Documente Academic
Documente Profesional
Documente Cultură
2
PART 1: OVERVIEW OF ONLINE LEARNING ..................................................................................... 2
1.1 Introduction.............................................................................................................................. 2
1.2 Components of IT Infrastructure ............................................................................................ 2
1.2.1 Hardware................................................................................................................................. 2
1.2.2 Software .............................................................................................................................. 3
1.2.3 Database Management Systems ...................................................................................... 3
1.3 Deployment of IT Infrastructure ............................................................................................. 4
1.4 Computer Networks ................................................................................................................ 5
1.5 Network Standards ................................................................................................................. 5
1.6 IP Networks ............................................................................................................................. 6
1.7 Securing Networks .................................................................................................................. 7
1.7.1 Firewalls .................................................................................................................................. 7
1.7.2 Personal Firewalls .................................................................................................................. 7
1.7.3 Intrusion Detection Systems (IDS) ........................................................................................ 8
1.8 Cryptography........................................................................................................................... 8
Cryptographic Applications .............................................................................................................. 8
1.9 Summary ................................................................................................................................. 9
1
Module-1 Facilitated E-Learning
1.1 Introduction
The eLearning module covered 12% and is expected to have been completed before studying this
section of facilitated eLearning. The objective of this section is to ensure that DISA can “demonstrate
understanding of functioning of key components of existing and emerging Information
Technologies and their practical deployment”. This section has 4 chapters with each chapter
dived into 2 parts. The first part of the first chapter covers overview of eLearning and the second part
covers FAQs related to eLearning. The objective of this chapter is to supplement the self-study of
eLearning contents and help clarify any doubts on any of these topics. The chapters 2 to 4 cover
various topics relating to existing and emerging technology which have critical impact on chartered
accountants. The coverage of this module is 6% and will be covered in one day of classroom
teaching. The objective of this section is to provide good understanding of Information Technology
concepts which is very essential for providing consulting and assurance services in IT driven
business processes.
2
Chapter 1, Part 1: Overview of Online Learning
also ensures that the expansion or reduction of resources takes place in tune with the overall
organisational growth or reduction. Hardware asset management is an important function in in any
organisation using hardware for meeting its goals. It includes management of all the phases such as
hardware asset acquisition, hardware maintenance, hardware monitoring and retirement.
1.2.2 Software
Computer hardware constitutes the physical components. It works based on the instruction input
given by the users and other programs. Such a set of instruction input is actually its software. The
term software in its broad sense refers to the program that the machine executes. Software is the
intangible portion whereas hardware is the tangible portion, something we can touch and see. The
cost and complexity of software have been increasing over the years and it is critical to effectively
manage this as it is both a major investment and major expenditure. Two important types of software
are system software and application software. System software includes both operating systems and
utility programs. System software controls how various technology tools work with application
software. System software is a collection of computer programs used in design, processing and
control of application software. System software coordinates instructions between applications and
hardware.
Operating system (OS) is one of the important system software that controls how hardware devices
work together and interfaces with applications software. Operating system is a set of programs
implemented in software, hardware and firmware which permits sharing and use of resources. It
enables users to interact with the machine and takes care of technical aspects of a computer’s
operation. Some important functions of OS are
• Processor management
• Memory management
• Device management
• File Management
• Secondary storage management
• Networking
• Application programme interface
• User interfaces with system
Utility Software provides additional functionality to operating systems. Application software fulfils the
specific information processing needs of an organisation. Software is crucial for the success of
organisations and hence has to be effectively managed. Operating systems are secured through
access controls, hardening of systems and application of patches. Understanding software helps us
in optimally managing our software assets through their lifecycle. Software acquisition procedures,
licensing, version controls and digital rights management are some important issues which have to
be considered.
1.2.3 Database Management Systems
3
Module-1 Facilitated E-Learning
Any organisation has to manage the important resource, information. At the very heart of most of
management information systems are databases and database management systems. A database
maintains information about various entities and a database management system (DBMS) is
software through which users and application programs interact with a database. Databases and
DBMS is the foundation of Information Economy. DBMS is a software system for creation and control
of a database and manipulation of the data in the database. It provides the facility to create and
maintain a well-organized database. Applications access the DBMS, which then accesses the data.
The advantages of DBMS are
• Permitting data sharing
• Minimizing data redundancy
• Maintaining data integrity
• Program and file consistency
• User-friendliness
• Improved security
• Achieving program/data independence
• Faster application development
A database should be designed to store all data relevant to business to facilitate quick and easy
modifications. The Relational Database Model is one of the most widely used models and is very
simple and elegant. A relational database is a collection of one or more relations, where each relation
is a table with rows and columns which is a logical equivalent of files. It permits the use of simple,
high-level languages to query the data. Since databases allow access to one of the most critical
resource of an organisation, i.e. data, the controls in it are implemented through:
• Database roles and permissions- for segregation of duties
• Concurrency control
• Views
• Stored procedures
• Triggers
DBMS is crucial for any organisation and it has to be controlled, monitored and assessed.
4
Chapter 1, Part 1: Overview of Online Learning
5
Module-1 Facilitated E-Learning
computer or device moves over a range of network environments and reaches the receiver’s
computer or device, as the sender sent it.
A practical model or more appropriate a suite of specific network protocols is TCP/IP, around which
Internet has been built. The practical model or the protocol suite which comes into play in data
communication between Devices on a network is TCP/IP. TCP/IP is a set of protocols developed to
allow cooperating computers to share resources across the networks. It establishes the standards
and rules by which messages are sent through the networks. This model splits the job of moving
information between networked computers into five smaller stages called layers; in each of these
phases or layers some tasks are done. These tasks are based on certain standards or rules called
protocols. TCP/IP protocol suite is a bundle of protocols that are segmented into five layers.
5. Application Layer
4. Transport layer
3. Internetworking Layer
2. Data link layer
1. Physical layer
1.6 IP Networks
IP Networks is the main strength behind Internet. An IP network is a communication network that
uses Internet Protocol (IP) to send and receive messages between one or more computers. An IP
network is implemented in Internet networks, local area networks (LAN) and enterprise networks. All
hosts or network nodes must be configured with the TCP/IP suite and must have an IP address. A
logical address is given to all hosts connected to Internet and this logical address is called Internet
Protocol Address (IP Address). IP Address (IPv4) is an address which is 32-bits in length written in
form of 4 Octets or Bytes separated by a dot. Example: xxx.xxx.xxx.xxx or 117.149.29.234. There
are 5 Classes of IP addresses in IPv4 Class A to Class E. IP address contains information of three
fields: class type, netid, and hostid.
Every IP address that is exposed to the public Internet is unique and is called Public IP Address. In
contrast, IP addresses within a local network can use the same private addresses. IP addresses
could again be Static or dynamic IP addresses. Ports are a 16 bit number assigned to user sessions
and server applications in an IP network. Domain Name Systems help in mapping generic names of
sites, like www.yahoo.com into IP addresses. Understanding of these concepts is essential today
since networks like Internet are being used extensively and no enterprise can hope to exist without
networks.
6
Chapter 1, Part 1: Overview of Online Learning
1.7.1 Firewalls
Firewalls are an effective means of protecting a local system or network of systems from network-
based security threats while at the same time affording access to the outside world via wide area
networks and the Internet. Firewall may be a hardware device or a software program running on a
secure host computer, or a combination of hardware and software deployed at the perimeter of the
network. It enforces the security policy between an organisation’s secured network and the
unsecured environment and works for both inbound and outbound traffic.
The primary functions of a firewall are:
• Manage and control network traffic
• Authenticate access
• Act as an intermediary
• Protect resources
• Record and report on events
Firewalls could be based on hardware or software and they work as per following configurations:
• Packet filtering firewall
• Stateful inspection packet filtering firewall
• Circuit level firewall
• Application level firewall
For a firewall to be able to successfully protect resources, it is critical to implement a design that
lends itself to protecting those resources in the most efficient manner. Although a single firewall will
do an adequate job of protecting most resources, certain high security environments may warrant
using multi-firewall architecture to minimize exposure and risk. From a simple packet filtering to the
screened sub-netting implementations, there are various implementation strategies, as follows,
• Single homed firewalls
• Dual Homed firewalls
• Screened subnet firewalls
Like any other security device firewalls have to be properly configured and monitored.
1.7.2 Personal Firewalls
Personal firewalls are software installed in a user's computer that offers protection against unwanted
intrusion and attacks coming from the Internet. A personal firewall controls network traffic to and from
a computer, permitting or denying communications based on a security policy. Personal firewalls are
available from numerous security vendors, and many of the operating systems include their own
Firewall. In addition to blocking unwanted incoming traffic, these firewalls can be configured to block
specific types of outgoing traffic as well.
7
Module-1 Facilitated E-Learning
1.8 Cryptography
Cryptography has gained prominence because of the need to safeguard information from falling into
wrong hands. It provides solutions to problems related to protection of data and identity with regard
to data in transit. Some of the issues which have to be addressed for all communications taking place
over network relate to:
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
Cryptography helps in addressing confidentiality related issues. Cryptography when used as an
element of PKI also addresses Integrity, Authentication and non-repudiation related issues. There
are in general, three types of cryptographic schemes to accomplish these goals:
• Secret Key or Symmetric Cryptography (SKC)
• Public Key or Asymmetric Cryptography (PKC)
• Message Hash Functions
PKI is a comprehensive system that provides public-key encryption and digital signature services to
ensure confidentiality, access control, data integrity, authentication and non-repudiation. The basic
purpose of PKI is to help in maintaining the attributes of trust in any electronic transaction. PKI
includes the following elements:
• Public/private key pair
• Digital certificate
• Certifying authority
Cryptographic Applications
Cryptographic systems are techniques which use one or more forms of cryptography and/or PKI to
secure electronic transmissions from threats relating to confidentiality, integrity, authentication and
non-repudiation.
8
Chapter 1, Part 1: Overview of Online Learning
1.9 Summary
Understanding Information Technology areas is important for us to use in our working as well as
providing consulting and assurance services in IT driven business processes. We have provided an
overview of Information Technology Infrastructure, introduction to networks and securing networks.
The key concepts covered in chapter 1 to 3 of elearning have been summarised in this chapter.