it_all_notes.docx
TRANSCRIPT
-
7/28/2019 IT_All_notes.docx
1/9
Information Technology Sem I
1 | P a g e
ContentsWhat is Ethernet? .......................................................................................................................................................2
Ethernet products...................................................................................................................................................2
Trans receivers....................................................................................................................................................2
Hubs ....................................................................................................................................................................2
Repeaters...........................................................................................................................................................3
Bridges ................................................................................................................................................................3
Routers ...............................................................................................................................................................3
Firewall ...............................................................................................................................................................3
Difference between Internet, Intranet and Extranet .................................................................................................3
Internet ...................................................................................................................................................................3
Application of internet .......................................................................................................................................4
Business value of internet ..................................................................................................................................4
Six major Value propositions of building commercial websites by the organizations .......................................4
Intranet ...................................................................................................................................................................4
Characteristics ....................................................................................................................................................4
Extranet ..................................................................................................................................................................5
Business value ....................................................................................................................................................5
Corporate governance ................................................................................................................................................5
The ISO ....................................................................................................................................................................6
Governance of Internal IT processes ......................................................................................................................7
IT Security ...................................................................................................................................................................7
CIA Triangle .............................................................................................................................................................7
Confidentiality ....................................................................................................................................................7
Integrity ..............................................................................................................................................................7
Availability ..........................................................................................................................................................8
Security management controls ..............................................................................................................................8
Physical security .....................................................................................................................................................8
-
7/28/2019 IT_All_notes.docx
2/9
Information Technology Sem I
2 | P a g e
What is Ethernet?
Ethernet is a shared media. There are rule for sending packets of data to avoid conflicts and protect data
integrity.o Nodes determine when the network is available for sending packets.o It is possible that two nodes at a different locations attempt to send data at
the same time.
o When both nodes are transferring a packet to the network at the sametime collision will result.
o Minimizing collisions is a crucial element in the design and operation of thenetwork
o Increased collisions are often the result of too many users on the network.Which results in bandwidth saturation of the network
o This can slow the performance of the network from the users point of viewo Segmenting the network, where a network is divided into different pieces
joined together logically with bridges or switches is one way of reducing
and overcrowded network
Ethernet products
The standards and technology which are used to build Ethernet networkTrans receivers
They are used to connect nodes to the various Ethernet media Most computers and network interface cards contain a built-in 10Base-T or
10Base-2 receiver allowing them to connect directly to Ethernet without requiring
an external trans receiver
Fast Ethernet networks has got new interface which Is known as mediaindependent interface to support transmission upto 100mbps
Hubs
They are used to connect 2 or more Ethernet segments of any media type Ethernet hubs are necessary in star topology such as 10base-T A multi-port twisted pair hub allows several points-to-point segment to be joint in
one network
If the hub is attached to a backbone then all other computers at the end oftwisted pair segments can communicate with all the hosts on the backbone
-
7/28/2019 IT_All_notes.docx
3/9
Information Technology Sem I
3 | P a g e
Repeaters
They allow LANS to extend beyond normal distance limitation as it amplifies thedata signal and the timing so that the LAN can be extended with additional nodes
Bridges
Its function is to connect two separate networks together Bridges connect different networks such as Ethernet and fast-Ethernet or the
network of the same type
When a packet is received by the bridge, the bridge determines the destinationand source segments
It the segments are the same the packet is filtered, if the segments are differentthen the packet is forwarded to the correct segment
Bridges are also called stored and forward devices as the look the total Ethernetpacket before making filtering or forwarding decisions
Routers
They filter out network traffic by a specific protocol They also divide networks logically An IP router can divide a network into various subnets so that only traffic destine
only meant for a particular IP address can pass between segments
Network speed often decreases due to this type of intelligent forwardingFirewall
It is a system or group of system that enforces and access control policiesbetween two network
It can be thought of a pair of mechanism , one which exist to blocks traffic andother
Difference between Internet, Intranet and Extranet
Internet
It does not have a central computer system or telecommunication center insteadeach message sent on the internet has a unique IP address code, so any internet
server in the network can forward it to its destination.
The internet does not have a head quarter or a governing body
-
7/28/2019 IT_All_notes.docx
4/9
Information Technology Sem I
4 | P a g e
Application of internet
Email Use groups
Web Sites for ecommerce transactions Electronic discussion forums Bulletin board system Real time conversation with internet users Gathering informations through online services such as search engines
Business value of internet
Collaborations among business partners providing vendor and customer support Ecommerce Marketing, sales and customer service application Enterprise communication and collaboration
Six major Value propositions of building commercial websites by the
organizations
1. Generate new sales channel through online sales2. Reduce costs through online sales and customer support3. Attract new customers via web marketing, advertising and online sales4. Develop new information based products accessible through the web site5. Increase loyalty of existing customers via improved wed customer service and
support
6. Develop new web based markets and distribution channels for existing productsIntranet
With the advancement made in browser based software for the internet manyprivate organizations are implementing intranet
It is a private network utilizing internet type tools but available only within theorganization
Characteristics
It is a network inside an organization that uses internet technologies such aso Web browserso Serverso TCP/IP protocolso HTML
-
7/28/2019 IT_All_notes.docx
5/9
Information Technology Sem I
5 | P a g e
o document publishingo Data bases to provide internet like environment for sharing,
communications, collaborations and support various business processes
An intranet is protected by security measures such as passwords, encryptions andfirewalls so that it is access by authorized users, even though the internet
A complete intranet can be accessed through the intranet of the customers,suppliers and other business partners via extranet links
Extranet
Extranet are network links that use internet technologies to interconnect theintranet of a business with the intranets of various state holders
Companies can establish direct private network links between themselves orcreate private secured internet links between them called VPN
Use the unsecured internet as the extranet links between organizations intranetand various other stakeholders intranets using encryption of sensitive data and
firewalls
Business value
The browser technology of extranet makes customers and supplier access theintranet of the organization and the resources a lot easier and faster than
conventional way of communication
Extranets enable company to offer interactive web enabled services to thebusiness partners through which the strategic relations can be strengthened
It enables and improve collaboration amongst various business partners It facilitates an online interactive product development, marketing and customer
focused business processes that can bring better designed products to market
faster
Corporate governance
It is defined as a system of structuring, operating and controlling a company witha view to achieve long term sand regulatory strategic goals to satisfy shareholders
various stake holders and complying with the legal and regulatory requirements
apart from meeting environmental and local community needs.
The SEBI committee on corporate governance defines corporate government asacceptance by management of the inalienable rights of shareholders as the true
-
7/28/2019 IT_All_notes.docx
6/9
Information Technology Sem I
6 | P a g e
owners of the corporation and of the management own rule as trustees on behalf
of the shareholders. The MCA 21 project defined by ministry of corporate affairs
discusses the Indias corporate government goals for 21st
century.
The ISO
It is defined six principles for the governance
Responsibilityo Individuals and groups within the org. understand and accept the resp. in
respect of both supple of and demand for IT. Those with resp. or actions
also have the authority to perform those actions.
Strategyo The org. business strategy takes into account the current and future
capabilities of IT. The strategic plans for IT satisfy the current and on goin
needs of the org. business strategy.
Acquisitiono IT acquisitions are made for valid reasons on the basis of appropriate and
ongoing analysis with clear and transparent decision making. There is
appropriate balance between benefits opportunities, costs and risks in both
short term basis and long term basis.
Performanceo IT is meant for supporting the org. providing the services, levels of services
and quality of service required to meet current and future business
requirements.
Conformanceo It complies with all necessary legislations and regulations. Policies and
practices are clearly defined implemented and enforced
Behavioro IT policies practices and decisions demonstrates respect for human
behavior including the current and evolving needs of all the people I the
business processes
-
7/28/2019 IT_All_notes.docx
7/9
Information Technology Sem I
7 | P a g e
Governance of Internal IT processes
There are various regulatory complies requirements which are mandated by theOrganization for economic corporation and development(OECD)
It talks about principle of corporate governance, BASEL II norms, Sarbanes Oxleyand respective stock exchange guidelines
The rationale behind such regulations is to ensure a verifiable process to managecorporate risk and instill a corporate environment of respect for all stake holders
IT Security
CIA TriangleConfidentiality , Integrity and Availability is the industry standard for computer security
Confidentiality
Confidentiality of information ensures that only those with sufficient privilegemay access certain information. Confidentiality requires the proper techniques to
be in place to prevent unauthorized viewing of companys assets
Simple shoulder spine corporate espionage and social engineering needs to betaken care of through confidentiality
To protect the confidentiality of information following measures are usedo Information classificationo Secure document storageo Application of general security policieso Education of information custodians & end users
Integrity
It is the quality or the state of been complete and uncorrupted The integrity of information is threatened when it is exposed to corruption,
damage, destruction of its authentic state
Corruption can occur while information is been complied stored or transmitted Integrity stops information been modified or untrusted
-
7/28/2019 IT_All_notes.docx
8/9
Information Technology Sem I
8 | P a g e
Users are often involved in reaching integrity by modifying databases andgenerally not adhering to the policies put in place
The policies also have to be iron-clad so as to not put users in a position wherethey can make a mistake that would affect the credibility of a document in thefirst place
Availability
It is the characteristics of information that enables users access to informationwithout interference or obstructions and in the required format
Availability does not imply that the information is accessible to any users rather itmeans availability to authorized users
Availability covers area such as power failures, hard disk drive failure and all othersystem availability failures
Security management controls
Security is based on converged physical security on a designed philosophy thatincludes a strategy for managing physical access to corporate resources
Security measures must strike balance between security and functionalityPhysical security
Physical security is the security of personnel, hardware, programs, networks anddata from physical circumstances and events that could cause serious losses or
damages to the enterprise or institution
It means the protection of building sites and equipment, and all information andsoftware contained therein from theft, vandalism, natural disasters, manmade
catastrophe and accidental damages
It requires solid building constructions, suitable and reliable power supplies,adequate climate control and appropriate protection from intruders which
involves locks and physical securities and asset tagging and asset life cyclemanagement
-
7/28/2019 IT_All_notes.docx
9/9
Information Technology Sem I
9 | P a g e