Information technology
Information technology
Concepts of data- Data is a collection of facts in raw form that can become information after
proper organization or processing. Data is considered the raw material for information. Data
processing is the transformation of raw data into meaningful information. This is analogous to a
manufacturing process that turns raw materials into finished goods. Data is organized
hierarchically for easy manageability, consisting of levels:
Concepts of information- Information is data that has been organized and processed to have
meaning, relevance, and utility. It is created by interpreting and presenting data in a meaningful
context.
Difference Between Data and Information: Data refers to raw facts, while information is derived
from data through processing. For example, marks scored by students (data) can be processed
into class averages and performance analyses (information).
Characteristics of Information:
● Hardware: The term hardware refers to machinery. This category includes the computer
itself, which is often referred to as the central processing unit (CPU), and all of its
support equipment. Among the support equipment are input and output devices, storage
devices, and communications devices.
● Software: The term software refers to computer programs and the manuals (if any) that
support them. Computer programs are machine-readable instructions that direct the
circuitry within the hardware parts of the Computer Based Information System (CBIS) to
function in ways that produce useful information from data. Programs are generally
stored on some input/output medium a disk or tape.
● Data: Data are facts that are used by program to produce useful information. Like
programs, data are generally stored in machine-readable form on disk or tape until the
computer needs them.
● Procedures: Procedures are the policies that govern the operation of a computer
system. “Procedures are to people what software is to hardware” is a common analogy
that is used to illustrate the role of procedures in a CBIS.
● People: Every Computer Based Information System (CBIS) needs people if it is to be
useful. Often the most overlooked element of the CBIS is the people: probably the
components that most influence the success or failure of information systems.
Automation can help businesses become more efficient and save time, money, and resources.
2. Artificial Intelligence
3. Improved Productivity
Information technology helps businesses increase their productivity by allowing them to access
data quickly and accurately, which can help improve decision-making processes. In addition, it
enables businesses to communicate more effectively with customers and staff, helping ensure
that projects are completed on time and within budget. Improved productivity can lead to
increased profits, as businesses will be able to produce more products or services in less time.
Information technology helps businesses interact with customers in real time, thus providing
them with better customer service. Businesses can also use AI to handle complex customer
queries and provide personalized experiences to customers. This helps build customer loyalty
and improves brand reputation.
5. Cloud Computing
Cloud computing is another way that information technology has revolutionized businesses. By
using cloud-based applications, businesses can store and access data from any device or
location. This can help businesses save resources and time by eliminating the need to install
software on individual devices or maintain server hardware. In addition, it makes collaboration
between employees easier as they can access the same data from anywhere.
6. Remote Working
Information technology enables businesses to provide their employees with the option of
remote working. This can help reduce costs associated with office space and increase
productivity by allowing employees to work from anywhere in the world. In addition, it helps
businesses become more flexible as they can hire employees without having to worry about
geographical boundaries. it equips employees with the ability to get the work done even if they
are not physically present at the workplace.
7. CyberSecurity
The use of information technology has created a need for businesses to secure their networks
from cyber threats. Businesses are now investing more in cyber security solutions such as
firewalls and antivirus software to protect their data from hackers and malware. In addition,
businesses are also taking steps to educate their employees on the importance of cyber
security and how to stay safe online. This is crucial as cyber-attacks can have a devastating
effect on businesses, resulting in financial losses and damage to their reputation.
Therefore, it is essential for businesses to invest in cybersecurity solutions to ensure the safety
of their data.
8. Management of Resources
Information technology has enabled businesses to better manage their resources. This includes
the ability to monitor and track employee performance, inventory levels, customer data, and
financial information in real time. Businesses can also use software applications such as
enterprise resource planning (ERP) systems to manage their operations more efficiently. ERP
systems enable businesses to manage their resources in a more cost-effective way. Information
technology is at the core of such software. The implementation of ERP is progressing at a rapid
rate with more and more businesses implementing this efficient technology to make certain
business processes hassle-free.
Business data processing- Business data processing is used to convert business data into
useful information. A large volume of data can be stored in the database which can be further
analyzed using various application tools such as data mining. For example, banks contain the
complete information of bank accounts, loans, fixed deposits, recurring deposit of all customer
and from time to time give information to the customer. Similarly using spreadsheets various
operations including graphical view can be used to analyze the data.
Finance and Accounting: IT is used to analyze investments and perform audits, determine the
best sources of funds, manage cash and other financial resources
Sales and Marketing: It is used to determine the best location for production and distribution
facilities. Operational data has been analyzed to determine the best advertising and sales
approach.
Intra-Organizational Communication:
• Video Conferencing:
With the rise of remote work and global teams, video conferencing tools like Zoom or Microsoft
Teams enable face-to-face communication, fostering a sense of connection among
geographically dispersed teams.
• Collaboration Platforms:
• Company Intranet:
• Workflow Automation:
Inter-Organizational Communication:
EDI systems facilitate the electronic exchange of business documents (such as invoices and
purchase orders) between different organizations. This streamlines supply chain processes and
reduces manual data entry.
• Extranets:
• Supplier Portals:
Organizations often use network technology to establish portals that connect them with
suppliers. These portals enable efficient communication regarding orders, inventory levels, and
other supply chain-related information.
Web Conferencing:
• Interconnected Systems:
Interconnected IT systems between organizations allow for seamless data exchange. This is
common in industries like finance, where banks need to communicate securely with each other
for transactions and information sharing.
Limitations of KPO
Management Information System (MIS) is one of the five major Computer Based Information
Systems (CBIS). Its purpose is to meet the general information needs of the managers in firm or
organization. MIS is a computer-based system that makes information available to users with
similar needs. Management Information System (MIS) consists of following three pillars:
Management, Information, and System. These are explained as following below.
1. Management: art of getting things done through and with the people of in formally
organized groups. Managerial functions:
(i) Planning
(ii) Organizing
(iii) Staffing
(iv) Directing
(v) Controlling
2.Information: data that have a meaning with a context ,where data is raw facts about an
entity (entity is the object of interest).
3.System: set of inter-related components with a clearly defined boundary working
together to achieve a common goal.
A management information system (MIS) uses computer-based tools and software to collect
and store data about a company and distribute it to its management team. It is an information
system (IS) whose main goal is to give managers and other stakeholders the information they
require to make informed decisions.
The MIS can act as a database that houses all the company's financial information and
organizes it in such a way that it can be accessed to generate reports on operations at different
levels of the company.
An analysis of MIS data could reveal how to utilize internal and external information better. It
might help a business better implement a new social media strategy or better organize
employee benefits. Alternatively, it might highlight that a company's use of IT is outdated or
poorly applied.
Decision Support System (DSS) is a real-time decision-making tool where data, models, and
software are used in partnership with individuals to generate efficient solutions. It combines
numerous data inputs and offers methodological approaches to evaluation, modelling and
display of the information to facilitate decision-making in case of the system’s challenging
issues. DSS facilitates semi-structured and unstructured decision-making and can improve the
quality, speed and efficiency of the decisions since new information. Prognoses that would be
hard to produce manually are available. DSS implementation varies at the managerial
levels—operational, tactical, and strategic—based on the nature of decisions at each level.
Here's how DSS supports decision-making at each level:
1. Operational Level
2. Tactical Level
3. Strategic Level
(a)data organisation: Data are the principal resources of an organization. Data stored in
computer systems form a hierarchy extending from a single bit to a database, the major
record-keeping entity of a firm. Each higher rung of this hierarchy is organized from the
components below it.
1. Bits (characters)
2. Fields
3. Records
4. Files
5. Databases
Bit (Character) - a bit is the smallest unit of data representation (value of a bit may be a 0 or 1).
Eight bits make a byte which can represent a character or a special symbol in a character code.
Field - a field consists of a grouping of characters. A data field represents an attribute (a
characteristic or quality) of some entity (object, person, place, or event).
Record - a record represents a collection of attributes that describe a real-world entity. A record
consists of fields, with each field describing an attribute of the entity.
File - a group of related records. Files are frequently classified by the application for which they
are primarily used (employee file). A primary key in a file is the field (or fields) whose value
identifies a record among others in a data file.
There are several ways in which a computer, under the influences of an operating
system is designed to process data.
Online processing:
Real-time processing:
● The computer processes the incoming data as soon as it occurs, updates the
transaction file, and gives an immediate response that would affect the events as they
happen.
● This is different from online in that for the latter an immediate response may not be
required.
● The main purpose of real-time processing is to provide accurate, up-to-date information
hence better services based on a true (real) situation.
● An example of real-time processing is making a reservation for airline seats. A customer
may request airline booking information through a remote terminal and the requested
information will be given out within no time by the reservation system. If a booking is
made, the system immediately updates the reservation file to avoid double booking and
sends the response back to the customer immediately.
Batch processing
● Data is accumulated as a group (batch) over a specified period of time e.g. daily,
weekly or monthly. The batch is then processed at once.
● For example in payroll processing system, employees details concerning the
number of hours worked, rate of pay, and other details are collected for a period
of time say, one month. These details are then used to process the payment for
the duration worked. Most printing systems use the batch processing to print
documents.
Centralized processing:
Centralized processing refers to a data processing architecture in which all the data is
collected and processed in a single centralized storage area by a single computer. This
architecture is well-suited for small organizations with one location of service and
requires minimal resources.
Serial data processing is the process of sequentially transmitting data along a pathway. It can
refer to the processing of data in a computer system or in an instrument. such as in the
auditory system where information is processed step by step from the external ear to
higher cortical levels.
File organizations:Data files are organized so as to facilitate access to records and to ensure
their efficient storage. A tradeoff between these two requirements generally exists: if rapid
access is required, more storage is required to make it possible.
Sequential file organization is the simplest type of file organization, where files are stored one
after the other, rather than storing different files in rows and columns (in a tabular form), storing
data in rows. In sequential organization records are physically stored in a specified order
according to a key field in each record.
1. Requires that all new transactions be sorted into the proper sequence for
sequential access processing.
Indexed-Sequential Organization
In the indexed-sequential files method, records are physically stored in sequential order on a
magnetic disk or other direct access storage device based on the key field of each record. Each
file contains an index that references one or more key fields of each data record to its storage
location address.
Benefits
Direct Organization
Direct file organization provides the fastest direct access to records. When using direct access
methods, records do not have to be arranged in any particular sequence on storage media.
Characteristics of the direct access method include:
1. Computers must keep track of the storage location of each record using a variety
of direct organization methods so that data can be retrieved when needed.
For example, the first record in a file has a relative record number of 1, the tenth record has a
relative record number of 10, and so forth. The records can have fixed length or variable length.
The record transmission modes for relative files are sequential, random, or dynamic. When
relative files are read or written sequentially, the sequence is that of the relative record number.
In DBMS data
independence exists,
mainly of two types:
There is no data
Data Independence 1) Logical Data
independence.
Independence .
2)Physical Data
Independence.
definition-A DBMS is a system that allows users to create, modify, and query databases while
ensuring data integrity, security, and efficient data access. Unlike traditional file systems, DBMS
minimizes data redundancy, prevents inconsistencies, and simplifies data management with
features like concurrent access and backup mechanisms. It organizes data into tables, views,
schemas, and reports, providing a structured approach to data management.
Importance-
When the business grows, it is essential to manage the volume of the data. A DBMS is
developed to scale efficiently. Well, it accommodated the increasing number of data and users
without compromising performance. It helps with vertical scaling and horizontal scaling.
5.Data Independence
One of the essential benefits of DBMS is data independence. It means that you can alter the
database structure without affecting the application programs. You can achieve this by strongly
separating the physical data storage from the database schema.
A DBMS systemizers many tasks in data management, such as data storage management,
query optimization, and indexing. These are the processes that help enhance the efficiency of
data operations. Also, expressively speeds up the data processing and retrieval.
The DBMS improves resource usage and minimizes the time required to implement complex
queries and reporting. This increased efficacy supports your businesses quickly to market
modifications.
Entity
An entity is a "thing" or "object" in the real world. An entity contains attributes, which describe
that entity. So anything about which we store information is called an entity. Entities are
recorded in the database and must be distinguishable, i.e., easily recognized from the group.
For example: A student, An employee, or bank a/c, etc. all are entities.
Attribute
Attributes are properties or characteristics of an entity. Attributes are used to describe the
entity. The attribute is nothing but a piece of data that gives more information about the entity.
Attributes are used to distinguish one entity from the other entity. Attributes help to categorize
the entity and the entity can be easily retrieved and manipulate the entity. Attributes can help the
database to be more structural and hierarchical. An entity with no attribute is of no use in the
database
Keys
We require keys in a DBMS to ensure that data is organized, accurate, and easily accessible.
Keys help to uniquely identify records in a table, which prevents duplication and ensures data
integrity.
Keys also establish relationships between different tables, allowing for efficient querying and
management of data. Without keys, it would be difficult to retrieve or update specific records,
and the database could become inconsistent or unreliable.
Primary key:The primary key refers to a column or a set of columns of a table that helps us
identify all the records uniquely present in that table. A table can consist of just one primary key.
Also, this primary key cannot consist of the same values reappearing/repeating for any of its
rows. All the values of a primary key have to be different, and there should be no repetitions.
The PK (PRIMARY KEY) constraint that we put on a column/set of columns won’t allow these to
have a null value or a duplicate. Any table can consist of only a single primary key constraint. A
foreign key (explained below) that refers to it can never change the values present in the primary
key.
Candidate Key: The candidate keys refer to those attributes that identify rows uniquely in a
table. In a table, we select the primary key from a candidate key. Thus, a candidate key has
similar properties as that of the primary keys that we have explained above. In a table, there can
be multiple candidate keys.
Foreign Key: We use a foreign key to establish relationships between two available tables. The
foreign key would require every value present in a column/set of columns to match the
referential table’s primary key. A foreign key helps us to maintain data as well as referential
integrity.
Referential integrity
Referential integrity refers to the relationship between tables. Because each table in a database
must have a primary key, this primary key can appear in other tables because of its relationship
to data within those tables. When a primary key from one table appears in another table, it is
called a foreign key. Referential integrity in a database management system (DBMS) ensures
that the relationships between tables are accurate and consistent. It prevents users from
accidentally breaking the mapping between related columns.
Table
A table is a collection of related data in an organized manner in the form of rows and columns.
It is an organized arrangement of data and information in tabular form containing rows and
columns, making it easier to understand and compare data.
Views
Views in SQL are considered as a virtual table. A view also contains rows and columns. To
create the view, we can select the fields from one or more tables present in the database. A view
can either have specific rows based on certain condition or all the rows of a table.
Data dictionary:
The data dictionary consists of two words, data, which represents data collected from several
sources, and dictionary, which represents where this data is available. The data dictionary is an
important part of the relational database because it provides additional information about the
relationship between several tables in the database. A data dictionary in a DBMS helps users
manage data in an orderly and orderly manner, thereby preventing data redundancy.
Types of database:
1. Hierarchical Databases
Hierarchical databases organize data in a tree-like structure where data is arranged in levels or
ranks. Higher-level data serves as a common link for lower-level data, similar to a hierarchy. For
example, in a university, “University” is at the top level, while “Departments” and
“Administration” are at lower levels, even though they are distinct entities.
This structure can also be viewed as a parent-child relationship, where each parent record can
have multiple child records, but a child record can only have one parent. As more data is added,
the structure expands like a tree. However, hierarchical databases have limitations, such as
being less flexible and harder to scale. Adding new data or elements often requires traversing
the hierarchy, which can be time-consuming.
2. Network Databases
A network database builds on the hierarchical model but allows child records to link to multiple
parent records, creating a web-like structure of interconnected data. For example, in a
university database, “Students,” “Faculty,” and “Resources” can be linked to both “Departments”
and “Clubs,” forming a flexible, two-directional relationship.
3.Relational Databases
Considered the most mature of all databases, these databases lead in the production line along
with their management systems. In this database, every piece of information has a relationship
with every other piece of information. This is on account of every data value in the database
having a unique identity in the form of a record.
Note that all data is tabulated in this model. Therefore, every row of data in the database is
linked with another row using a primary key. Similarly, every table is linked with another table
using a foreign key. Refer to the diagram below and notice how the concept of ‘Keys‘ is used to
link two tables.
In Relational databases, scaling and traversing through data is quite a lightweight task in
comparison to Hierarchical Databases.
Data warehouse:
A data warehouse is a centralized system used for storing and managing large volumes
of data from various sources. It is designed to help businesses analyze historical data
and make informed decisions. Data from different operational systems is collected,
cleaned, and stored in a structured way, enabling efficient querying and reporting.
2.Ensures Data Quality and Consistency-Data quality and consistency are very
important in data management. Data warehouses implement processes for data
cleansing and transformation, which help in eliminating duplicate or inconsistent data.
This ensures that the data stored in the warehouse is accurate and reliable. With high
data quality standards in place, organizations can have confidence in the insights
derived from their data warehouse.
3.Saves Time and Money-Data warehouse can is cost-effective in terms of time and
money. They enable organizations to process and analyze large volumes of data
efficiently. When data handling is streamlined and optimized, it reduces the need for
manual data preparation and management, allowing employees to focus on more
value-added tasks.
Additional Reporting
Additional work is required for using data warehouses because data stored in a
warehouse is structured, meaning that to create reports, we must design and maintain
predefined queries and data models. This is time-consuming and delays in generating
essential reports.
Ownership Concerns
Data warehousing systems often involve multiple departments and teams. This can
lead to ownership issues. Determining who is responsible for various aspects of the
data warehouse, including data governance and quality, can become a complex task.
Lack of clear ownership can result in inefficiencies and data management problems.
Data warehouses are not immune to hidden problems. Issues related to data quality,
transformation errors, and data integration challenges can emerge, and uncovering
these problems can consume valuable time and resources. Such hidden issues can also
lead to inaccurate reports and analyses, affecting decision-making.
1. Ensure consistency. Data warehouses are programmed to apply a uniform format
to all collected data, which makes it easier for corporate decision-makers to
analyze and share data insights with their colleagues around the globe.
Standardizing data from different sources also reduces the risk of error in
interpretation and improves overall accuracy.
2. Make better business decisions. Successful business leaders develop
data-driven strategies and rarely make decisions without consulting the facts.
Data warehousing improves the speed and efficiency of accessing different data
sets and makes it easier for corporate decision-makers to derive insights that will
guide the business and marketing strategies that set them apart from their
competitors.
3. Improve their bottom line. Data warehouse platforms allow business leaders to
quickly access their organization's historical activities and evaluate initiatives
that have been successful — or unsuccessful — in the past. This allows
executives to see where they can adjust their strategy to decrease costs,
maximize efficiency and increase sales to improve their bottom line.
Data mining:
Data mining is the process of extracting knowledge or insights from large amounts of data
using various statistical and computational techniques. The data can be structured,
semi-structured or unstructured, and can be stored in various forms such as databases, data
warehouses, and data lakes. The primary goal of data mining is to discover hidden patterns and
relationships in the data that can be used to make informed decisions or predictions. This
involves exploring the data using various techniques such as clustering, classification,
regression analysis, association rule mining, and anomaly detection. Data mining has a wide
range of applications across various industries, including marketing, finance, healthcare, and
telecommunications. For example, in marketing, data mining can be used to identify customer
segments and target marketing campaigns, while in healthcare, it can be used to identify risk
factors for diseases and develop personalized treatment plans. However, data mining also
raises ethical and privacy concerns, particularly when it involves personal or sensitive data. It’s
important to ensure that data mining is conducted ethically and with appropriate safeguards in
place to protect the privacy of individuals and prevent misuse of their data.
● It is complex
● Results and benefits are not guaranteed
● It can be expensive
Customer service
Data mining can help businesses understand their customers' needs and
preferences. This can help them improve customer service and increase customer
loyalty.
Revenue
Data mining can help businesses find new sources of revenue and improve their
marketing investments.
Fraud detection
Data mining can help businesses identify patterns that indicate fraud and prevent
fraud attempts.
Risk assessment
Data mining can help businesses assess risks and manage regulatory compliance
obligations.
Demand forecasting
Data mining can help businesses understand demand and predict how changes in
products, pricing, or promotion will affect sales.
Product development
Data mining can help businesses analyze the effectiveness of product changes and
identify causes of success or failure.
Supply chain management
Data mining can help businesses align supply plans with demand forecasts and
anticipate maintenance.
Big data analysis- Big Data Analytics uses advanced analytical methods that can
extract important business insights from bulk datasets. Within these datasets lies both
structured (organized) and unstructured (unorganized) data. Its applications cover
different industries such as healthcare, education, insurance, AI, retail, and
manufacturing. Big Data Analytics is all about crunching massive amounts of
information to uncover hidden trends, patterns, and relationships. Here's a breakdown
of what it involves:
● Collecting Data: Such data is coming from various sources such as social media,
web traffic, sensors and customer reviews.
● Cleaning the Data: Imagine having to assess a pile of rocks that included some gold
pieces in it. You would have to clean the dirt and the debris first. When data is being
cleaned, mistakes must be fixed, duplicates must be removed and the data must be
formatted properly.
● Analyzing the Data: It is here that the wizardry takes place. Data analysts employ
powerful tools and techniques to discover patterns and trends. It is the same thing
as looking for a specific pattern in all those rocks that you sorted through.
IPv6- An Internet Protocol version 6 address (IPv6 address) is a numeric label that is
used to identify and locate a network interface of a computer or a network node
participating in a computer network using IPv6. IP addresses are included in the packet
header to indicate the source and the destination of each packet.
URL- A URL or Uniform Resource Locator is a Unique identifier that is contained by all
the resources available on the internet. It can help to locate a particular resource due to
its uniqueness. It is also known as the web address. A URL consists of different parts
like protocol, domain name, etc. The users can access the URLs by simply typing them
inside the address bar or by clicking any button or link web page.
Domain name system-Domain Name System (DNS) is a system that translates
human-readable domain names, like www.google.com, into machine-readable IP
addresses, such as 142.250.190.14, enabling computers to locate and communicate
with each other on the internet. It operates as a distributed database, working through a
hierarchical structure of servers.
When a user requests a domain, the query passes through multiple levels—starting with
the Root server, then the Top-Level Domain (TLD) server and finally the authoritative
server that holds the specific IP address for the domain. This seamless process
ensures users can access websites using easy-to-remember names instead of
numerical IP addresses.
Internet protocols:
FTP-FTP (File Transfer Protocol) is a standard network protocol used for the transfer of
files from one host to another over a TCP-based network, such as the Internet. FTP
works by opening two connections that link the computers trying to communicate with
each other.
Characteristics:
HTML:
HTML stands for HyperText Markup Language. It is the standard language used to
create and structure content on the web. It tells the web browser how to display text,
links, images, and other forms of multimedia on a webpage. HTML sets up the basic
structure of a website, and then CSS and JavaScript add style and interactivity to make
it look and function better.
DHTML:
DHTML also allows for the creation of complex visual effects and elements. Examples
include dropdown menus that appear when users hover over a navigation link,
slideshows that display images and captions in a loop, and interactive games or quizzes
that respond to user input.
With DHTML, designers and developers can create web applications that behave more
like desktop applications, providing users with a more intuitive, seamless experience.
XML:
XML (Extensible Markup Language) is a markup language similar to HTML, but without
predefined tags to use. Instead, you define your own tags designed specifically for your
needs. This is a powerful way to store data in a format that can be stored, searched, and
shared. Most importantly, since the fundamental format of XML is standardized, if you
share or transmit XML across systems or platforms, either locally or over the internet,
the recipient can still parse the data due to the standardized XML syntax.
Ethical hacking
Ethical hacking is the practice of using the same techniques as malicious hackers to test a
system for vulnerabilities and fix them, with the owner's permission. Ethical hackers are security
professionals, also known as white hat hackers, who use their skills to help organizations
improve their security posture.
Ethical hacking involves:
● Gaining access: Using the same techniques as malicious hackers to gain access to a
system or network
● Identifying vulnerabilities: Finding potential weaknesses that could be exploited by
malicious hackers
● Fixing vulnerabilities: Addressing and resolving any identified vulnerabilities before they
can be exploited
● Reporting: Reporting all weaknesses found to the organization and its vendors.
Cloud computing:
Cloud computing simply refers to the delivery of computing services over the internet, including
storage, databases, software, and analytics. Services
Cloud computing provides services such as storage, servers, databases, networking, software,
analytics, and intelligence.
On-demand-Cloud computing provides resources on-demand, so users only pay for what
they use.
Pay-as-you-go-Cloud computing offers a pay-as-you-go model, so users don't need to
buy, own, or maintain physical servers and data centers.
Device and location independence-Users can access cloud services from any device or
location using a web browser.
Some benefits of cloud computing include:
1. Scalability
3. Cost savings
Whatever cloud service model you choose, you only pay for the resources you actually
use. This helps you avoid overbuilding and overprovisioning your data center and gives
your IT teams back valuable time to focus on more strategic work.
4. Advanced security
Despite popular perceptions, cloud computing can actually strengthen your security
posture because of the depth and breadth of security features, automatic maintenance,
and centralized management.
Reputable cloud providers also hire top security experts and employ the most advanced
solutions, providing more robust protection.
Cloud providers offer backup and disaster recovery features. Storing data in the cloud
rather than locally can help prevent data loss in the event of an emergency, such as
hardware malfunction, malicious threats, or even simple user error.
Mobile Computing
Internet of things
Improved efficiency
IoT can help businesses create efficiencies in manufacturing by monitoring
machines and products in real time.
Better safety
IoT can help improve incident management and emergency response coordination
by monitoring infrastructure for safety risks.
Cost savings
IoT can help businesses save money by reducing time and paper, and improving
productivity.
Ethical issues in social networking: With the rise of Online Social Networking, the
ethical dilemmas are growing in number including violation of
privacy,misrepresentation, bullying and creepiness. When the consumersare getting
the facility of relatively unrestricted social communications they are becoming more
vulnerable to deception and scams too at the same time which has become the reason
of attention for Social Networking Ethics. Few ethical dilemmas faced when different
people use social networks are given below:
Privacy
Social media platforms have access to an enormous amount of personal data, and
there are concerns about how this data is collected, stored, and used. Users often need
to understand the risks of sharing sensitive information fully. Privacy is a significant
concern regarding social media, as these platforms often require users to share
personal information to create a profile and engage with others.
Cyber bullying
Social media platforms have become a breeding ground for cyberbullyingvi, which can
have devastating consequences for victims. It can also lead to social exclusion and
mental health issues. Cyberbullying is a form of bullying that occurs through electronic
means, such as social media platforms, messaging apps, and online forums. It is a
serious issue that can significantly impact the mental health and well-being of those
who experience it
Fake News
Social media platforms have made it easy for fake news to spread rapidly, which can be
dangerous and have serious consequences. Misinformation and propaganda can
influence people's decisions and beliefs. Fake news refers to false or misleading
information presented as factual news. Social media platforms are often used to spread
fake news due to their massive reach and easy accessibility.
Content Moderation
Social media platforms face the difficult task of moderating content, and there are
concerns about censorship, freedom of speech, and bias. Content moderation is
important for maintaining a safe and respectful environment on social media platforms.
It can help prevent harmful or offensive content from being shared with a large
audience, protect users from harassment and discrimination, and prevent the spread of
misinformation or false information.
Discrimination
Social media platforms can be used to harass and intimidate individuals, which can lead
to significant emotional distress and even physical harm. Online harassment can take
many forms, such as threats, stalking, doxxing (publishing someone's private
information online), spreading rumors or lies, and making derogatory or offensive
comments. It can target individuals or groups based on race, gender, sexual orientation,
religion, or other characteristics
E- security:
"E-security," short for "electronic security," refers to the practice of protecting electronic
systems, networks, and data from unauthorized access, use, disruption, or modification,
primarily focusing on online transactions and activities conducted through the internet,
encompassing aspects like data privacy, authentication, integrity, and availability to
ensure secure online interactions and commerce.
Scope of e-security:
Data protection:
Safeguarding sensitive user information like personal details, financial data, and
login credentials from unauthorized access or breaches.
Authentication:
Verifying the identity of users and systems involved in online transactions to prevent
fraudulent activity.
Encryption:
Using cryptographic algorithms to scramble data, making it unreadable to
unauthorized parties during transmission.
Access control:
Implementing mechanisms to restrict access to sensitive systems and data based
on user roles and permissions.
Network security:
Protecting the network infrastructure from malicious attacks like hacking, malware,
and denial-of-service attacks.
Website security:
Implementing measures to secure websites including secure sockets layer (SSL)
certificates for encrypted communication and protection against vulnerabilities like
cross-site scripting (XSS).
Payment security:
Ensuring secure processing of online payments through PCI DSS compliance and
other payment gateway security protocols.
Email security:
Protecting email communication from phishing scams, spam, and malware.
Need of e-security:
1. Privacy
Privacy includes preventing any activity that will lead to the sharing of customers’ data
with unauthorized third parties. Apart from the online seller that a customer has chosen,
no one else should access their personal information and account details.
2. Integrity
Integrity is another crucial concept of eCommerce Security. It means ensuring that any
information that customers have shared online remains unaltered. The principle states
that the online business is utilizing the customers’ information as given, without
changing anything. Altering any part of the data causes the buyer to lose confidence in
the security and integrity of the online enterprise.
3. Authentication
The principle of authentication in eCommerce security requires that both the seller and
the buyer should be real. They should be who they say they are. The business should
prove that it is real, deals with genuine items or services, and delivers what it promises.
The clients should also give their proof of identity to make the seller feel secure about
the online transactions. It is possible to ensure authentication and identification. If you
are unable to do so, hiring an expert will help a lot. Among the standard solutions
include client login information and credit card PINs.
4. Non-repudiation
Dimensions of e- security:
1. Integrity: Integrity can ensure that information on the internet has not been altered in
any way by an unauthorized party. It maintains the consistency, accuracy, and
trustworthiness of the information over its entire life cycle.
2. Non-repudiation
Good business depends on both buyers and sellers. They must not deny any facts or
rules once they accept that there should not be any repudiation. Non-repudiation
ensures that the sender of a message cannot deny having sent the message and that
the receiver cannot deny having received the message. In other words, it is an
assurance that anyone cannot deny the validity of a transaction.
3. Authenticity
In ecommerce, since both the customer and seller need to trust each other, they must
remain who they are in real life. Both the seller and buyer must provide proof of their
original identity so that the ecommerce transaction can happen securely between them.
4. Confidentiality
Confidentiality refers to protecting information from being accessed by an unauthorized
person on the internet. In other words, only the people who are authorized can gain
access to view or modify or use the sensitive data of any customer or merchant.
5. Privacy
Where confidentiality is a concern about the information present during communication,
privacy concerns personal details. In general, privacy is used to control the usage of
information by the customers that they have given to the merchant.
6. Availability
Continuous data availability is the key to providing a better customer experience in
ecommerce. It increases online visibility, search engine rankings, and site traffic.
Security threats posed by malicious code include various types of harmful software.
Here is a breakdown of the key threats:
1. Virus:
○ A virus is a program or piece of code designed to attach itself to a host
program or file.
○ It spreads when the infected host is accessed or executed.
○ Viruses can corrupt, delete files, or even cause system failures.
2. Trojan Horse:
○ A Trojan horse disguises itself as legitimate software to deceive users into
installing it.
○ Once installed, it can enable unauthorized access to the user's system,
stealing or damaging data.
3. Worm:
○ Worms are self-replicating programs that spread across networks without
needing a host program.
○ They consume network bandwidth and may carry a payload causing
system disruptions.
4. Spyware:
○ Spyware secretly gathers user information, such as login credentials or
sensitive data, and sends it to unauthorized entities.
○ It can track internet activities or monitor keystrokes, leading to privacy
violations.
5. Ransomware:
○ This type of malware encrypts the victim's files or locks the system,
demanding a ransom payment for the decryption key.
○ It can cause significant disruptions to personal or business operations.
These malicious codes exploit vulnerabilities in systems, emphasizing the need for
robust security measures such as antivirus software, firewalls, and regular system
updates.
Sniffing:
In cybersecurity, "sniffing" refers to the act of passively capturing network traffic
data, allowing an attacker to see unencrypted information like passwords or
sensitive data that is being transmitted across a network without the user's
knowledge.
Phishing:
Phishing is a cybercrime where attackers send fraudulent emails or messages
that appear to be from a legitimate source, aiming to trick the recipient into
revealing sensitive personal information like passwords or credit card details by
clicking on malicious links or providing information on fake websites.
Spamming:
Spamming refers to the act of sending unsolicited bulk messages, usually in the
form of emails, text messages, or online posts, often for commercial purposes,
to a large number of recipients without their consent.
A denial of service (DoS) attack is a cyber threat that prevents legitimate users from
accessing devices, information systems, or other network resources. The goal of a DoS
attack is to overload a network or website, making it inaccessible or degrading its
performance.
Data encryption and decryption are core technology solutions used to protect confidentiality by
transforming sensitive information into an unreadable format, accessible only to authorized
parties with the correct decryption key, effectively safeguarding data from unauthorized access
even if intercepted during transmission or storage; essentially, it allows for secure
communication and data protection by scrambling data with a mathematical algorithm, making
it unintelligible without the proper key to decode it.
In encryption techniques, there are two types, namely symmetric key encryption and
asymmetric key encryption.
Symmetric encryption
Also known as "private key" encryption, this method uses the same key to encrypt
and decrypt data. Symmetric encryption is faster and more efficient than
asymmetric encryption, but it's also more vulnerable to threats. If the key is
compromised, the data can be easily decrypted. The length of the key is 128 or
256 bits. It is used when a large amount of data needs to be transferred.
Asymmetric encryption
Also known as "public key" encryption, this method uses a mathematically related pair
of keys for encryption and decryption. The public key encrypts data and can be freely
distributed, while the private key must be kept secret. Asymmetric encryption enhances
data protection through the use of both a public and a private key. The encryption
process is slow. it provides confidentiality, authenticity, and non-repudiation. It is
comparatively less efficient as it can handle a small amount of data.
DMZ (De Militarized Zone): Demilitarized Zones (DMZ) are used in cybersecurity. DMZs
separate internal networks from the internet and are often found on corporate networks. A DMZ
is typically created on a company’s internal network to isolate the company from external
threats. The DMZ is a network barrier between the trusted and untrusted networks in a
company’s private and public networks. The DMZ acts as a protection layer through which
outside users cannot access the company’s data. The goal of DMZ is to provide access to the
untrusted network by ensuring the security of the private network. DMZ is not mandatory, but a
better approach is to use it with a firewall.
SSL and HTTPs: SSL and HTTPS are both related to the security of data transferred over
the internet:
SSL
Stands for Secure Sockets Layer, and is a technology that encrypts data sent between a browser
and a website or between two servers. SSL certificates, also known as digital certificates,
establish an encrypted connection between a user's computer and a website or server.
HTTPS
Stands for Hypertext Transfer Protocol Secure, and indicates that a website has an
SSL/TLS certificate installed and that the connection between a web browser and the
website is encrypted and secure. The "S" in HTTPS indicates that the communication is
secure.
SSL and TLS are both protocols that allow computer systems to communicate safely over the
internet. TLS is the successor to SSL, and is used by HTTPS. However, all versions of SSL are
now considered insecure for modern use, and "SSL" is often used generically to refer to
TLS/HTTPS.
HTTPS is important for sites that send sensitive information, such as credit card information or
billing addresses.
● SEO Optimization:
Identifying on-page and off-page SEO issues to improve search engine ranking
by analyzing keyword usage, meta descriptions, backlink profiles, and website
structure.
● Content Quality:
Assessing the relevance, accuracy, and effectiveness of website content,
including identifying outdated information, duplicate content, and opportunities
to improve readability and engagement.
● Technical Issues:
Detecting technical errors like broken links, slow loading times, mobile
compatibility problems, and security vulnerabilities that could negatively impact
user experience.
● User Experience Analysis:
Evaluating website navigation, design, and layout to ensure ease of use and
intuitive user flow.