Sunteți pe pagina 1din 49

Once again

ICT
Puneet Sharma(Tel & IT- 11)
Ranjit Singh(Tel & IT- 13)

1
Contents
ICT’s

Development
Requirements
Procedures
Processes
Architecture
Management
Security

2
Mobile Phone

3

The mobile phone or cell phone is a long-range,


portable electronic device used for mobile


communication. In addition to the standard voice
function of a telephone, current mobile phones
can support many additional services such as
SMS for text messaging, email, packet switching
for access to the Internet, and MMS for sending
and receiving photos and video. Most current
mobile phones connect to a cellular network of
base stations (cell sites), which is in turn
interconnected to the public switched telephone
network (PSTN)

4
 Various cell phones from the past 10–15 years.
Legend:
1. NEC Cellstar 500 series (1992)
2. Nokia 2110 series (1994)
3. Nokia 5120 (1998)
4. Kyocera 2135 (2002)
5. Audiovox CDM8300 (2002)
6. Samsung SCH-A650 (2004)

5
History

 In 1945, the zero generation (0G - radio telephone) of mobile telephones was
introduced. 0G mobile telephones were not officially categorized as mobile
phones, since they did not support the automatic change of channel frequency
during calls, which allows the user to move from one cell (the base station
coverage area) to another cell, a feature called "handover".

 The first commercial cellular network was launched in Japan by NTT in 1979. Fully
automatic cellular networks were first introduced in the early 1980s (the 1G
generation) with the Nordic Mobile Telephone (NMT) system in 1981. This was
followed by a boom in mobile telephone usage, particularly in Northern Europe.
1G (or 1-G) is short for first-generation wireless telephone technology,
cellphones. These are the analog cellphonestandards. 1G networks use the
radio (analog ) signals.

 The first "modern" network technology on digital2G (second generation) cellular


technology was launched in 1991 in Finland on the GSM standard which also
marked the introduction of competition in mobile telecoms.
 A digital system is one that uses discrete values (often electrical voltages),
representing numbers or non-numeric symbols such as letters or icons, for input,
processing, transmission, storage, or display, rather than a continuous range of
values ( as in an analog system).

6
Iphones
 The iPhone is a multimedia,
Internet-enabled mobile phone
designed and marketed by
Apple Inc. It has a multi-touch
screen with virtual keyboard
and buttons. The iPhone's
functions include those of a
camera phone and a portable
media player ("iPod"), in
addition to text messaging and
visual voicemail. It also offers
Internet services including e-
mail, web browsing. It is a
mobile phone that uses the
GSM
 The iPhone was introduced, first
in the United States on June
29, 2007
7
Requirements of ICT
The main functional requirements for ICT
infrastructure in ECE Services are:

The ICT infrastructure will readily support the


applications children, educators, and
administrators want to use.
Access to the ICT infrastructure will be available
throughout the Service
The ICT infrastructure will be robust and reliable,
and always available, so that users can have
confidence in using it.
The ICT infrastructure will be sustainable.
Data will always be secured and the users always
protected.
8

Underlying Requirements

 The technical standards will specifically address factors which


will ensure:

 Reliability Unreliability compromises the learning


experience, frustrates the educator, and reduces
confidence and ultimately use of the facilities.
 Compatibility Compatible ICT technologies will be
deployed.  This includes equipment and services.
 Cost effectiveness The purchase cost of new ICT equipment
is only part of the total cost of ownership.  Expected life,
and support and maintenance costs will be factored into
the decision making process.
 Maintenance, user support, and sustainability Users
want to concentrate on educational and administration
activities, and not have to worry about maintaining the ICT
infrastructure.  Helpdesk and support services will be
available at a reasonable cost.
9

Specific Requirements

Service-wide access based on wired technology A


network that delivers multimedia services is required. 
Multimedia places heavy demands on the network
(e.g. streaming video which needs to be handled
intelligently). To meet these demands, wired networks
will continue to form the foundation of ECE networks
for the foreseeable future.
Wireless access Wireless access will be used to
complement access to the wired network 
Wireless network performance is inferior to wired
network performance.  While wireless technology will
provide the Service-wide and flexible access to the
network, image-intensive applications and services
place high bandwidth demands on a network which
can presently only be met by a wired infrastructure.
 10
 Internet access Broadband internet access is an essential
element of the ECE ICT framework.  It will provide a tool for
better communication with families and a gateway for
parents to become more involved with the education of
their children.  Web-based information systems provide an
opportunity for a structured and managed learning
experience, extending a child’s interest, and adding an
extra dimension to their learning. 
Access to the internet enables educators to gather
resources relevant to the ECE sector, to open up new or
additional learning opportunities and access professional
development.
 Remote Access To facilitate authorised access to data from
outside the Service, VPN access may be necessary.  For
example, educators might want to access teaching
materials, children’s learning profiles, or administration
data.  In some cases, Services may want to offer parents
access to their child’s work and records.
 11
Procedures

 All ICT equipment, software, systems and services are for official use only.


 Use of information from university applications and databases for personal or non-University
purposes is strictly prohibited.


 Users are responsible for the security and confidentiality of the data and information which they get
access to.


 All Kulliyyahs/Centres/Divisions should manage and record all ICT equipment through the Inventory
System.


 Users are liable for any case of loss, damage and theft due to improper use and negligence on all
ICT equipment.


 Users are not allowed to access any restricted areas without permission (e.g. LAN rooms and IIUM
Data Centre).
12

ITD SERVICE DESK

 All complaints, requests and enquiries on ICT services should be


forwarded to ITD Service Desk.

 Gombak Campus
 a. Telephone extension - 2222 / 5211
 b. Fax - 2221
 c. Email - servicedesk@iiu.edu.my
 Kuantan Campus
 a. Telephone extension - 6666
 b. Fax - NA
 c. Email - helpdeskktn@iiu.edu.my

2. Services offered are as follows:


 i. Computer repair and maintenance (for Centre/Division without
technicians)
13
 ii. Network request and complaint.
 iv. Email complaint.
 v. ICS related services.
 vi. Loan of ICT equipment.
 vii. Booking of ITD training laboratory.

 All requests should be recommended by
Dean/Director/Head of Department/IT Coordinator.

 All complaints related to the above services should be
forwarded to ITD Service Desk.

 All services provided are in accordance to ITD client
charter.

14

Account
i. Matric number will be used as username and PIN as

password.
ii. Account will be used for printing, storage and email

services.

Printing
i. Students may use the centralized printing system subject

to sufficient credit in the account.


ii. Each deposit must be in a multiple of Rs5.00.

iii. Students are charged Rs 0.10 (black and white) or Rs

1.00 (colour) per page.

15
Centralized storage
i. Students are allocated 80 MB of storage.

ii. The storage is assigned at P: drive for Windows and

home folder for Macintosh.



Email
i. Students are allocated 20 MB of storage.
ii. Email can be accessed through

http://webmail.stud.iiu.edu.my

 16
ICT process

17
Communication
A chain
network e.g
formal
contact

18
Communication
A circle network e.g.
between people at
the same level

19
Communication
A wheel network
e.g. sales teams
report to head
office

20
Communication
An all-channel
network e.g.
brainstorming

21
Examples of ICT Use
Mobile telephones
Video and tele-conferencing
Lap-top computers
E-mail
Multi-media communications

22

 ICT Architecture

23
W h a t m a n a g e rs w a n t
fro m IC T ?
A cce ss a n y in fo rm a tio n
w h e re e ve r
a n d w h e n e ve r n e ce ssa ry
Fa st a lig n m e n t to
ch a n g e s in th e
b u sin e ss
A ccu ra te a n d
co n siste n t
in fo rm a tio n
C o n tro lla b le
Q oS at
m a n a g e a b le
co sts 24
How does an Architecture
help:
Information Architecture
Application Architecture
Infrastructure Architecture

25
How does an Architecture
help:
fast alignment to business
changes
Architecture as an interface between business <-
> ICT
Functional changes -> reuse of information and
applications
capacity upscaling -> scaling of applications and
infrastructure (insight in performance of
components)
continuity upscaling -> upscaling applications
and infrastructure (insight in continuity
components)
26

help:
fast alignment to business
changes
Complements business plan
Short term developments in long term
perspective
Documentation/ understanding business
decisions
Integration of old and new
Co-operation management\application
building\systems dept.
Help with mergers, new services, acquisitions,
etc.
Insight despite limited view non-specialists
Focus on strategic deployment of technology 27
How does an Architecture
help:
Controllable QoS at manageable costs
Insight in costs per component
pro-active performance management
focus on key technologies
common terminology
help for joiners/stayer
guideline for centralisation versus distribution

28
ICT TRENDS IN INDIA
Information and Communication Technology (ICT) is changing the face
of
contemporary World. The ICT has not only connected the World at one

single
platform but it is also helping in the integration of various traditional

societies
into modern societies. The mandates of globalisation also require an

interaction
between Indian economy and World’s economy. Globalisation is closely

related to
ICT and the ICT strategy of a nation is very crucial to put it on a global

map. The
ICT strategy in India must be techno-legal in nature rather than purely

legal or
purely technological. Unfortunately, Indian ICT Strategy is not upto the

mark and
the same is further degraded with the introduction of the proposed

amendments to the IT Act, 2000 (if the original recommendations


have been accepted as it is). 29

Though India is emerging as a leader in the field of ICT related services
yet there
seems to be some missing links. They pertain to the following:

(a) The requirement of paying attention to e-security in India that

covers cyber
forensics, computer and cyber security, etc.

(b) The cyber law in India also imposes certain restrictions and their

violations
may take the form of offences and contraventions. Cyber crimes in

India are taken


care of by the Information Technology Act, 2000 (IT Act, 2000) that

also
mandates adherence to certain compliance requirements. These

aspects must be
kept in mind by Companies, Individual and even by the Government.

(c) The establishment of digital evidencing base is an absolute

requirement in
India. The same is missing for the time being.
30
(d) There is also a dire need of judicial reforms in India keeping in mind
the
requirements of ICT.

(e) The establishment of electronic courts in India would be a good

step towards
implementing the judicial reforms in India in an effective manner.

(f) The electronic era has its own challenges that must be tackled

effectively.
(g) The introduction of wireless technology in India would require its

own
security requirements. Thus, the wireless security in India must be

considered on
a priority basis.

(h) There are legal risks of electronic commerce as well that also

cannot be
ignored.

(i) The internet banking in India must also be developed so that a

sound
31
e-commerce platform can be established in India.
(j) At the same time the ICT strategy in India must be “reformulated”
so that it is
conducive for the overall development of Indian economy.

(k) E-learning in India must be used for techno-legal educational

purposes in
India.

(l) We also need Techno-Legal education in India to cater the need of

legal KPO
and legal BPO.

(m) The proposed amendments of the cyber law of India, i.e. IT Act,

2000 must
be made public and transparent. The IT Act, 2000 must be amended

properly and
the proposed amendments to the IT Act, 2000, as originally suggested

by the
Expert Committee, must be rejected at all costs. If some changes have

been made
in the original recommendations of the Expert Committee, they must

be discussed 32
ICT Management
 Managing Information Communication Technology (ICT) will
enable organisations to get more out of their current
equipment and also to make better decisions around the
purchase of new equipment and ICT developments.
 Small organisations with one computer still need to manage
their ICT as it is likely to be used for important tasks, such
as:
 writing documents more efficiently
 managing accounting and budgeting so that you have better
information about your financial situation
 recording contact with clients more accurately and in more
detail
 improving communications within the organisation and with
others.
 Larger organisation may use ICT to carry out increasingly
complex functions which may include complicated software
solutions and hardware set-up.
33

organisations recognise the need to manage
their premises, accounting and other office
equipment, it is essential that managing ICT
is recognised as fundamental to the
development of the organisation.
Careful management of ICT will not only help
organisations meet their aims and objectives,
it will also prevent organisations making
possibly expensive mistakes.

34
Budgeting and finance

Calculating the technological budget - provides


instructions for using a downloadable Excel
spreadsheet for a simple way to help you
calculate your ICT budget
Planning & Budgeting for IT equipment – helps
organisations plan for equipment
replacement and explains the importance of a
purchasing plan
Allocating funds for ICT– provides help with
what to consider when putting together a
funding application or budget
 35
ICT Security
Computers & networks are becoming a utility
(like water, electricity, gas, telephone)
Business and personal life are more and more
dependent on computers

36
Basic Security Services
Privacy / Confidentiality:
To know that no 3rd party can read a
message exchanged between 2
people
Authentication:
To know that someone is who he/she
says he/she is
Integrity:
To know that a message has not been
modified in transit
Non-repudiation:
To know that someone is not able to
deny later that she/he sent a
message

37
Security Applications
The security services that can be used:
Digital Signature
Anonymous e-cash
Certified e-mail
Secure elections
Simultaneous contract signing

38
Non-trivial Insights
Technology alone can not fix security
problems – Technology is necessary
but not sufficient
Security is everyone’s business, not just
the business of security experts
Security decisions must be taken by
Management, not by technical staff
Security is risk management – the art to
worry about the right things

39
Cryptography- the Beauty of
Mathematics
Cryptographic algorithms are “building
blocks” to construct secure system
Dramatic advances in cryptography in the
last 30 years:
 Public Key Cryptography (1976)
 Microprocessor: cheap computing power
 Quantum cryptography (future)

Reminder: security is more a “people


problem” than a technical problem

40
Secret Key Encryption
 Plain text Plain text
  
encrypt message with decrypt message with
 secret key same secret key
  
cipher text

 Both parties share a single, secret key


 Problem: exchanging keys in complete secrecy is
difficult
 Best-known example: DES (Data Encryption
Standard)

41
Public Key Encryption
 Plain text Plain text
  
encrypt message with decrypt message with
public (!) key of receiver (!) private key of
receiver
   cipher
text
Each participant has
 A private key that is shared with no one else,
plus
 A public key known to everyone
Problem: slower than Secret Key Encryption
Best-known example: RSA

42
Biometrics: your Body – your
Password?
Recognize a person upon physiological or
behavioral characteristics
Fingerprint
Face
Voice
Iris
Currently costs outweigh benefits

43
The Need for International
Security Standards
Technical standards should be
international:
Ensures interoperability - the whole
point of most of the standards
Economies of scale
Best practice standards would be very
helpful to be international
Raises awareness
Regulatory issues & law enforcement is a
national (or regional, e.g. European
Union) matter

44
Corporate ICT
Security Policy

45
Corporate ICT Security
Policy
The role of the above policy is to lay down company
procedures, guidelines and practices necessary to keep
the hardware, software and data safe from theft, misuse
and unauthorised access. This ensures there is a central
document of ICT security standards that managers and
ICT personnel can refer to when making decisions about
ICT related matters.

There are at least 5 factors that should be considered in this policy:


1 . P revention of misuse
2 . D etection of misuse Company Procedures should ensure all
computer systems are within the law, notably
3 . I nvestigation of misuse the Computer Misuse Act and the Data
Protection Act.
4.Staff responsibilities
5.Disciplinary procedures These two areas will go on to inform the
Code of Practice that all company staff
will have to sign.

46
Company Procedures within
the Corporate IS Security Policy
Prevention & detection of misuse procedures go hand in hand:

 Issue userids and passwords


 Have a backup and recovery plan
 Have company wide anti-virus software running on each computer to
prevent and detect virus threats.
 Have a firewall installed between the company network and any external
network such as the Internet to prevent unauthorised access to the
network.
 Encrypt sensitive data and emails so that only a person with the correct
coded key can read them; unauthorised personnel can’t understand
data.
 Physical security procedures such as ID and swipe cards to enter rooms
to prevent/detect unauthorised personnel entering restricted areas.

47
Code of Practice

An employee Code of Practice (or Code of Conduct or Acceptable


Use Policy) is a behaviour code for computer users describing: their


responsibilities; rules for maintaining security; penalties for misuse.

Factors to consider:

 use of company software: infringing copyright


 use of company hardware: introducing viruses via USB stick from
game
 use of company data: disclosure to authorised people only
 correct use of time: use of computer facilities for personal use in
work time
 correct use of security available: passwords, swipe cards, logging
off …
 penalties for misuse

 Employees need to sign this policy before they can use the 48

 Thank You

49

S-ar putea să vă placă și