it_all_notes.docx

Upload: sahiljain

Post on 03-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 IT_All_notes.docx

    1/9

    Information Technology Sem I

    1 | P a g e

    ContentsWhat is Ethernet? .......................................................................................................................................................2

    Ethernet products...................................................................................................................................................2

    Trans receivers....................................................................................................................................................2

    Hubs ....................................................................................................................................................................2

    Repeaters...........................................................................................................................................................3

    Bridges ................................................................................................................................................................3

    Routers ...............................................................................................................................................................3

    Firewall ...............................................................................................................................................................3

    Difference between Internet, Intranet and Extranet .................................................................................................3

    Internet ...................................................................................................................................................................3

    Application of internet .......................................................................................................................................4

    Business value of internet ..................................................................................................................................4

    Six major Value propositions of building commercial websites by the organizations .......................................4

    Intranet ...................................................................................................................................................................4

    Characteristics ....................................................................................................................................................4

    Extranet ..................................................................................................................................................................5

    Business value ....................................................................................................................................................5

    Corporate governance ................................................................................................................................................5

    The ISO ....................................................................................................................................................................6

    Governance of Internal IT processes ......................................................................................................................7

    IT Security ...................................................................................................................................................................7

    CIA Triangle .............................................................................................................................................................7

    Confidentiality ....................................................................................................................................................7

    Integrity ..............................................................................................................................................................7

    Availability ..........................................................................................................................................................8

    Security management controls ..............................................................................................................................8

    Physical security .....................................................................................................................................................8

  • 7/28/2019 IT_All_notes.docx

    2/9

    Information Technology Sem I

    2 | P a g e

    What is Ethernet?

    Ethernet is a shared media. There are rule for sending packets of data to avoid conflicts and protect data

    integrity.o Nodes determine when the network is available for sending packets.o It is possible that two nodes at a different locations attempt to send data at

    the same time.

    o When both nodes are transferring a packet to the network at the sametime collision will result.

    o Minimizing collisions is a crucial element in the design and operation of thenetwork

    o Increased collisions are often the result of too many users on the network.Which results in bandwidth saturation of the network

    o This can slow the performance of the network from the users point of viewo Segmenting the network, where a network is divided into different pieces

    joined together logically with bridges or switches is one way of reducing

    and overcrowded network

    Ethernet products

    The standards and technology which are used to build Ethernet networkTrans receivers

    They are used to connect nodes to the various Ethernet media Most computers and network interface cards contain a built-in 10Base-T or

    10Base-2 receiver allowing them to connect directly to Ethernet without requiring

    an external trans receiver

    Fast Ethernet networks has got new interface which Is known as mediaindependent interface to support transmission upto 100mbps

    Hubs

    They are used to connect 2 or more Ethernet segments of any media type Ethernet hubs are necessary in star topology such as 10base-T A multi-port twisted pair hub allows several points-to-point segment to be joint in

    one network

    If the hub is attached to a backbone then all other computers at the end oftwisted pair segments can communicate with all the hosts on the backbone

  • 7/28/2019 IT_All_notes.docx

    3/9

    Information Technology Sem I

    3 | P a g e

    Repeaters

    They allow LANS to extend beyond normal distance limitation as it amplifies thedata signal and the timing so that the LAN can be extended with additional nodes

    Bridges

    Its function is to connect two separate networks together Bridges connect different networks such as Ethernet and fast-Ethernet or the

    network of the same type

    When a packet is received by the bridge, the bridge determines the destinationand source segments

    It the segments are the same the packet is filtered, if the segments are differentthen the packet is forwarded to the correct segment

    Bridges are also called stored and forward devices as the look the total Ethernetpacket before making filtering or forwarding decisions

    Routers

    They filter out network traffic by a specific protocol They also divide networks logically An IP router can divide a network into various subnets so that only traffic destine

    only meant for a particular IP address can pass between segments

    Network speed often decreases due to this type of intelligent forwardingFirewall

    It is a system or group of system that enforces and access control policiesbetween two network

    It can be thought of a pair of mechanism , one which exist to blocks traffic andother

    Difference between Internet, Intranet and Extranet

    Internet

    It does not have a central computer system or telecommunication center insteadeach message sent on the internet has a unique IP address code, so any internet

    server in the network can forward it to its destination.

    The internet does not have a head quarter or a governing body

  • 7/28/2019 IT_All_notes.docx

    4/9

    Information Technology Sem I

    4 | P a g e

    Application of internet

    Email Use groups

    Web Sites for ecommerce transactions Electronic discussion forums Bulletin board system Real time conversation with internet users Gathering informations through online services such as search engines

    Business value of internet

    Collaborations among business partners providing vendor and customer support Ecommerce Marketing, sales and customer service application Enterprise communication and collaboration

    Six major Value propositions of building commercial websites by the

    organizations

    1. Generate new sales channel through online sales2. Reduce costs through online sales and customer support3. Attract new customers via web marketing, advertising and online sales4. Develop new information based products accessible through the web site5. Increase loyalty of existing customers via improved wed customer service and

    support

    6. Develop new web based markets and distribution channels for existing productsIntranet

    With the advancement made in browser based software for the internet manyprivate organizations are implementing intranet

    It is a private network utilizing internet type tools but available only within theorganization

    Characteristics

    It is a network inside an organization that uses internet technologies such aso Web browserso Serverso TCP/IP protocolso HTML

  • 7/28/2019 IT_All_notes.docx

    5/9

    Information Technology Sem I

    5 | P a g e

    o document publishingo Data bases to provide internet like environment for sharing,

    communications, collaborations and support various business processes

    An intranet is protected by security measures such as passwords, encryptions andfirewalls so that it is access by authorized users, even though the internet

    A complete intranet can be accessed through the intranet of the customers,suppliers and other business partners via extranet links

    Extranet

    Extranet are network links that use internet technologies to interconnect theintranet of a business with the intranets of various state holders

    Companies can establish direct private network links between themselves orcreate private secured internet links between them called VPN

    Use the unsecured internet as the extranet links between organizations intranetand various other stakeholders intranets using encryption of sensitive data and

    firewalls

    Business value

    The browser technology of extranet makes customers and supplier access theintranet of the organization and the resources a lot easier and faster than

    conventional way of communication

    Extranets enable company to offer interactive web enabled services to thebusiness partners through which the strategic relations can be strengthened

    It enables and improve collaboration amongst various business partners It facilitates an online interactive product development, marketing and customer

    focused business processes that can bring better designed products to market

    faster

    Corporate governance

    It is defined as a system of structuring, operating and controlling a company witha view to achieve long term sand regulatory strategic goals to satisfy shareholders

    various stake holders and complying with the legal and regulatory requirements

    apart from meeting environmental and local community needs.

    The SEBI committee on corporate governance defines corporate government asacceptance by management of the inalienable rights of shareholders as the true

  • 7/28/2019 IT_All_notes.docx

    6/9

    Information Technology Sem I

    6 | P a g e

    owners of the corporation and of the management own rule as trustees on behalf

    of the shareholders. The MCA 21 project defined by ministry of corporate affairs

    discusses the Indias corporate government goals for 21st

    century.

    The ISO

    It is defined six principles for the governance

    Responsibilityo Individuals and groups within the org. understand and accept the resp. in

    respect of both supple of and demand for IT. Those with resp. or actions

    also have the authority to perform those actions.

    Strategyo The org. business strategy takes into account the current and future

    capabilities of IT. The strategic plans for IT satisfy the current and on goin

    needs of the org. business strategy.

    Acquisitiono IT acquisitions are made for valid reasons on the basis of appropriate and

    ongoing analysis with clear and transparent decision making. There is

    appropriate balance between benefits opportunities, costs and risks in both

    short term basis and long term basis.

    Performanceo IT is meant for supporting the org. providing the services, levels of services

    and quality of service required to meet current and future business

    requirements.

    Conformanceo It complies with all necessary legislations and regulations. Policies and

    practices are clearly defined implemented and enforced

    Behavioro IT policies practices and decisions demonstrates respect for human

    behavior including the current and evolving needs of all the people I the

    business processes

  • 7/28/2019 IT_All_notes.docx

    7/9

    Information Technology Sem I

    7 | P a g e

    Governance of Internal IT processes

    There are various regulatory complies requirements which are mandated by theOrganization for economic corporation and development(OECD)

    It talks about principle of corporate governance, BASEL II norms, Sarbanes Oxleyand respective stock exchange guidelines

    The rationale behind such regulations is to ensure a verifiable process to managecorporate risk and instill a corporate environment of respect for all stake holders

    IT Security

    CIA TriangleConfidentiality , Integrity and Availability is the industry standard for computer security

    Confidentiality

    Confidentiality of information ensures that only those with sufficient privilegemay access certain information. Confidentiality requires the proper techniques to

    be in place to prevent unauthorized viewing of companys assets

    Simple shoulder spine corporate espionage and social engineering needs to betaken care of through confidentiality

    To protect the confidentiality of information following measures are usedo Information classificationo Secure document storageo Application of general security policieso Education of information custodians & end users

    Integrity

    It is the quality or the state of been complete and uncorrupted The integrity of information is threatened when it is exposed to corruption,

    damage, destruction of its authentic state

    Corruption can occur while information is been complied stored or transmitted Integrity stops information been modified or untrusted

  • 7/28/2019 IT_All_notes.docx

    8/9

    Information Technology Sem I

    8 | P a g e

    Users are often involved in reaching integrity by modifying databases andgenerally not adhering to the policies put in place

    The policies also have to be iron-clad so as to not put users in a position wherethey can make a mistake that would affect the credibility of a document in thefirst place

    Availability

    It is the characteristics of information that enables users access to informationwithout interference or obstructions and in the required format

    Availability does not imply that the information is accessible to any users rather itmeans availability to authorized users

    Availability covers area such as power failures, hard disk drive failure and all othersystem availability failures

    Security management controls

    Security is based on converged physical security on a designed philosophy thatincludes a strategy for managing physical access to corporate resources

    Security measures must strike balance between security and functionalityPhysical security

    Physical security is the security of personnel, hardware, programs, networks anddata from physical circumstances and events that could cause serious losses or

    damages to the enterprise or institution

    It means the protection of building sites and equipment, and all information andsoftware contained therein from theft, vandalism, natural disasters, manmade

    catastrophe and accidental damages

    It requires solid building constructions, suitable and reliable power supplies,adequate climate control and appropriate protection from intruders which

    involves locks and physical securities and asset tagging and asset life cyclemanagement

  • 7/28/2019 IT_All_notes.docx

    9/9

    Information Technology Sem I

    9 | P a g e