You are on page 1of 8

CHAPTER 1: Managing Information Technology

Information Technology - Name of technique


which is used for handling and providing the
information
Information technology management - IT
management is the discipline whereby all of the
information technology resources of a firm are
managed in accordance with its needs and
priorities.

CHALLENGES…
❑ Rapid technological change
❑ Exploding applications and data
❑ Frequent External Shocks

MANAGING THE ASSETS IN AN IS


ORGANIZATON
IS leadership must manage these organizational
assets:
❑ Human Resources
❑ Organizational data
❑ Physical Infrastructure
❑ Application Portfolio
❑ How effective it is
❑ What condition it is in

INFORMATION TECHNOLOGY MANAGEMENT


SYSTEM ISSUES
1. Developing effective change management
system
2. Ethical use of IT
3. Determining an outsourcing strategy
4. Deploying global information systems
5. Ensuring regular performance measurement

Chapter 2 - Information Resource Management


Chapter 3 - Security of Information Technology
• It limits entry into a network to authorized
What is Security? users and content
1. Freedom from risk or danger; safety. • Entry can then be controlled by registration
2. Freedom from doubt, anxiety, or fear; and password
confidence. • But employees represent the biggest single
3. Something that gives or assures safety 4. Is threat to networks
the protection of assets. • Employees have access to security procedures
The three main aspects are: and know where important data is stored
• Prevention
• Detection 2. Digital Certificates / Signature
• Re-action • Digital signatures used to create commercial
Why do we need Security? systems using public key encryption often using
• Protect vital information while still allowing trusted third parties to send owner
access to those who need it identification and copy of public key
• Provide authentication and access control for • Use of digital certificates:
resources Secret key (symmetric) encryption (both
• Guarantee availability of resources parties have an identical key known only to
them, but not a safe method)
Information Technology Security Public key (asymmetric) encryption (keys
• It is more than just protecting hardware and used by sender and receiver are different but
software from being crashed related by a numerical code
• It is protecting the information resources that
keep the company operating Digital certificates may include
• Goals are to ensure • User identification data
1. Data integrity, availability & confidentiality • Issuing authority identification and digital
2. Business continuity signature
• User’s public key
Information Technology Security • Expiry date of certificate
• Confidentiality • Class of certificate
✓Maintaining the privacy of data • Digital identification code for the certificate
• Integrity
✓Detecting that the data is not tampered with ENCRYPTION
• Authentication • In cryptography, encryption is the process of
✓Establishing proof of identity transforming information (referred to as
• Nonrepudiation plaintext) using an algorithm (called a cipher) to
✓Ability to prove that the sender sent the data make it unreadable to anyone except those
• Access Control possessing special knowledge, usually referred
to as a key.
✓Access to information resources are regulated
• The reverse process, i.e., to make the
• Availability
encrypted information readable again, is
✓Computer assets are available to authorized
referred to as DECRYPTION.
parties when needed
USES OF ENCRYPTION
• Encryption can be used to protect data "at
Security Measures of Information Technology
rest", such as files on computers and storage
1. FIREWALL
devices (e.g. USB flash drives).
• A firewall stops information being changed or
➢Digital rights management systems which
stolen
prevent unauthorized use or reproduction of
copyrighted material and protect software Once you have installed an anti-virus package,
against reverse engineering you should scan your entire computer
• Encryption is also used to protect data in periodically. Always leave your Anti-virus
transit software running so it can provide constant
• Encryption, by itself, can protect the protection.
confidentiality of messages.
Automatic scans- Depending what software you
VIRUSES choose; you may be able to configure it to
Viruses automatically scan specific files or directories
• Computer programs that corrupt or delete and prompt you at set intervals to perform
files complete scans.
• Sent as attachments or embedded in other
files Chapter 4: Risk in Information and Technology
Worm
• Can spread itself over a network, doesn’t need What is Risk?
to be sent • A possibility that THREAT exploits a
VULNERABILITY in an asset and causes damage
Types of Viruses or loss to the asset.
Transient Virus
• Attaches itself to specific program • THREAT – Something that can potentially
• Is run every time the program is run cause damage to an organization, IT system or
network.
• VULNERABILTY – A weakness in the
Resident Virus organization, IT Systems or network that can be
• Once loaded operates for duration of exploited by the threat
computer’s use Risks in Information and Technology
Logic Bomb
• Triggers when a given condition is met, such
as clock on computer matching a specified time
Trojan Horse
• Malicious program that hides within a friendly
program

What is an Anti-Virus?
• Anti-virus is a software (computer program)
that scans files or your computer's memory for
certain patterns that may indicate an infection.
The patterns it looks for are based on the
signatures, or fingerprints, of known viruses.
Once a virus is detected in the wild, the Anti-
Virus companies then release these new
patterns for your Anti-virus software to use.
These updates come out daily by some vendors. Fraud
Virus authors are continually releasing new and • Accessing or using a computer with the intent
updated viruses, so it is important that you have to commit a fraudulent or other criminal act.
the latest definitions installed on your • This can refer to illegally obtaining restricted
computer. data or confidential financial information,
damaging or destroying information contained • Sniffers are used by network/system
in a computer. administrator to monitor and troubleshoot
network traffic. Attackers use sniffers to capture
Service Interruptions and Delays data packets containing sensitive information
• An interruption in transmission that renders such as password, account information etc.
the Service unusable due to a total loss of signal Spoofing
for the Service • Specific type of cyber-attack in which
Intrusions someone attempts to use a computer, device, or
• the act of wrongfully entering upon, seizing, network to trick other computer networks by
or taking possession of the property or masquerading as a legitimate entity
information of another individual
Con Artists
Information Manipulation • A person who cheats or tricks others by
• trying to get someone to believe something persuading them to believe something that is
untrue is deceit. The type of communication not true
created by such deceitful intent is called a
deceptive message
Information Theft
• Also known as identity fraud, is a crime in Phishing
which an imposter obtains key pieces of • Type of online scam where criminals
personally identifiable information (PII), such as impersonate legitimate organizations via email,
Social Security or driver's license numbers, to text message, advertisement or other means in
impersonate someone else. order to steal sensitive information.

Error ISO 272002:2005


• An act or statement that is not right or true or - Defines Information Security as a prevention
proper. of the following:
• Error is used for failure to follow a model •Confidentiality
correctly. Ensuring that information is accessible only to
those Authorized to have access
Denial of Service Attacks •Integrity
• An attack meant to shut down a machine or Safeguarding the accuracy and completeness of
network, making it inaccessible to its intended information and processing methods
users. •Availability
Ensuring that authorized users have access to
Malicious Software information and associated assets when
• Any type of software that is intended to harm required
or hack the user.
• Attempt to steal your information, or they Computer Criminals
might simply do it for malicious reasons. Hacker
Website Defacements • A person who uses computers to gain
• Is an act of gaining unauthorized access to an unauthorized access to data
environment or website. Extortion Script Kiddies
• The practice of trying to get something • a relatively unskilled individual who uses
through force, threats or blackmail Sniffing scripts or programs, such as a web shell,
• Process of monitoring and capturing all data developed by others to attack computer
packets passing through given network systems and networks and deface websites,
according to the programming and hacking of enormous amounts of information, along
cultures with rapid distribution of information through
Cyber-Criminals communication networks
• People who use technology to commit
malicious activities on digital systems or  IT has enabled the globalization of the
networks with the intention of stealing sensitive economy and competition, and caused large-
company information or personal data, and scale changes in many industries
generating profit  IT is also bringing a major shift in the job
Organized Crime market; resulting in a more polarized
• Individuals and groups with ongoing working occupational structure, consisting of
relationships who make their living highly skilled=well paid jobs
primarily through activities that one or more lower skilled=low wages
states deem illegal and criminal
Terrorist Communication: Basic need for most human
• A person who uses unlawful violence and activities
intimidation, especially against civilians, in the Traditional- telephone, fax, mail...
pursuit of political aims. In the new information era- e-mail, internet,
Insider video conferencing
• A person within a group or organization,
especially someone privy to information The new communication technology enables
unavailable to others. people located in different places to work
together as if they were in the same office. Big
multinational companies are already exploiting
this technology to achieve better use of the
resources of their separate offices. In this way
CHAPTER 5: INFORMATION TECHNOLOGY projects can be shared between offices with the
application of the best expertise, and around
INFORMATION TECHNOLOGY the clock
- is a contemporary term that describes the
combination of computer technology (hardware Computer Use
and software) with telecommunications The purpose of a computer is to process data
technology (data, image, and voice networks). into information
 Data consist of the raw facts and figures that
are processed into information
 Information is data that has been summarized
or otherwise manipulated for use in decision
making

Hardware and Software


 Hardware consists of all the machinery and
equipment in a computer system
 Software, or programs , consist of all the
electronic instructions that tell the computer
how to perform a task
In some companies, this is referred to as
Management Information Services (or MIS) or
Hardware and software revolution
simply as Information Services (or IS). These
innovations enable the processing and storage
 The diminishing cost of personal computers ❖ Telemedicine
has put computing power within the reach of ❖ Robots
even the smallest contractors. How will computers affect my financial matters?
 Rapidly developing hardware performance, ❖ Virtual money
coupled with the development of storage drives ❖ Micro-Credits
with very large volumes, modems, scanners,
and back up devices has made the computer History and Development of Information
suitable for storage and distribution of drawings Technology
and other data in electronic format. In the 1960s and 1970s, the term information
 The evolution of servers, network cards, technology (IT) was a little known phrase that
modems and routers have linked computers was used by those who worked in places like
together providing a forum for community banks and hospitals to store information. With
collaboration. the paradigm shift to computing technology and
"paperless" workplaces, information technology
Internet has come to be a household phrase. It defines
The value of the Internet to construction an industry that uses computers, networking,
companies derives from its ability to easily software programming, and other equipment
connect globally to a vast amount of data, and processes to store, process, transmit, and
which would otherwise have taken more time protect information.
and money to organize. By exploiting the
resources of the Internet construction Software development and computer
companies can gain the following benefits. programming where best left to the computer
 Acceleration in the distribution of knowledge scientists and mathematical engineers, due to
resources within and out with the company  their complicated nature. As time passed and
Promotion and marketing for the company technology advanced, such as with the advent
of the personal computer in the 1980s and its
On-line services: The rapid development of the everyday use in the home and the workplace,
Internet and the World Wide Web has enabled the world moved into the information age.
many services that traditionally required face to
face meetings to be delivered on-line. Modern Technology
Internet distance learning: opportunities of By the early 21st century, nearly every child in
university education, widening access to higher the Western world, and many in other parts of
education (delivering teaching and learning to the world, knew how to use a personal
people who cannot attend lectures)-increases a computer. Businesses' information technology
country’s competitiveness in a global market. departments have gone from using storage
E-business: Internet provides a virtual market tapes created by a single computer operator to
place for buyers, suppliers, distributors and interconnected networks of employee
sellers to exchange information, negotiate and workstations that store information in a server
trade farm, often somewhere away from the main
Teleworking: Flexibility in working conditions, business site.
less office space, more productive workers.
Technology facilitate our life
How is information technology being used in Technology and information may be regarded as
education? two things are mutually binding. Both support
❖ E-mail functions that are fairly similar. Advances in
❖ Distance learning technology are always facilitate the delivery of
How are computers being used in health and information. The rate information from one
medicine?
country can spread rapidly to other countries,  It is accepted that telecommunication is a
even to all countries, through increasingly basic infrastructure necessary for economic and
sophisticated technology. social development of a country.
Advances in information technology provide  This is even becoming more strong than ever
enormous benefit in human survival. as information related economic activities are
Information technology can provide facilities in growing.  Information and communications
various aspects of life. One area of life that has technology may be described as the support of
a close relationship with the use of information the central nervous system of complex societies,
technology is the world of work. transmitting and processing information and
commands among the various parts of such
Impact of Advanced Information Technology societies.
Advances in information technology is to be  Internet plays a fundamental function in IT
grateful and appreciated as a remarkable role
achievement. Therefore, we must take
advantage of advances in information Benefits from IT
technology is to do positive things. Information and communications technology
Why is that? carries on high promise both in human and
In fact, advances in information technology not economic terms.
only provides a positive effect. Many also Benefits could be obtained in:
brought along the negative impact of  Education
information technology advances.  Job training
 Health care
Here's a positive impact of information  Food security
technology development.  Environment management
 Make it easier for companies or individual  Government efficiency
business transaction-based information
technology or so-called E Commerce.
 Simplify access to information needed for
various purposes. IT is useful in all areas Many tourism businesses
are involved in developing their internet
Besides positive impacts, advances in services including traditional travel agents, tour
information technology have a negative effect. operators, national tourist offices, airlines,
 The rapid advancement in information hotels and other accommodation providers and
technology, internet and other media, facilitate car hire firms.
the entry of banned sites and violence.
 Ease of transactions via the Internet will
provide opportunities to perform transacts
forbidden, such as drug and contraband
transactions.
As a result, anything that is required is
completed in quick time to be done by utilizing
flash technology as well. Finally, human life
cannot be separated from the flow of
information technology.

The Role of IT

You might also like