Dpb20043 Chapter 2
Dpb20043 Chapter 2
MANAGEMENT INFORMATION
SYSTEM
CHAPTER 2
MANAGEMENT INFORMATION SYSTEMS BASIC:
HARDWARE, SOFTWARE, NETWORKING
AND SECURITY
L P T
9 0 3
COURSE OVERVIEW:
2.1 Identify the computer hardware and software
2.2 Discuss communications networks and types of network
2.3 Discuss threats to information security
2.4 Describe information security
WHAT IS A COMPUTER?
1. Personal computer
• For the computer hardware, the monitor is another device that is used to
display the output, videos and other graphics as it is directly connected
to the CPU.
• The video displayed by the monitor uses the video card.
• The monitor can be compared to the television set but the difference is
the resolution and graphics displayed by the monitor are of much high
quality compare to the television set.
MONITOR
• The LCD is used in a modern computer as they are thinner and lighter
and easy to use compared to CRT monitors.
MOTHERBOARD
INPUTAND OUTPUTDEVICE
Input and output devices are part of a computer’s user interface,
which includes other hardware devices and software that allow you
to interact with a computer system.
PROCESSING DEVICE
• Central Processing unit (CPU) was a
part of processing device that
ability to process (organize and
manipulate) data is a critical
aspect of a computer system, in
which processing is
accomplished by an interplay
between one or more of the
central processing units and
primary storage.
2.1 Computer Hardware and Software
PROCESSING DEVICE
Memory devices contain thousands of circuits imprinted on a silicon chip.
Each circuit is either conducting electrical current (on) or not (off). Data is
stored in memory as a combination of on or off circuit states.
Instructions or data can be temporarily stored in random access memory
(RAM). RAM is temporary and volatile—RAM chips lose their contents if the
current is turned off or disrupted (as in a power surge, brownout, or electrical
noise generated by lightning or nearby machines).
Read-only memory (ROM), another type of memory, is usually nonvolatile. In
ROM, The combination of circuit states is fixed, and therefore its contents are
not lost if the power is removed. ROM provides permanent storage for data
and instructions that do not change, such as programs and data from the
computer manufacturer, including the instructions that tell the computer
how to start up when power is turned on.
2.1 Computer Hardware and Software
SECONDARY STORAGE
A small amount of storage area for the data and instructions the
CPU requires for processing. Computer systems also need to store
larger amounts of data, instructions, and information more
permanently than main memory allows. Secondary storage, also
called permanent storage, serves thispurpose.
2.1 Computer Hardware and Software
COMMUNICATION DEVICE
2.1.1THE COMPUTERHARDWARE
a. Personal Computers
b. Other Digital Devices
2.1 Computer Hardware and Software
A. PERSONAL COMPUTERS
Desktop computer Computer that sits on, next to, or under a user’s desk and is too large to carry around. The computer box is where
the CPU, RAM, and storage devices are held with a monitor on top, or a vertical system box (called a tower)
usually placedonthe floorwithin awork area.
Workstation computer Similar to a desktop but has more powerful mathematical and graphics processing capabilities and can
perform more complicated tasks in less time. Typically used for software development, web development,
engineering, and ebusiness tools.
Minicomputer(server) Designed to meet the computing needs of several people simultaneously in a small to medium-size business
environment. A common type of minicomputer is a server and is used for managing internal company
applications, networks, and websites.
Mainframe computer Designed to meet the computing needs of hundreds of people in a large business environment. Mainframe
computers are a step up in size, power, capability, and cost from minicomputers.
Supercomputer The fastest, most powerful, and most expensive type of computer. Organizations such as NASA that are
heavily involved in research and number crunching employ supercomputers because of the speed with which
they can process information. Other large, customer-oriented businesses such as General Motors and AT&T
employ supercomputers just to handle customer information and transaction processing.
2.1 Computer Hardware and Software
Desktop Computer that sits on, next to, or under a user’s desk
computer and is too large to carry around. The computer box
is where the CPU, RAM, and storage devices are
held with a monitor on top, or a vertical system box
(called a tower) usually placed on the floor within a
work area.
i. Cloud Computing
A software package is a prewritten commercially available set
of software programs that eliminates the need for a firm to write
its own software programs for certain functions, such as payroll
processing or order handling.
Enterprise application software vendors such as SAP and Oracle-
PeopleSoft have developed powerful software packages that
can support the primary business processes of a firm worldwide
from warehousing, customer relationship management, and
supply chain management, to finance and human resources.
2.1 Computer Hardware and Software
• Works derived from the original code must also be free, and the
software can be redistributed by the user without additional
licensing.
2.1 Computer Hardware and Software
A. SYSTEM SOFTWARE
System software is a type of computer program that is
designed to run a computer's hardware and application
programs
B. APPLICATION SOFTWARE
Browser Enables the user to navigate the World Wide Web. The two leading
browsers are Netscape Navigator and Microsoft Internet Explorer.
Data Provides the tools for data retrieval, modification, deletion, and
management insertion; for example, Access, MySQL, and Oracle.
APPLICATION SOFTWARE
Groupware Increases the cooperation and joint productivity of small groups
of co-workers.
Presentation Creates and enhances charts and graphs so that they are visually
graphics appealing and easily understood by an audience. A full-features
presentation graphics package such as Lotus Freelance Graphics or
Microsoft PowerPoint includes facilities for making a wide variety of
charts and graphs and for adding titles, legends, and explanatory text
anywhere in the chart or graph.
APPLICATION SOFTWARE
Spreadsheet Simulates an accountant’s worksheet on-screen and lets users
embed hidden formulas that perform calculations on the visible data.
Many spreadsheet programs also include powerful graphics and
presentation capabilities to create attractive products. The leading
spreadsheet application is MicrosoftExcel.
UTILITY SOFTWARE
Crash-proof Helps save information if a computer
crashes.
Disk image Relieves the burden of reinstalling
for data applications if a hard drive
recovery crashes or becomes irretrievablycorrupted.
UTILITY SOFTWARE
Text protect In Microsoft Word, prevents users from typing over existing text
after accidentally hitting the Insert key. Launch the Insert Toggle Key
program, and the PC will beep whenever a user presses the Insert key.
Preventive security Through programs such as Window Washer, erases file histories,
browser cookies, cache contents, and other crumbs that
applications and Windows leave on a hard drive.
DEFINITION OF NETWORKS
• A network consists of two or more connected
computers. a client computer and a dedicated server
computer, network interfaces, a connection medium,
network operating system software, and either a hub
or a switch.
• Each computer on the network contains a network
interface device to link the computer to the network.
2.2 Communications Networks and Types Of Network
• The path that a message takes from source to destination can be as simple as a
single cable connecting one computer to another or as complex as a network
that literally spans the globe.
• This network infrastructure is the platform that supports the network. It
provides the stable and reliable channel over which our communications can
occur.
• The network infrastructure contains three categories of network components:
1) End devices
2) Intermediary devices
3) Network media
COMPONENTS OF A NETWORK
• Devices and media are the physical elements, or hardware, of the network.
• Hardware comprises the components of the network platform that typically are
visible, such as a laptop, PC, switch, router, wireless access point, or the cabling
used to connect the devices.
• Occasionally, some network components may not be visible. In the case of
wireless media, for example, messages are transmitted through the air using
invisible radio frequency or infrared waves.
COMPONENTS OF A NETWORK
• Network components are used to provide services and processes. These
services and processes are the communication programs, called software, that
run on the networked devices.
• A network service provides information in response to a request.
• Services include many of the common network applications people use every
day, like email hosting services and web hosting services.
• Processes provide the functionality that directs and moves the messages
through the network.
• Processes are less obvious to us but are critical to the operation of networks.
END DEVICES
• The network devices that people are most familiar with are called end
devices, or hosts. These devices form the interface between users and
the underlying communication network.
• Some examples of end devices are
1. Computers (work stations, laptops, file servers, web servers)
2. Network printers
3. VoIP phones
4. TelePresence endpoints
5. Security cameras
6. Mobile handheld devices (such as smartphones, tablets, PDAs, and
wireless debit/credit card readers and barcode scanners)
END DEVICES
• A host device is either the source or destination of a message
transmitted over the network.
• In order to distinguish one host from another, each host on a
network is identified by an address.
• When a host initiates communication, it uses the address of the
destination host to specify where the message should be sent.
END DEVICES
• In modern networks, a host can act as a client, a server, or both.
• Software installed on the host determines which role it plays on
the network.
• Servers are hosts that have software installed that enables them
to provide information and services, like email or web pages, to
other hosts on the network.
• Clients are hosts that have software installed that enables them to
request and display the information obtained from the server.
INTERMEDIARY DEVICES
• Interconnect end devices.
• These devices provide connectivity and work behind the scenes to ensure that
data flows across the network.
• Intermediary devices connect the individual hosts to the network and can
connect multiple individual networks to form an internetwork.
• Examples of intermediary network devices are
1. Network access devices (switches and wireless access points)
THE COMMUNICATIONNETWORK.
1. Analog signal
• An analog signal is represented by a continuous waveform that passes
through a communications medium and has been used for voice
communication.
• The most common analog devices are the telephone handset, the
speaker on your computer, or your iPod earphone, all of which create
analog waveforms that your ear can hear.
2.2 Communications Networks and Types Of Network
2. Digital signal
TYPES OF NETWORK
• The router connects the LAN to other networks, which could be the
Internet or another corporate network, so that the LAN can
exchange information with networks external to it.
• The most common LAN operating systems are Windows, Linux, and
Novell. Each of these network operating systems supports TCP/IP as
their default networking protocol.
2.2 Communications Networks and Types Of Network
5. Internet
The Internet has become the world’s most
extensive, public communication system
that now rivals the global telephone
system in reach and range. It’s also the
world’s largest implementation of
client/server computing and
internetworking, linking millions of individual
networks all over the world.
An Internet service provider (ISP) is a
commercial organization with a
permanent connection to the Internet that
sells temporary connections to retail
subscribers.
2.2 Communications Networks and Types Of Network
2.3.1 MALICIOUSSOFTWARE
• Malicious software programs are referred to as malware
and include a variety of threats, such as computer
viruses, worms, and Trojan horses.
2.3 Threats To Information Security
A. VIRUSES
• A computer virus is a type of malicious code or
program written to alter the way a computer
operates and that is designed to spread from
one computer to another.
• a virus operates by inserting or attaching itself
to a legitimate program or document that
supports macros in order to execute its code.
B. WORMS
Most recent attacks have come from worms, which are
independent computer programs that copy themselves
from one computer to other computers over a network.
C. TROJAN HORSES
A Trojan horse is a software program that appears to be
kindly (not harmful) but then does something other than
expected. The Trojan horse is not itself a virus because it
does not replicate, but it is often a way for viruses or
other malicious code to be introduced into a computer
system.
It may sit quietly in computer, collecting information or setting
up holes in your security or they may just take over your
computer and lock out.
2.3 Threats To Information Security
D. SPYWARE
• A program that is placed on a computer without a user’s
knowledge and secretly collects information about the user.
• The collected information is communicated by the
spyware to some outside source while the user is online.
• Spyware can enter a computer as a virus or as a result of
a user installing a new program.
D. SPYWARE
• Thousands of forms of spyware have been
documented. Many users find such spyware annoying,
and some critics worry about its infringement on
computer users’ privacy.
• Key loggers record every keystroke made on a
computer to steal serial numbers for software, to
launch Internet attacks, to gain access to e-mail
accounts.
COMPUTER CRIME
• Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hackers that illegally
browses or steals a company's or individual's private
information.
2.3 Threats To Information Security
For example, hours after the U.S. Department of Justice shut down file-
sharing site Mega upload on January 19 2012, the Anonymous hacker
collective launched extensive retaliatory DDoS attacks against federal
and entertainment industry Web sites. Web sites belonging to the FBI,
U.S. Department of Justice,
U.S. Copyright Office, Universal Music, the Recording Industry
Association of America, and the Motion Picture Association of
America, were knocked offline for a large part of the day.
Although DoS attacks do not destroy information or access restricted
areas of a company’s information systems, they often cause a Web
site to shut down, making it impossible for legitimate users to access
the site.
2.3 Threats To Information Security
D. IDENTITYTHEFT
• Identity theft has become especially troubling. Identity theft is a
crime in which an imposter obtains key pieces of personal
information, such as social security identification numbers, driver’s
license numbers, or credit card numbers, to impersonate someone
else.
• The information may be used to obtain credit, merchandise, or
services in the name of the victim or to provide the thief with false
credentials.
2.3 Threats To Information Security
E. CLICK FRAUD
The advertiser typically pays a fee for each click, which is
supposed to direct potential buyers to its products. Click fraud
occurs when an individual or computer program fraudulently
clicks on an online ad without any intention of learning more
about the advertiser or making a purchase.
Information systems controls are both manual and automated and consist
of general and application controls.
1. General controls
General controls govern the design, security, and use of computer programs
and the security of data files in general throughout the organization’s
information technology infrastructure.
On the whole, general controls apply to all computerized applications and
consist of a combination of hardware, software, and manual procedures that
create an overall control environment.
General controls include software controls, physical hardware controls,
computer operations controls, data security controls, controls over
implementation of system processes, and administrative controls.
2.4 Information Security
2. Application controls
Application controls are specific controls unique to each
computerized application, such as payroll or order processing. They
include both automated and manual procedures that ensure that only
authorized data are completely and accurately processed by that
application.
Application controls can be classified as (1) input controls,
(2)processing controls, and (3)outputcontrols.
2.4 Information Security
a. Authentication
Refers to the ability to know that a person is who he or she claims to
be. Authentication is often established by using passwords known
only to authorized users.
AUTHENTICATION
New authentication technologies, such as tokens, smart cards, and
biometric authentication, overcome some of these problems.
A smart card is a device about the size of a credit card that contains a
chip formatted with access permission and other data. (Smart cards
are also used in electronic payment systems.) A reader device
interprets the data on the smart card and allows or denies access.
2.4 Information Security
b. Firewalls
Firewalls prevent unauthorized users from accessing private
networks. A firewall is a combination of hardware and
software that controls the flow of incoming and outgoing network
traffic.
FIREWALLS
The firewall identifies names, IP addresses, applications, and other
characteristics of incoming traffic.
It checks this information against the access rules that have been
programmed into the system by the networkadministrator.
c. Intrusion DetectionSystem
In addition to firewalls, commercial security vendors now
provide intrusion detection tools and services to protect
against suspicious network traffic and attempts to access
files and databases.
INTRUSION DETECTIONSYSTEM