody. use of validated tools. and possible expert presentation. It also includes the analysis of imag es. This kind of resource sharing has become more prevalent as computer users have changed their habits from using single.” Now day’s information technology plays an important role in our day to day life. Similarly it gave a platform to criminals to perform their activity digitally. These resources might include a broadband Internet connection. reporting.). .With IaaS.). d. and even streaming audio and video. etc. Digital forensics encompasses much more than just laptop and desktop computers. This would include everyday hardware needs such as servers. c.e. data files. PaaS gives developers the ability to rent the environment (hardware. SaaS provides applications on demand to customers over the Internet. and the like. Now days digital equipment’s are using in criminal activity (i. storage. PaaS Programmers develop their software to function in specific computing environments (operating system. Wireless networking is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices. The focus of this kind of analysis is generally authenticity. Wireless networking.Wireless technology has helped to simplify networking by enabling multiple computer users to simultaneously share resources in a home or business without additional or intrusive wiring. validation with mathematics. Mobile devices. storage. network printers.
These apps are become more popular because these are able to solve our daily problems. online transaction processing. Social mediait refers to the means of interactions among people in which they create. the website says "advantages of outsourcing is that its cost savings. civil litigation.as smartphones becomes the part of our daily life. although it may encompass a wider range of technologies such as e-mail. can direct us regarding location etc. Now day’s social networks like Facebook. social networks (Facebook. f. and that allow the creation and exchange of user-generated content” Social media technologies take on many different forms including magazines. flexibility. twitters are used widely. share. h. With all the facilities shown above it has made it a lot more easier to be able to employ people abroad as they can now program. electronic data interchange (EDI). weblogs. Maximum youths can’t leave a single day without using Facebook. knowledge and accountability". Mobile apps. and telephones as well. the staff levels. have meetings from where ever they are working. Internet forums. Internet marketing. and automated data collection systems. Outsourcing The changes shown above all lead to a discussion on out sourcing. photographs or pictures. Even these networking sites also gives highly paid job to their employees to make it much better. supply chain management. “Social media is a group of Internet-based applications that build on the ideological and technological foundations of Web 2. It takes place in our day to day life.Digital forensics can be used in a variety of settings. Criminal investigation Civil litigation Inetelligence Administrative matters E-commerce Ecommerce (or electric commerce) refers to the buying and selling of goods and services via electronic channels. electronic funds transfer. So mobile apps become a new and very useful trend in our daily life. social blogs. and exchange e. rating and social bookmarking. Out sourcing has become popular especially in IT job roles because of technology changes. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction's life-cycle. discuss. It is a type of industry where buying and selling of product or service is conducted over electronic systems such as the Internet and other computer networks. video. primarily the Internet. This is the trend of mobile apps. mobile devices social media.). morale.0. twitter etc. intelligence. Electronic commerce draws on technologies such as mobile commerce(m-commerce). including criminal investigations. information and ideas in virtual communities and networks. I personally feel that due to these changes in the future IT will be a lot more flexible and out sourcing will be a very popular route in many companies. According to a business reference website out sourcing has many benefits and will increase in the future. for example gps apps can inform us about our geographical locations and also guide us in finding shortest way while in traffic. and administrative matters. focus. micro blogging. can entertain us. with all these benefits its hard for business to turn away from this opportunity. . this is when people are made redundant in a company and the same job is available to someone else most likely to be from abroad because it reduces costs for large companies. a new technology trend become popular. g. Due to these changes IT jobs in general can be done anywhere in the world at any time.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.