Professional Documents
Culture Documents
BY:
RAM BABU
RAJIL RAMAKRISHNAN
PRERNA THAKUR
PRATHIMA.R
Introduction:
• In an information technology (IT) context, software or hardware
implementation encompasses all the post-sale processes
involved in something operating properly in its environment,
including analyzing requirements, installation, configuration,
customization, running, testing, systems integrations, user
training, delivery and making necessary changes. The word
"deployment" is sometimes used to mean the same thing.
Ram Babu
ETHICS
• Computers and information systems are used everywhere in society.
New technologies are invaluable tools but they may have serious
ethical consequences.
• The way an information technology tool affects sensitive issues has a
direct impact on its effectiveness and usability. It may be difficult for
users and stakeholders to adopt a computer system if they feel that its
use violates important values and interests.
• To take advantage of a computer tool may not be easy in situations
dominated by ethical conflicts. There is a great risk that expensive but
necessary computer systems are abandoned because of scandals
and conflicts.
Ram Babu
Copyrights and Intellectual Rights
Ram Babu
Copyrights:
• Copyright refers to the legal right of the owner of intellectual property.
In simpler terms, copyright is the right to copy. This means that the
original creators of products and anyone they give authorization to are
the only ones with the exclusive right to reproduce the work.
Ram Babu
Intellectual Property Rights:
• Intellectual property rights are the rights given to persons over
the creations of their minds.
• They usually give the creator an exclusive right over the use of
his/her creation for a certain period of time.
By:
Rajil Ramakrishnan. T
RAJIL
INTRODUCTION
◦ Closely associated with copyrights and intellectual property right is the issue of privacy.
Data privacy or information privacy is a branch of data security concerned with the
proper handling of data – consent, notice, and regulatory obligations
◦ More specifically, practical data privacy concerns often revolve around . Whether or
how data is shared with third parties. How data is legally collected or stored.
RAJIL
Data Protection
RAJIL
Electronic Surveillance
RAJIL
Types of Electronic surveillance
◦ Audio Surveillance Equipment. Most frequently, small and easily concealed microphones
are used for intercepting conversations.
◦ Signals Tracking.
◦ Signal Interception.
◦ Computer Surveillance.
RAJIL
Digital Surveillance
◦ Digital surveillance is the monitoring of computer activity, data stored on a hard drive,
or being transferred through computer networks. Digital surveillance is usually done
superstitiously and can be done by anyone, government, corporations and even
individuals.
◦ Information from surveillance systems can be used to monitor the burden of a disease
over time, detect changes in disease occurrence determine risk factors for the disease
and populations at greatest risk, guide immediate public health actions for individual
patients or the community, guide programs
RAJIL
Surveillance Network
RAJIL
Cyber security
◦ Cyber security or information technology security are the techniques of protecting
computers, networks, programs and data from unauthorized access or attacks that are
aimed for exploitation.
RAJIL
Importance of Cyber Security
◦ Tighter regulations
RAJIL
DIGITAL DIVIDE
BY:
PRERNA THAKUR
PRERNA
IMPACT OF IT
• Technology stress
• Power and stress
• Digital divide
• Social capital
• Education
IMPACT OF IT
• TECHNOLOGY STRESS :- All the technological
equipments , where they are faster computer pagers
or cellphones – these things have opened a world of
oppourtunity.
• In a study , MCI communication corporation ( a
famous research organisation of USA ) found that
59% of American’s experienced some hesitation ,
frustration with technology.
• In some cases, expert say technology overload can
even lead to job loss, divorce and suicides.
• These are several other technological stress
indicators, including sleep deprivation, family and
relationship strain tendency towards multitasking
doing several things.
◦Power and stress
PRERNA
Social Captial
◦Social capital is acquired to repeated
interactions with other individuals or groups
of individuals . Connecting to the internet
create another set of means by which to
achieve repeated interactions.
PRERNA
Education
◦The digital divide is also impact childrens
ability to learn in groups in low incomes
school districts
◦42% students received lower grade
because of this disadvantage.
PRERNA
DEFENSE STRATEGIES
BY:
PRATHIMA.R
PRATHIMA
Defense Strategies
◦ Defense strategies and security in a system involves protecting all
components of the system. This includes data, software and the
hardware. The systems need protector from internal as well as
unintentional damage and misuse.
◦ It is an approach to cybersecurity in which a series of defensive
mechanisms are layered in order to protect valuable data and
information.
◦ Following are some of the strategies to make secure an automated
system.
PRATHIMA
Audit Trails
◦ An audit trail(audit log) is a security relevant chronological record, that
provide documentary evidence of the sequence.
◦ An audit trail is a step-by-step record by which accounting or trade
data can be traced to its source. Audit trails are used to verify and track
many types of transactions including accounting transactions and
trades in brokerage accounts.
PRATHIMA
Controlled Access
◦ Controlled access is a security measure to control the system.
◦ In controlled access, the stations seek information from one another
to find which station has the right to send. It allows only one node to
send at a time, to avoid collision of messages on shared medium.
PRATHIMA
Data Encryption
◦ Data encryption translates data into another form, or code, so that only
people with access to a secret key (formally called a decryption key) or
password can read it.
◦ Encrypted data is commonly referred to as ciphertext, while
unencrypted data is called plaintext. Currently, encryption is one of the
most popular and effective data security methods used by
organizations. Two main types of data encryption exist - asymmetric
encryption, also known as public-key encryption, and symmetric
encryption.
◦ It is a security method where information is encoded and can only be
accessed by a user with correct encryption key
Cipher
Plaintext Plaintext
Text
PRATHIMA
AUTHENTICATION
• Authentication is the process of verifying the identity of a
person or device.
• A common example is entering
a username and password when you log in to a website.
PRATHIMA
AUTHORIZATION
PRATHIMA
PRATHIMA
Virus Protection
◦ Virus protection software is designed to prevent viruses, worms and
Trojan horses from getting onto a computer as well as remove any
malicious software code that has already infected a computer.
Most virus protection utilities now bundle anti-spyware and anti-
malware capabilities to go along with anti-virus protection.
PRATHIMA
FIRE WALL
◦ Fire wall is a network security that monitor and controls network traffic.
◦ A firewall is a system designed to prevent unauthorized access to or
from a private network. You can implement a firewall in either hardware
or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected
to the internet, especially intranets.
PRATHIMA
Back Up and Recovery Process
◦ Back up and recovery is a process of backing up of data incase loss of
information.
◦ Backup and recovery describes the process of creating and storing
copies of data that can be used to protect organizations against data
loss. This is sometimes referred to as operational recovery. Recovery
from a backup typically involves restoring the data to the original
location, or to an alternate location where it can be used in place of the
lost or damaged data.
PRATHIMA
PRATHIMA