Documente Academic
Documente Profesional
Documente Cultură
Architecture
Management , Security
Puneet Sharma(Tel & IT- 11)
Ranjit Singh(Tel & IT- 13)
Mobile Phone
In 1945, the zero generation (0G - radio telephone) of mobile telephones was
introduced. 0G mobile telephones were not officially categorized as mobile
phones, since they did not support the automatic change of channel frequency
during calls, which allows the user to move from one cell (the base station
coverage area) to another cell, a feature called "handover".
The first commercial cellular network was launched in Japan by NTT in 1979. Fully
automatic cellular networks were first introduced in the early 1980s (the 1G
generation) with the Nordic Mobile Telephone (NMT) system in 1981. This was
followed by a boom in mobile telephone usage, particularly in Northern Europe.
1G (or 1-G) is short for first-generation wireless telephone technology,
cellphones. These are the analog cellphonestandards. 1G networks use the
radio (analog ) signals.
All ICT equipment, software, systems and services are for official use only.
Use of information from university applications and databases for personal or non-University
purposes is strictly prohibited.
Users are responsible for the security and confidentiality of the data and information which they get
access to.
All Kulliyyahs/Centres/Divisions should manage and record all ICT equipment through the Inventory
System.
Users are liable for any case of loss, damage and theft due to improper use and negligence on all
ICT equipment.
Users are not allowed to access any restricted areas without permission (e.g. LAN rooms and IIUM
Data Centre).
ITD SERVICE DESK
password.
ii. Account will be used for printing, storage and email
services.
Printing
i. Students may use the centralized printing system subject
http://webmail.stud.iiu.edu.my
ICT process
Communication
A chain
network e.g
formal
contact
Communication
A circle network e.g.
between people at
the same level
Communication
A wheel network
e.g. sales teams
report to head
office
Communication
An all-channel
network e.g.
brainstorming
Examples of ICT Use
Mobile telephones
Video and tele-conferencing
Lap-top computers
E-mail
Multi-media communications
ICT Architecture
W h a t m a n a g e rs w a n t
fro m IC T ?
A cce ss a n y in fo rm a tio n
w h e re e ve r
a n d w h e n e ve r n e ce ssa ry
Fa st a lig n m e n t to
ch a n g e s in th e
b u sin e ss
A ccu ra te a n d
co n siste n t
in fo rm a tio n
C o n tro lla b le
Q oS at
m a n a g e a b le
co sts
How does an Architecture
help:
Information Architecture
Application Architecture
Infrastructure Architecture
How does an Architecture
help:
fast alignment to business
changes
Architecture as an interface between business <-
> ICT
Functional changes -> reuse of information and
applications
capacity upscaling -> scaling of applications and
infrastructure (insight in performance of
components)
continuity upscaling -> upscaling applications
and infrastructure (insight in continuity
components)
help:
fast alignment to business
changes
Complements business plan
Short term developments in long term
perspective
Documentation/ understanding business
decisions
Integration of old and new
Co-operation management\application
building\systems dept.
Help with mergers, new services, acquisitions,
etc.
Insight despite limited view non-specialists
Focus on strategic deployment of technology
How does an Architecture
help:
Controllable QoS at manageable costs
Insight in costs per component
pro-active performance management
focus on key technologies
common terminology
help for joiners/stayer
guideline for centralisation versus distribution
ICT Management
Managing Information Communication Technology (ICT) will
enable organisations to get more out of their current
equipment and also to make better decisions around the
purchase of new equipment and ICT developments.
Small organisations with one computer still need to manage
their ICT as it is likely to be used for important tasks, such
as:
writing documents more efficiently
managing accounting and budgeting so that you have better
information about your financial situation
recording contact with clients more accurately and in more
detail
improving communications within the organisation and with
others.
Larger organisation may use ICT to carry out increasingly
complex functions which may include complicated software
solutions and hardware set-up.
organisations recognise the need to manage
their premises, accounting and other office
equipment, it is essential that managing ICT
is recognised as fundamental to the
development of the organisation.
Careful management of ICT will not only help
organisations meet their aims and objectives,
it will also prevent organisations making
possibly expensive mistakes.
Budgeting and finance
32
Security Applications
The security services that can be used:
Digital Signature
Anonymous e-cash
Certified e-mail
Secure elections
Simultaneous contract signing
33
Non-trivial Insights
Technology alone can not fix security
problems – Technology is necessary
but not sufficient
Security is everyone’s business, not just
the business of security experts
Security decisions must be taken by
Management, not by technical staff
Security is risk management – the art to
worry about the right things
34
Cryptography- the Beauty of
Mathematics
Cryptographic algorithms are “building
blocks” to construct secure system
Dramatic advances in cryptography in the
last 30 years:
Public Key Cryptography (1976)
Microprocessor: cheap computing power
Quantum cryptography (future)
35
Secret Key Encryption
Plain text Plain text
encrypt message with decrypt message with
secret key same secret key
cipher text
36
Public Key Encryption
Plain text Plain text
encrypt message with decrypt message with
public (!) key of receiver (!) private key of
receiver
cipher
text
Each participant has
A private key that is shared with no one else,
plus
A public key known to everyone
Problem: slower than Secret Key Encryption
Best-known example: RSA
37
Biometrics: your Body – your
Password?
Recognize a person upon physiological or
behavioral characteristics
Fingerprint
Face
Voice
Iris
Currently costs outweigh benefits
38
The Need for International
Security Standards
Technical standards should be
international:
Ensures interoperability - the whole
point of most of the standards
Economies of scale
Best practice standards would be very
helpful to be international
Raises awareness
Regulatory issues & law enforcement is a
national (or regional, e.g. European
Union) matter
39
Corporate ICT
Security Policy
Corporate ICT Security
Policy
The role of the above policy is to lay down company
procedures, guidelines and practices necessary to keep
the hardware, software and data safe from theft, misuse
and unauthorised access. This ensures there is a central
document of ICT security standards that managers and
ICT personnel can refer to when making decisions about
ICT related matters.
Factors to consider:
Employees need to sign this policy before they can use the
Thank You