Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

System Overview of Cyber-Technology in a Digitally Connected Global Society
System Overview of Cyber-Technology in a Digitally Connected Global Society
System Overview of Cyber-Technology in a Digitally Connected Global Society
Ebook326 pages3 hours

System Overview of Cyber-Technology in a Digitally Connected Global Society

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The author acknowledges the links between education, technology, network operating systems, data, and information transmission and communications, cybertechnology, culture of education, instruction, and learning. In essence, recognizing the correlation among the education and the world of codified technology, this book will assist in providing a deeper understanding and greater improvement of instructional methods and strategies. In addition, this book will provide a correlation between education and technology as a promising and systematic approach for moving away from or conventional methods of classroom instruction and learning endeavors.

The readers, in essence, will see the integration of education and cybertechnology as a pinnacle of educational reform for current and future generations. Furthermore, the contents of this book also help expound the benefits and the broad range of possibilities that technology can offer in education, instruction, and the learning process. The proliferation of the uncertain telegraph and mechanized printing machines changed the quality of human writing. We can also expect the use of a well-synthesized educational technology textbook for instruction and learning to lead to the same startling changes in human society.

It is the authors view that the anticipated changes should not assume any deficiency on the part of the professors, instructors, and allied educators. Rather, it should ascertain that educators need to be proficient in the use of technology to manage and deliver instruction in different subject areas, such as computer information technology, network technology, wired and wireless technology, and cyber security threats. The author firmly believes that current and future learners are essentially the conglomeration of unfurnished learner materials that are ready and willing to be furnished by the educational system.
LanguageEnglish
PublisherAuthorHouse
Release dateJan 16, 2017
ISBN9781524657079
System Overview of Cyber-Technology in a Digitally Connected Global Society
Author

Joseph O. Esin

Joseph O. Esin is a professor of computer information systems/cybersecurity, a fellow at the Washington Center for Cybersecurity Research and Development, and a fellow at the Botanical Research Institute of Texas. He earned a Bachelor of Science in biology from Saint Louis University, Saint Louis, Missouri; a Master of Arts in theology from the Society of Jesus College of Divinity, Saint Louis, Missouri; and a doctorate in computer education and information systems from the United States International University, San Diego, California. He is also the author of seven books including System Overview of a Cyber-Technology in a Digitally Connected Global Society, and Landscape of Cybersecurity Threats and Forensic Inquiry.

Read more from Joseph O. Esin

Related to System Overview of Cyber-Technology in a Digitally Connected Global Society

Related ebooks

Computers For You

View More

Related articles

Reviews for System Overview of Cyber-Technology in a Digitally Connected Global Society

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    System Overview of Cyber-Technology in a Digitally Connected Global Society - Joseph O. Esin

    2017 Joseph O. Esin. All rights reserved.

    No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.

    Published by AuthorHouse 01/17/2017

    ISBN: 978-1-5246-5706-2 (sc)

    ISBN: 978-1-5246-5707-9 (e)

    Any people depicted in stock imagery provided by Thinkstock are models,

    and such images are being used for illustrative purposes only.

    Certain stock imagery © Thinkstock.

    Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.

    43644.png

    Contents

    Acknowledgments

    Introduction

    Industry Expert Reviewers

    Part 1 Understanding the Terminology of Computer Technology and Why a Foundation of Knowledge is the Key to Unlocking Cyber-Technology

    Chapter 1 Computer Information Technology (CIT) Terminology

    Chapter 2 Information Communication Technology (ICT)

    Emergence of Computer Information Technology

    Computer Hardware Generations

    The Computer

    Ergonomics

    Information

    Technology

    Mobile Devices

    Personal Computers

    Mainframe Computers

    Supercomputers

    Information System (IS)

    Input

    Processing

    Output

    Feedback

    Software

    System Software

    Chapter 3 Computer Operating System Programs

    Stand-Alone Operating Systems

    Microsoft Windows 2007

    Macintosh Operating System X (Mac OS X)

    UNIX Operating System

    Linux Operating System

    Google System

    Plug and Play

    Memory Management

    Processor Management

    Device Management

    File Management

    Network Management

    User Interface

    Network System

    Chapter 4 Components of Computer Technology

    Central Processing Unit

    Memory

    Storage

    Design and Implementation of Networking

    Telecommunications

    Telecommunication Networks

    Chapter 5 Digital Technology Communications

    Implementation of Local Area Networking

    Networking Operation Management

    Part 2 The Major Trends of Emerging Technology and How to Put Them to Effective Use for Educational Institutions and Organizations

    Chapter 6 Network Layer Technology

    TCP and SPX (Transport Layer)

    Networking Hardware

    Network File Servers

    Workstations

    Laptop Computer

    Network Interface Cards

    Ethernet Cards

    Wireless Adapters

    Repeaters

    Network Cabling

    Chapter 7 Traditional Networking Standard: OSI Model

    OSI Protocol Layers

    Introduction to TCP/IP

    Local Area Network (LAN) Structures for SMLs

    Ethernet (Physical and Data Link Layers)

    Chapter 8 Networking Device Technology

    Principles of Networking

    Networking Topologies

    Types of Physical Topologies

    Considerations for Deciding on a Topology Type

    Hierarchical Topology

    Mesh Topology

    Hybrid Topology

    Hierarchical Design Model

    Chapter 9 Internet Communication Technology

    Protocols

    Transport Protocol

    Wide Area Networks (WANs)

    Worldwide Communication Systems

    Part 3 Wireless Systems, How They Connect the Globe and Offer Solutions for Crises among the World’s Vulnerable, and the Need to Protect the Systems’ Own Vulnerabilities

    Chapter 10 Wireless Services Communications

    Advantages of Wireless Services

    The Downside of Wireless Services

    Wireless Fidelity (Wi-Fi)

    World Interoperability for Microwave Access (WiMAX)

    Wireless LANs

    Wireless Network Systems

    Wireless Security

    Encryption

    Advantages and Disadvantages of Wireless Networks

    Firewalls

    Medium Access Control

    Communications Protocols

    Subnet Technology

    Chapter 11 Canon of Cyber-Technology Delinquency

    Categories of Violent Cyber-Technology Crimes

    Categories of Nonviolent Cyber-Technology Crimes

    Cybersecurity in a Digitally Connected Society

    Cybersecurity Operations

    Framework of Cybercrime

    The Growing Climate of Cybercrime

    Consequences of Cybersecurity Threats in the Education System

    The Impact of Cybercrime in Educational Settings

    Combating Cybercrime in a Global Society

    Projected Solutions to Cybercrime

    Cybersecurity Risks

    Part 4 Basic System Commands

    Chapter 12 Network Technology Commands

    Protocols Systems Commands

    Computer Network Commands

    Microsoft Windows Commands

    Macintosh Commands

    Linux Commands

    References

    About the Book

    Acknowledgments

    I am immensely indebted to my son, Akuda Edet Okon Esin; my father, Worthy Maurice Akuda Okon Esin; my mother, Mrs. Felicia Nkoyo Eyo Esin; my paternal grandfather, Chief Esin Akuda Abasi; my paternal grandmother, Madam Afiong Abasi; my maternal grandfather, Chief Eyo A. Uliong; and my maternal grandmother, Madam Iqwo Ekpa. I also would like to extend a special thank you to Augustine O. Esin; Theresa O. Esin; Veronica O. Esin; Chief Clement E. Anthony; Rosemary Vondera; Loretta Turner; Max G. Neumann; Mkponyong O. Dickson; John A. Ozo; Judy Johnson; Emmanuel Etim Okon; Victor B. Uno; Sunday B. Akan; Dr. Anwana O. Ntofon; Bassey E. Udoh; Ifiok-Augusta Utuk Ekong; Daniel A. Daniel; Chief Matthias O. Etim; Matthias A. Iyanam; Rev. Monsignor Joseph P. Ekarika; Rev. Father Walter J. Ong, SJ; Rev. Father Robert F. Houlihan, SJ; Rev. Father Edward Drummond, SJ; Michael B. Udoessien; Francis Inyang; Dr. Benson Kariuki; Nicholas N. Edet; Anwana A. Anwana; Jasmyn M. Cherry; Dr. Daphene O. Singleton; Dr. Belinda Prihoda, Mrs. Jane Yale; Anaya Finney; Dr. Glendora Carter; Mrs. Janice Tolliver-King and Dr. Emmanuel N. Ngwang for their continued support and assistance. Special thanks are extended to all my family members, Udung Esin, Afi-Uda, and the Uda group of villages, Mbo and Oron communities for their continued support and assistance.

    Introduction

    In order to cope with the alarming rate of changing technology and to maintain the current level of data and information transmission, the educational enterprise must convincingly attempt to revisit academic policies and course offerings on matters relating to the use of technology for instruction and learning. Over the course of the past twenty-five years, technology has permeated society, the workforce, institutions, and the instruction and learning processes.

    Part I of System Overview of Cyber-Technology in a Digitally Connected Global Society describes computer technology terminology and is intended for use in a one-quarter or one-semester undergraduate or graduate-level introductory computer information technology course for students seeking bachelor’s degree in either computer information systems or education. Students will successfully complete the course with a solid understanding of computer information technology, including related terminology, the components of a computer, network connectivity, cyber-technology, and operating software programs. System Overview of Cyber-Technology offers a comprehensive outline and solutions to overcoming students’ apprehension about the power of computer technology in their daily activities and allows them to learn at a pace that is challenging but achievable.

    Part II describes major trends of emerging and innovative technology in a society that is dependent on technology for all facets of personal and professional activities. In addition, this book recommends a smooth, systematic approach to instructional use of technology and computer networking operations. Technology includes electronic devices that can be programmed to store, retrieve, and output information with limited human intervention. This book is intended for computer information technology (CIT) corporate network directors; cyber-technology analysts; higher education network directors, instructors, and professors; allied educators; and students at schools, colleges, and universities who are viewed as the pinnacle of future technology leaders. Instructors at all institutions come from different educational backgrounds (such as humanities or natural or social sciences). Many of them are not familiar with the use of technology in the classroom for instruction. The influx of technology in schools, colleges, and universities, without effective utilization of this technology, is a critical education problem that demands immediate solutions.

    System Overview of Cyber-Technology acknowledges the links between education and cyber-technology, between network operating systems and data transmission and the culture of education, instruction, and learning. In essence, recognizing the correlation among education and the world of codified technology, this book will assist in providing a deeper understanding of and improvement upon instructional methods and strategies. In addition, it will demonstrate the correlation between education and technology as a promising and systematic approach for moving away from conventional methods of classroom instruction and learning endeavors.

    Readers, in essence, will see the integration of cyber-technology into educational settings as a pinnacle of education reform for current and future generations. In addition, System Overview of Cyber-Technology will help expound the benefits and broad range of possibilities technology can offer to education, instruction, and the learning process. The proliferation of the telegraph and mechanized printing machines changed the quality of human writing. We can also expect the use of a well-synthesized textbook focusing on the use of technology in instruction and learning to lead to startling changes in human society. These changes are necessary not because of any deficiency on the part of professors, instructors, and allied educators, but because educators have not previously needed proficiency in the use of technology to manage and deliver instruction. It is the contention of System Overview of Cyber-Technology that current and future learners are ready and willing to gain this highly necessary proficiency.

    System Overview of Cyber-Technology offers adequate and specific materials for instruction and learning, as well as about hardware and software operation and network management. In addition, it provides alternatives to long-standing traditional techniques of instruction, reinforces instructors’ and learners’ expertise, and advances a broad range of possibilities for technology’s role in learning and battling cyber-technology. This book takes the view that that evolution of instructional technology is imperative and will provide an enduring pathway along which institutions and organizations can create successful academic opportunities for current and future generations.

    In our technology-oriented society, computers and technology dominate almost all communities across the globe. System Overview of Cyber-Technology in a Digitally Connected Global Society is designed to make sure those instructors, students, and network administrators are empowered with adequate skills and expertise to thrive in a demanding and explosive technology-oriented global society. The book is organized to expose professors, instructors, allied educators, students, and network administrators to cutting-edge technology trends and provide them a better understanding of these trends and the knowledge to become effective and efficient technology leaders.

    This book puts in plain, nonthreatening terms the importance of familiarization with major computer hardware components, operating systems and network operating system programs, topology and protocol, Internet technology and analog and digital communication and networking devices, cyber security, and computer technology commands. In addition, it explains in approachable terms various methods of incorporating computers and related technologies into instruction and administration in personal and professional environments. The book’s objective is to provide readers, professors, instructors, allied educators, network administrators, and students with a well-defined, comprehensive framework for using computers and an understanding of the impact of computers and related cyber-technologies on our daily lives. In today’s technological world—in which an entire generation is totally dependent on technology for communication and data transmission, instruction and learning endeavors, and networking and connecting—a course in computer information technology is the best solution for network consultants, educators, and students.

    A computer information systems (CIS) course is a life wire and must be a part of all undergraduate degree programs. Such courses should be incorporated into the education curriculum and remain uncontested requirements for all students enrolling in a degree program. System Overview of Cyber-Technology provides a solution to gridlock faced by professors, instructors, and allied educators of introductory computer information systems courses by enabling students to grasp the complexities behind the CIS courses. The text is written precisely for introductory and intermediate CIS curriculum. It addresses appropriate computer hardware and software, as well as networking concepts, and provides compatible information technology (IT) expertise for education and organizational needs.

    Distinguishing Guides

    System Overview of Cyber-Technology provides an informational, step-by-step approach designed to empower instructors, learners, and network consultants in their learning endeavors. Cyber-technology and computing technology concepts are clearly explained in simple terms without the use of overly technical terminology. Major computer and networking concepts are introduced and explained clearly alongside realistic examples of daily technology operations.

    Author’s Commitment

    I am totally committed to listening and paying close attention to adopters—the professors, instructors, allied educators, information technology (IT) administrators, network consultants, and readers who use System Overview of Cyber-Technology—to formulate creative solutions to meet the needs of the current and future generations. Information technology and cyber-technology has invaded human institutions in their entirety; they are embedded in our educational systems and corporate enterprises. And I intensely encourage active participation from readers in providing constructive suggestions and accurate information. Cogent input and useful, productive feedback will be deeply appreciated.

    Author’s Background

    Professor Joseph O. Esin, chief publishing editor of The Journal of Educational Research and Technology (JERT), holds a Bachelor’s of science in biology from Saint Louis University, Saint Louis, Missouri; a Master’s of arts in religious studies, with emphasis on moral theology, from the Society of Jesus College of Divinity, Saint Louis, Missouri; and a Doctorate in computer Education and Technology from the United States International University, San Diego, California. The State of California awarded him a Lifetime Collegiate Instructor’s Credential in 1989, and in 1996, the United States Department of Justice approved and conferred on him the honor of Outstanding Professor of Research in recognition of his contributions to academic excellence.

    He met the selection criteria for inclusion in the 1992–93, 1994–95, 1996–97 and 2015–2016 editions of Who’s Who in American Education for demonstration of achievement and outstanding academic leadership in computer information technology, thereby contributing significantly to the betterment of contemporary society. Furthermore, he met the selection criteria for inclusion in the 1993–94 edition of the Directory of International Biography, Cambridge, England, for his is distinguished professional service in information technology, thereby contributing significantly to the betterment of contemporary society.

    From 1988 to 2000, he served as a professor of computer information technology, and from 1991 to 2000, a director of higher education accreditation operations, in accordance with the guidelines set forth by the Commission on Colleges. He was appointed an associate dean of academic affairs and a deputy provost at Paul Quinn College, Dallas, Texas, from 1997 to 2000. He is currently a professor of computer information systems at Jarvis Christian College, Hawkins, Texas; a visiting professor of research at the University at Calabar, Nigeria; and a research associate at the Botanical Research Institute of Texas (BRIT).

    Professor Esin has published several professional journal articles, including High Level of Teachers’ Apprehension (HLTA): About the Use of Computers in the Educational Process in the Journal of Educational Media & Library Science (JEMLS) in 1991; Computer Literacy for Teachers: The Role of Computer Technology in the Educational Process, also in JEMLS (1992); Faculty Development: Effective Use of Applications Software in the Classroom for Instruction (JEMLS, 1993); Strategies for Developing and Implementing Academic Computing in Colleges and Universities (JEMLS, 1994); Strategic Planning for Computer Integration in Higher Education through the Year 2000 (JEMLS, 1994); The Challenge of Networking Technologies (JEMLS, 1995); and The Design and Use of Instructional Technology in Schools, Colleges and Universities (JEMLS, 1997). He also published Decay of the Nigerian Education System, in the Journal of Educational Research and Technology (JERT) in 2013; The Emerging Impact of Information Technology on Education and the Community (JERT, 2013); "Balanced Salary Structure for Academic Professors and Allied Educators as a Pathway to Quality Education" (JERT, 2014); and The Discovery of Computer Information Technology Is an Avenue for Educational Transformation in a Changing Society of Today and Tomorrow in International Organization of Scientific Research Journal of Engineering (IOSR-JEN) in 2014. In 2016, he published Overview of Cyber Security: Endangerment of Cybercrime on Vulnerable Innocent Global Citizens in The International Journal of Engineering and Science (IJES-2016) and "Analog to Digital: Overcoming Widespread Implementation of Wireless Information Technology on a Vulnerable Global Society (JERT-2016).

    He served as a member of Doctoral Dissertation Committees at Southern Methodist University, Dallas, Texas (1998–2000); Jackson State University, Jackson, Mississippi (2010–2011); and University of Calabar, Nigeria (2014–2015). He is the author of The Power of Endurance (2008), The Evolution of Instructional Technology (2011), The Messianic View of the Kingdom of God (2011), and Global Education Reform (2013). Professor Esin’s current research emphasis is on The Changing Landscape of Cybersecurity Threats on International Organizations

    Industry Expert Reviewers

    Dr. Emmanuel N. Ngwang

    Professor of English and World Literature, Texas College, Tyler, Texas, USA

    Dr. Michael Blum,

    Professor of History, Jarvis Christian College, Hawkins, Texas, USA

    Dr. Anne-Christine Hoff,

    Professor of English, Jarvis Christian College, Hawkins, Texas, USA

    Dr. Isaac O. Adeeko

    Professor of Accounting, Jarvis Christian College, Hawkins, Texas USA

    Dr. Richmond I. Ibe

    Professor of Management, Jarvis Christian College, Hawkins, Texas, USA

    Dr. Widodo Samyono

    Professor of Mathematics, Jarvis Christian College, Hawkins, Texas, USA

    Dr. Richard C. Phillips

    Professor of Mathematics, Jarvis Christian College, Hawkins, Texas, USA

    Dr. Nathan C. Nwobi

    Professor of Mathematics and Economics, Southwestern Christian College, Terrell, Texas, USA

    Dr. Joseph Asor

    Professor and Dean of Faculty of Natural Sciences, University of Calabar, Nigeria

    Dr. Benedict I. ITA

    Professor and Dean of Faculty of Physical Sciences, University of Calabar, Nigeria

    PART 1

    UNDERSTANDING THE TERMINOLOGY OF COMPUTER TECHNOLOGY AND WHY A FOUNDATION OF KNOWLEDGE IS THE KEY TO UNLOCKING CYBER-TECHNOLOGY

    Chapter 1

    Enjoying the preview?
    Page 1 of 1