System Overview of Cyber-Technology in a Digitally Connected Global Society
()
About this ebook
The readers, in essence, will see the integration of education and cybertechnology as a pinnacle of educational reform for current and future generations. Furthermore, the contents of this book also help expound the benefits and the broad range of possibilities that technology can offer in education, instruction, and the learning process. The proliferation of the uncertain telegraph and mechanized printing machines changed the quality of human writing. We can also expect the use of a well-synthesized educational technology textbook for instruction and learning to lead to the same startling changes in human society.
It is the authors view that the anticipated changes should not assume any deficiency on the part of the professors, instructors, and allied educators. Rather, it should ascertain that educators need to be proficient in the use of technology to manage and deliver instruction in different subject areas, such as computer information technology, network technology, wired and wireless technology, and cyber security threats. The author firmly believes that current and future learners are essentially the conglomeration of unfurnished learner materials that are ready and willing to be furnished by the educational system.
Joseph O. Esin
Joseph O. Esin is a professor of computer information systems/cybersecurity, a fellow at the Washington Center for Cybersecurity Research and Development, and a fellow at the Botanical Research Institute of Texas. He earned a Bachelor of Science in biology from Saint Louis University, Saint Louis, Missouri; a Master of Arts in theology from the Society of Jesus College of Divinity, Saint Louis, Missouri; and a doctorate in computer education and information systems from the United States International University, San Diego, California. He is also the author of seven books including System Overview of a Cyber-Technology in a Digitally Connected Global Society, and Landscape of Cybersecurity Threats and Forensic Inquiry.
Read more from Joseph O. Esin
Landscape of Cybersecurity Threats and Forensic Inquiry Rating: 0 out of 5 stars0 ratingsEquity of Cybersecurity in the Education System: High Schools, Undergraduate, Graduate and Post-Graduate Studies. Rating: 0 out of 5 stars0 ratingsThe Evolution of Instructional Technology: Overcoming Apprehension About the Use of Technology in the Classroom for Instruction Rating: 0 out of 5 stars0 ratings
Related to System Overview of Cyber-Technology in a Digitally Connected Global Society
Related ebooks
Cybersecurity as a Fishing Game: Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand Rating: 0 out of 5 stars0 ratingsComputer Science and Ambient Intelligence Rating: 0 out of 5 stars0 ratingsComputer Ethics, Revised Edition Rating: 0 out of 5 stars0 ratingsCommunication and Cyberspace, Revised Edition Rating: 0 out of 5 stars0 ratingsCyber Influence and Cognitive Threats Rating: 0 out of 5 stars0 ratingsComputers in the Workplace, Revised Edition Rating: 0 out of 5 stars0 ratingsComputers in Science and Mathematics, Revised Edition Rating: 0 out of 5 stars0 ratingsThe Information Process: A Model and Hierarchy Rating: 0 out of 5 stars0 ratingsComputers and Creativity, Revised Edition Rating: 0 out of 5 stars0 ratingsPervasive Information Architecture: Designing Cross-Channel User Experiences Rating: 4 out of 5 stars4/5Intelligent Communication Systems: Toward Constructing Human Friendly Communication Environment Rating: 0 out of 5 stars0 ratingsPrivacy, Security, and Cyberspace, Revised Edition Rating: 0 out of 5 stars0 ratingsComputational Network Science: An Algorithmic Approach Rating: 0 out of 5 stars0 ratingsThe Company We Keep: Occupational Community in the High-Tech Network Society Rating: 0 out of 5 stars0 ratingsBlockchain Applications in IoT Ecosystem Rating: 0 out of 5 stars0 ratingsTechnology-Rich Teaching: Classrooms in the 21st Century Rating: 0 out of 5 stars0 ratingsModern Technology and Conflicts Rating: 0 out of 5 stars0 ratingsTechnology and Knowledge Flow: The Power of Networks Rating: 0 out of 5 stars0 ratingsDeep Learning on Edge Computing Devices: Design Challenges of Algorithm and Architecture Rating: 0 out of 5 stars0 ratingsDysfunction and Decentralization in New Media Art and Education Rating: 0 out of 5 stars0 ratingsEfficacious Technology Management: A Guide for School Leaders Rating: 0 out of 5 stars0 ratingsIntelligent Networks: Recent Approaches and Applications in Medical Systems Rating: 0 out of 5 stars0 ratings“Exploring Computer Systems: From Fundamentals to Advanced Concepts”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsUnderstanding Mobile Human-Computer Interaction Rating: 0 out of 5 stars0 ratingsShaping Knowledge: Complex Socio-Spatial Modelling for Adaptive Organizations Rating: 0 out of 5 stars0 ratingsEmotions, Technology, and Social Media Rating: 2 out of 5 stars2/5Information and Knowledge System Rating: 0 out of 5 stars0 ratingsTrapped in the Net: The Unanticipated Consequences of Computerization Rating: 3 out of 5 stars3/5Advanced Deep Learning for Engineers and Scientists: A Practical Approach Rating: 0 out of 5 stars0 ratingsComputers and the Cybernetic Society Rating: 0 out of 5 stars0 ratings
Computers For You
The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsMastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsRemote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Mindhacker: 60 Tips, Tricks, and Games to Take Your Mind to the Next Level Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5
Reviews for System Overview of Cyber-Technology in a Digitally Connected Global Society
0 ratings0 reviews
Book preview
System Overview of Cyber-Technology in a Digitally Connected Global Society - Joseph O. Esin
2017 Joseph O. Esin. All rights reserved.
No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.
Published by AuthorHouse 01/17/2017
ISBN: 978-1-5246-5706-2 (sc)
ISBN: 978-1-5246-5707-9 (e)
Any people depicted in stock imagery provided by Thinkstock are models,
and such images are being used for illustrative purposes only.
Certain stock imagery © Thinkstock.
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
43644.pngContents
Acknowledgments
Introduction
Industry Expert Reviewers
Part 1 Understanding the Terminology of Computer Technology and Why a Foundation of Knowledge is the Key to Unlocking Cyber-Technology
Chapter 1 Computer Information Technology (CIT) Terminology
Chapter 2 Information Communication Technology (ICT)
Emergence of Computer Information Technology
Computer Hardware Generations
The Computer
Ergonomics
Information
Technology
Mobile Devices
Personal Computers
Mainframe Computers
Supercomputers
Information System (IS)
Input
Processing
Output
Feedback
Software
System Software
Chapter 3 Computer Operating System Programs
Stand-Alone Operating Systems
Microsoft Windows 2007
Macintosh Operating System X (Mac OS X)
UNIX Operating System
Linux Operating System
Google System
Plug and Play
Memory Management
Processor Management
Device Management
File Management
Network Management
User Interface
Network System
Chapter 4 Components of Computer Technology
Central Processing Unit
Memory
Storage
Design and Implementation of Networking
Telecommunications
Telecommunication Networks
Chapter 5 Digital Technology Communications
Implementation of Local Area Networking
Networking Operation Management
Part 2 The Major Trends of Emerging Technology and How to Put Them to Effective Use for Educational Institutions and Organizations
Chapter 6 Network Layer Technology
TCP and SPX (Transport Layer)
Networking Hardware
Network File Servers
Workstations
Laptop Computer
Network Interface Cards
Ethernet Cards
Wireless Adapters
Repeaters
Network Cabling
Chapter 7 Traditional Networking Standard: OSI Model
OSI Protocol Layers
Introduction to TCP/IP
Local Area Network (LAN) Structures for SMLs
Ethernet (Physical and Data Link Layers)
Chapter 8 Networking Device Technology
Principles of Networking
Networking Topologies
Types of Physical Topologies
Considerations for Deciding on a Topology Type
Hierarchical Topology
Mesh Topology
Hybrid Topology
Hierarchical Design Model
Chapter 9 Internet Communication Technology
Protocols
Transport Protocol
Wide Area Networks (WANs)
Worldwide Communication Systems
Part 3 Wireless Systems, How They Connect the Globe and Offer Solutions for Crises among the World’s Vulnerable, and the Need to Protect the Systems’ Own Vulnerabilities
Chapter 10 Wireless Services Communications
Advantages of Wireless Services
The Downside of Wireless Services
Wireless Fidelity (Wi-Fi)
World Interoperability for Microwave Access (WiMAX)
Wireless LANs
Wireless Network Systems
Wireless Security
Encryption
Advantages and Disadvantages of Wireless Networks
Firewalls
Medium Access Control
Communications Protocols
Subnet Technology
Chapter 11 Canon of Cyber-Technology Delinquency
Categories of Violent Cyber-Technology Crimes
Categories of Nonviolent Cyber-Technology Crimes
Cybersecurity in a Digitally Connected Society
Cybersecurity Operations
Framework of Cybercrime
The Growing Climate of Cybercrime
Consequences of Cybersecurity Threats in the Education System
The Impact of Cybercrime in Educational Settings
Combating Cybercrime in a Global Society
Projected Solutions to Cybercrime
Cybersecurity Risks
Part 4 Basic System Commands
Chapter 12 Network Technology Commands
Protocols Systems Commands
Computer Network Commands
Microsoft Windows Commands
Macintosh Commands
Linux Commands
References
About the Book
Acknowledgments
I am immensely indebted to my son, Akuda Edet Okon Esin; my father, Worthy Maurice Akuda Okon Esin; my mother, Mrs. Felicia Nkoyo Eyo Esin; my paternal grandfather, Chief Esin Akuda Abasi; my paternal grandmother, Madam Afiong Abasi; my maternal grandfather, Chief Eyo A. Uliong; and my maternal grandmother, Madam Iqwo Ekpa. I also would like to extend a special thank you to Augustine O. Esin; Theresa O. Esin; Veronica O. Esin; Chief Clement E. Anthony; Rosemary Vondera; Loretta Turner; Max G. Neumann; Mkponyong O. Dickson; John A. Ozo; Judy Johnson; Emmanuel Etim Okon; Victor B. Uno; Sunday B. Akan; Dr. Anwana O. Ntofon; Bassey E. Udoh; Ifiok-Augusta Utuk Ekong; Daniel A. Daniel; Chief Matthias O. Etim; Matthias A. Iyanam; Rev. Monsignor Joseph P. Ekarika; Rev. Father Walter J. Ong, SJ; Rev. Father Robert F. Houlihan, SJ; Rev. Father Edward Drummond, SJ; Michael B. Udoessien; Francis Inyang; Dr. Benson Kariuki; Nicholas N. Edet; Anwana A. Anwana; Jasmyn M. Cherry; Dr. Daphene O. Singleton; Dr. Belinda Prihoda, Mrs. Jane Yale; Anaya Finney; Dr. Glendora Carter; Mrs. Janice Tolliver-King and Dr. Emmanuel N. Ngwang for their continued support and assistance. Special thanks are extended to all my family members, Udung Esin, Afi-Uda, and the Uda group of villages, Mbo and Oron communities for their continued support and assistance.
Introduction
In order to cope with the alarming rate of changing technology and to maintain the current level of data and information transmission, the educational enterprise must convincingly attempt to revisit academic policies and course offerings on matters relating to the use of technology for instruction and learning. Over the course of the past twenty-five years, technology has permeated society, the workforce, institutions, and the instruction and learning processes.
Part I of System Overview of Cyber-Technology in a Digitally Connected Global Society describes computer technology terminology and is intended for use in a one-quarter or one-semester undergraduate or graduate-level introductory computer information technology course for students seeking bachelor’s degree in either computer information systems or education. Students will successfully complete the course with a solid understanding of computer information technology, including related terminology, the components of a computer, network connectivity, cyber-technology, and operating software programs. System Overview of Cyber-Technology offers a comprehensive outline and solutions to overcoming students’ apprehension about the power of computer technology in their daily activities and allows them to learn at a pace that is challenging but achievable.
Part II describes major trends of emerging and innovative technology in a society that is dependent on technology for all facets of personal and professional activities. In addition, this book recommends a smooth, systematic approach to instructional use of technology and computer networking operations. Technology includes electronic devices that can be programmed to store, retrieve, and output information with limited human intervention. This book is intended for computer information technology (CIT) corporate network directors; cyber-technology analysts; higher education network directors, instructors, and professors; allied educators; and students at schools, colleges, and universities who are viewed as the pinnacle of future technology leaders. Instructors at all institutions come from different educational backgrounds (such as humanities or natural or social sciences). Many of them are not familiar with the use of technology in the classroom for instruction. The influx of technology in schools, colleges, and universities, without effective utilization of this technology, is a critical education problem that demands immediate solutions.
System Overview of Cyber-Technology acknowledges the links between education and cyber-technology, between network operating systems and data transmission and the culture of education, instruction, and learning. In essence, recognizing the correlation among education and the world of codified technology, this book will assist in providing a deeper understanding of and improvement upon instructional methods and strategies. In addition, it will demonstrate the correlation between education and technology as a promising and systematic approach for moving away from conventional methods of classroom instruction and learning endeavors.
Readers, in essence, will see the integration of cyber-technology into educational settings as a pinnacle of education reform for current and future generations. In addition, System Overview of Cyber-Technology will help expound the benefits and broad range of possibilities technology can offer to education, instruction, and the learning process. The proliferation of the telegraph and mechanized printing machines changed the quality of human writing. We can also expect the use of a well-synthesized textbook focusing on the use of technology in instruction and learning to lead to startling changes in human society. These changes are necessary not because of any deficiency on the part of professors, instructors, and allied educators, but because educators have not previously needed proficiency in the use of technology to manage and deliver instruction. It is the contention of System Overview of Cyber-Technology that current and future learners are ready and willing to gain this highly necessary proficiency.
System Overview of Cyber-Technology offers adequate and specific materials for instruction and learning, as well as about hardware and software operation and network management. In addition, it provides alternatives to long-standing traditional techniques of instruction, reinforces instructors’ and learners’ expertise, and advances a broad range of possibilities for technology’s role in learning and battling cyber-technology. This book takes the view that that evolution of instructional technology is imperative and will provide an enduring pathway along which institutions and organizations can create successful academic opportunities for current and future generations.
In our technology-oriented society, computers and technology dominate almost all communities across the globe. System Overview of Cyber-Technology in a Digitally Connected Global Society is designed to make sure those instructors, students, and network administrators are empowered with adequate skills and expertise to thrive in a demanding and explosive technology-oriented global society. The book is organized to expose professors, instructors, allied educators, students, and network administrators to cutting-edge technology trends and provide them a better understanding of these trends and the knowledge to become effective and efficient technology leaders.
This book puts in plain, nonthreatening terms the importance of familiarization with major computer hardware components, operating systems and network operating system programs, topology and protocol, Internet technology and analog and digital communication and networking devices, cyber security, and computer technology commands. In addition, it explains in approachable terms various methods of incorporating computers and related technologies into instruction and administration in personal and professional environments. The book’s objective is to provide readers, professors, instructors, allied educators, network administrators, and students with a well-defined, comprehensive framework for using computers and an understanding of the impact of computers and related cyber-technologies on our daily lives. In today’s technological world—in which an entire generation is totally dependent on technology for communication and data transmission, instruction and learning endeavors, and networking and connecting—a course in computer information technology is the best solution for network consultants, educators, and students.
A computer information systems (CIS) course is a life wire
and must be a part of all undergraduate degree programs. Such courses should be incorporated into the education curriculum and remain uncontested requirements for all students enrolling in a degree program. System Overview of Cyber-Technology provides a solution to gridlock faced by professors, instructors, and allied educators of introductory computer information systems courses by enabling students to grasp the complexities behind the CIS courses. The text is written precisely for introductory and intermediate CIS curriculum. It addresses appropriate computer hardware and software, as well as networking concepts, and provides compatible information technology (IT) expertise for education and organizational needs.
Distinguishing Guides
System Overview of Cyber-Technology provides an informational, step-by-step approach designed to empower instructors, learners, and network consultants in their learning endeavors. Cyber-technology and computing technology concepts are clearly explained in simple terms without the use of overly technical terminology. Major computer and networking concepts are introduced and explained clearly alongside realistic examples of daily technology operations.
Author’s Commitment
I am totally committed to listening and paying close attention to adopters—the professors, instructors, allied educators, information technology (IT) administrators, network consultants, and readers who use System Overview of Cyber-Technology—to formulate creative solutions to meet the needs of the current and future generations. Information technology and cyber-technology has invaded human institutions in their entirety; they are embedded in our educational systems and corporate enterprises. And I intensely encourage active participation from readers in providing constructive suggestions and accurate information. Cogent input and useful, productive feedback will be deeply appreciated.
Author’s Background
Professor Joseph O. Esin, chief publishing editor of The Journal of Educational Research and Technology (JERT), holds a Bachelor’s of science in biology from Saint Louis University, Saint Louis, Missouri; a Master’s of arts in religious studies, with emphasis on moral theology, from the Society of Jesus College of Divinity, Saint Louis, Missouri; and a Doctorate in computer Education and Technology from the United States International University, San Diego, California. The State of California awarded him a Lifetime Collegiate Instructor’s Credential in 1989, and in 1996, the United States Department of Justice approved and conferred on him the honor of Outstanding Professor of Research
in recognition of his contributions to academic excellence.
He met the selection criteria for inclusion in the 1992–93, 1994–95, 1996–97 and 2015–2016 editions of Who’s Who in American Education for demonstration of achievement and outstanding academic leadership in computer information technology, thereby contributing significantly to the betterment of contemporary society. Furthermore, he met the selection criteria for inclusion in the 1993–94 edition of the Directory of International Biography, Cambridge, England, for his is distinguished professional service in information technology, thereby contributing significantly to the betterment of contemporary society.
From 1988 to 2000, he served as a professor of computer information technology, and from 1991 to 2000, a director of higher education accreditation operations, in accordance with the guidelines set forth by the Commission on Colleges. He was appointed an associate dean of academic affairs and a deputy provost at Paul Quinn College, Dallas, Texas, from 1997 to 2000. He is currently a professor of computer information systems at Jarvis Christian College, Hawkins, Texas; a visiting professor of research at the University at Calabar, Nigeria; and a research associate at the Botanical Research Institute of Texas (BRIT).
Professor Esin has published several professional journal articles, including High Level of Teachers’ Apprehension (HLTA): About the Use of Computers in the Educational Process
in the Journal of Educational Media & Library Science (JEMLS) in 1991; Computer Literacy for Teachers: The Role of Computer Technology in the Educational Process,
also in JEMLS (1992); Faculty Development: Effective Use of Applications Software in the Classroom for Instruction
(JEMLS, 1993); Strategies for Developing and Implementing Academic Computing in Colleges and Universities
(JEMLS, 1994); Strategic Planning for Computer Integration in Higher Education through the Year 2000
(JEMLS, 1994); The Challenge of Networking Technologies
(JEMLS, 1995); and The Design and Use of Instructional Technology in Schools, Colleges and Universities
(JEMLS, 1997). He also published Decay of the Nigerian Education System,
in the Journal of Educational Research and Technology (JERT) in 2013; The Emerging Impact of Information Technology on Education and the Community
(JERT, 2013); "Balanced Salary Structure for Academic Professors and Allied Educators as a Pathway to Quality Education" (JERT, 2014); and The Discovery of Computer Information Technology Is an Avenue for Educational Transformation in a Changing Society of Today and Tomorrow
in International Organization of Scientific Research Journal of Engineering (IOSR-JEN) in 2014. In 2016, he published Overview of Cyber Security: Endangerment of Cybercrime on Vulnerable Innocent Global Citizens
in The International Journal of Engineering and Science (IJES-2016) and "Analog to Digital: Overcoming Widespread Implementation of Wireless Information Technology on a Vulnerable Global Society (JERT-2016).
He served as a member of Doctoral Dissertation Committees at Southern Methodist University, Dallas, Texas (1998–2000); Jackson State University, Jackson, Mississippi (2010–2011); and University of Calabar, Nigeria (2014–2015). He is the author of The Power of Endurance (2008), The Evolution of Instructional Technology (2011), The Messianic View of the Kingdom of God (2011), and Global Education Reform (2013). Professor Esin’s current research emphasis is on The Changing Landscape of Cybersecurity Threats on International Organizations
Industry Expert Reviewers
Dr. Emmanuel N. Ngwang
Professor of English and World Literature, Texas College, Tyler, Texas, USA
Dr. Michael Blum,
Professor of History, Jarvis Christian College, Hawkins, Texas, USA
Dr. Anne-Christine Hoff,
Professor of English, Jarvis Christian College, Hawkins, Texas, USA
Dr. Isaac O. Adeeko
Professor of Accounting, Jarvis Christian College, Hawkins, Texas USA
Dr. Richmond I. Ibe
Professor of Management, Jarvis Christian College, Hawkins, Texas, USA
Dr. Widodo Samyono
Professor of Mathematics, Jarvis Christian College, Hawkins, Texas, USA
Dr. Richard C. Phillips
Professor of Mathematics, Jarvis Christian College, Hawkins, Texas, USA
Dr. Nathan C. Nwobi
Professor of Mathematics and Economics, Southwestern Christian College, Terrell, Texas, USA
Dr. Joseph Asor
Professor and Dean of Faculty of Natural Sciences, University of Calabar, Nigeria
Dr. Benedict I. ITA
Professor and Dean of Faculty of Physical Sciences, University of Calabar, Nigeria
PART 1
UNDERSTANDING THE TERMINOLOGY OF COMPUTER TECHNOLOGY AND WHY A FOUNDATION OF KNOWLEDGE IS THE KEY TO UNLOCKING CYBER-TECHNOLOGY