Sei sulla pagina 1di 10

TELECOMMUNICATION AND NETWORKS  MULTIMEDIA SERVICES

 IMAGE NETWORKING

NETWORK is an interconnected or interrelated  INTERNET ACCESS


chain, group, or system.

INTERNET NETWORKING TECHNOLOGIES ARE


METCALFE’S LAW - the usefulness of a network. BEING USED AS A TECHNOLOGY PLATFORM

- the more users on a


network the more useful it becomes.
1. WEB BROWSER SUITES
- critical mass is reached
2. HTML WEB PAGE EDITORS

3. NETWORK MANAGEMENT SOFTWARE


3 TYPES OF TELECOMMUNICATION TRENDS
4. FIREWALLS

1. INDUSTRY TRENDS - Towards more


INTERNET NETWORKING TECHNOLOGIES
competitive vendors, carriers, alliances, and
network services

2. TECHNOLOGY TRENDS - Towards extensive - Being applied in internet, intranet and


use of Internet, digital fiber-optic, and wireless extranet application.
technologies.
- Reinforces previous move towards
3. APPLICATION TRENDS - Toward the client/server networks.
pervasive use of the INTERNET, enterprise
intranets and interorganizational extranets to
support electronic business and commerce.

OPEN SYSTEMS
3 CATEGORIES OF TELECOMMUNICATIONS -
 Are information systems that use common
BASED SERVICES
standards for hardware, software,
applications, and networking.

 ENTERTAINMENT

 INFORMATION TRANSACTIONS INTERNET NETWORKING TECHNOLOGIES

 COMMUNICATIONS  Are common standard for open system.

FULL SERVICES SPECTRUM CONNECTIVITY

 Open system provide greater connectivity


and network interoperability.
 BROADCAST TV

 HIGH-DEFINITION TV
MIDDLEWARE
 INTERACTIVE TV
 Programming that mediates between two
 INTERACTIVE VIDEO GAMES separate programs.
 DISTANCE LEARNING
 Allows a particular database to access - Can move massive quantities of data, audio ,
other database w/out custom and video
programming.
-Useful in isolated areas

THE “ PLUMBING”

 Routes data and information between


TELECOMMUNICATION NETWORKS NOW PLAY
back-end data sources and end user
A VITAL AND PERVASIVE ROLE IN
applications.
WEB-ENABLED
 Essential components of any IT structures.

1. E-business processes
ANALOG
2. Electronic commerce
 Voice oriented transmission
3. Enterprise collaboration

DIGITAL
INTERNET 2 - The next generation
 Discrete pulse transmission
1. High performance

2. Different infrastructure
DIGITAL NETWORK TECHNOLOGIES BENEFITS
3. Will not replace current internet

4. In limited use already


 Higher transmission speeds
5. Infinite bandwidth
 Moves larger amounts of information
6. Users connect via abilene at 120 gbps
 Greater economy and much lower error
7. May never become totally open
rates

 Transmits multiple types of


communications (data, voice, video) on THE INTERNET IS A GLOBAL INFORMATION
the same circuits. SUPERHIGHWAY

2 TYPES OF TECHNOLOGY TRENDS 1. Millions of smaller, private networks

2. No central computer system


1. FIBER-OPTIC 3. No governing body
- Uses of laser-generated light 4. Based on common standards
- Reduced size and installation effort 5. Growing by 1 million servers per month
- Vastly greater communication capacity

- Faster transmission speeds INTERNET SERVICE PROVIDERS


- Freedom from electrical interface - companies that specialize in providing easy
access to the internet.

2. STELLITE TRANSMISSION
- for monthly fee, they provide software,
username, passwords, and internet access.
3 TYPES OF EXTRANETS
- connected to one another through
network access point.
1. NETWORK LINKS - CONNECT THE INTRANET
- easily connect to another to obtain address
OF A BUSINESS TO THE INTRANETS OF
of websites or user nodes.
ANOTHER.

2. VIRTUAL PRIVATE NETWORKS - direct private


POPULAR USES OF THE INTERNET network links or private secure internet links.

1. Surf - point and click you way to thousands 3. UNSECURED EXTRANET - link between the
of hyper-linked web sites and resources. company and other via the internet, relying on
encryption of sensitive data and firewall
2. E-mail - instant messaging to exchange
security system.
electronic message w/ colleagues.

3. Discuss - participate in discussion forums


of special interest newsgroups or hold real time TELECOMMUNICATION NETWORK IS ANY
text conversations in Web site chat rooms. ARRANGEMENT WHERE:

4. Publish - post your opinion, subject matter  A sender transmits a message to a receiver
or creative work to a website.
 Over a channel
5. Buy and Sell - buy and sell practically
 Consisting of some sorts of a medium
anything via e-commerce retailers.

6. Download - transfer data files, software to


your computer system. 3 TYPES OF TELECOMMUNICATIONS NETWORK
MODEL
7. Compute - log onto and use thousands of
Internet computer system around the world.

8. Connect - find out what friends, 1. TELECOMMUNICATIONS CHANNEL - Over


acquaintances, and business associates are up w/c data are transmitted and received.
to.
- use combination of media.
9. Phone Calls - make long distance phone
calls , hold desktop etc. 2. COMPUTERS - All sizes and anf types are
interconnected by telecommunications
BUSINESS VALUE OF THE INTERNET networks.
1. Generate new revenue sources 3. TELECOMMUNICATIONS CONTROL
SOFTWARE - consist of programs that control
2. Develop new markets and channels
telecommunications activities and manage the
3. Attract new customers functions of telecommunication networks.

4. Increase customer loyalty and retention

5. Develop new Web-Based products 5 TYPES OF COMMUNICATION NETWORKS

6. Reduce costs of doing business

1. WIDE AREA NETWORKS (WAN) - covers a


large geographic area. It is referred to a
INTRANETS
METROPOLITAN AREA NETWORK (MAN).
- Are protected by Passwords, Encryption,
and Firewalls.
2. LOCAL AREA NETWORKS (LAN) - Connects a 1. MODEMS - Are the most common types of
computer with in a limited physical area, such communication processors.
as an office, classroom, or building.
- They convert the digital signals
from a computer or transmission terminal at
one end.
3. VIRTUAL PRIVATE NETWORK - is a secure
network that uses the internet as its main
backbone network.
2. INTERNETWORK PROCESSORS - Special
4. CLIENT/SERVER NETWORK purpose communications processor.

5. PEER-TO-PEER NETWORKS A. SWITCH - Communications processor


that makes connections between
telecommunication circuits in a network.
3 TYPES OF TELECOMMUNICATIONS MEDIA
B. BRIDGE - Is a device that connects two
or more local area networks that use the
same communications rules or protocol.
1. TWISTED-PAIR WIRE - Ordinary telephone
wire. C. ROUTER - Intelligent communications
processor.
2. COAXIAL CABLE - Sturdy copper or aluminum
wire wrapped w/ spacers to insulate and D. HUB - port- switching communications
protect it. processor.

3. FIBER-OPTIC CABLE - One or more hair thin E. GATEWAY - interconnect networks that
filaments of glass fiber. uses different communications
architecture.

3. MULTIPLEXER - Allows a single


8 TYPES OF WIRELESS TECHNOLOGIES communications channel to carry simultaneous
data transmissions from many terminals.

1. TERRESTRIAL MICROWAVE - Earthbound


Microwave system.

2. COMMUNICATIONS SATELLITES - Serve as 4 TYPES OF NETWORK MNGMT. FUNCTIONS


relay station.

3. TELEPHONE AND PAGER SYSTEMS -


Geographic areas divided into cells. 1. TRAFFIC MANAGEMENT - Manage network
resources and traffic to avoid congestion.
4. WIRELESS LANS - uses wireless radio-wave
technology to connect PCs within an office or 2. SECURITY - Provide authentication and
building. enforcement.

5. BLUETOOTH - short range wireless. 3. NETWORK MONITORING - troubleshoot and


watch over the network, alerting administrators
6. CELLULAR PHONES to problems.
7. MOBILE RADIO 4. CAPACITY PLANNING - survey network
resources. Determine the best way to
8. PDAs
accommodate network needs.

3 TYPES OF COMMUNICATION PROCESSOR


4 TYPES OF NETWORK TOPOLOGIES
1. STAR - network ties end user computers to a BANDWIDTH - The frequency range of
central computers. telecommunications channel. Sometimes called
Baud Rate.
2. RING - network ties local computer
processors together in a ring on a more equal
basis.
SECURTIY AND ETHICAL CHALLENGES
3. BUS - local processors share the same bus.

4. MESH - variation of the ring network. Used


BUSINESS IT SECURITY, ETHICS, AND SOCIETY
direct communications line.
I. EMPLOYMENT

II. WORKING CONDITIONS


3 TYPES OF NETWORK ARCHITECTURES AND
PROTOCOLS III. HEALTH

IV. CRIME
1. PROTOCOL - A standard set of rules and V. INDIVIDUALITY
procedures for control of communications in a
network. VI. PRIVACY

2. HANDSHAKING - The process of exchanging


predetermined signals and characters.
4 CATEGORIES OF ETHICAL BUSINESS ISSUES
3. NETWORK ARCHITECTURE - Master plans of
1. EQUITY
protocols.Goal is to promote open, simple
telecommunication environment. 2. RIGHTS

3. HONESTY

2 TYPES OF SWITCHING ALTERNATIVES 4. EXERCISE OF CORPORATE POWER

1. CIRCUIT SWITCHING - switch open a circuit to 3 TYPES OF SOCIAL RESPONSIBILITY THEORIES


establish a link between a sender and a
receiver. 1. STOCKHOLDER THEORY - Managers are agent
of stockholders. Increase profit w/out violating
2. PACKET SWITCHING - Breaks message into laws.
groups called packets. Transmit packets
separately. 2. SOCIAL CONTRACT THEORY - Companies
have an ethical responsibility to all members of
society.

NETWORK INTEROPERABILITY - Ensures that 3. STAKEHOLDER THEORY - Managers have an


anyone anywhere on one network can ethical responsibility to manage a firm for the
communicate w/ anyone anywhere on another benefit of all its stakeholders.
network.

4 PRINCIPLES OF TECHNOLOGY ETHICS -


TRANSMISSION RATES
1. PROPORTIONALITY - Good achieved by
1- NARROW-BAND - low speed technology must outweigh the harm or risk.

2- BROADBAND - High speed


2. INFORMED CONSENT - Those affected by the 4. SPOOFING - Faking an e-mail address or web
technology should understand and accept the page to trick users.
risks.
5. TROJAN HORSE - A program that unknown to
3. JUSTICE - The benefits and burdens of the the user.
technology should be distributed fairly.
6. BACK DOORS - Difficult to detect
4. MINIMIZED RISK - The technology must be
7. MALICIOUS APPLETS - Tiny programs,
implemented so as to avoid all unnecessary risk.
sometimes written in the popular java
computer language.

A RESPONSIBLE PROFESSIONAL GUIDELINES 8. WAR DIALING - Programs that automatically


dial thousands of telephone numbers.
 Acts with integrity

 Increases personal competence


CYBER THEFT - Many computer crimes involve
 Sets high standards of personal
theft of money.
performance

 Accepts responsibility for his/her work


CYBERTERRORISM - The leveraging of an
 Advances the health, privacy, and general
organizations. Can have serious, large -scale
welfare of the public
influence

COMPUTER CRIME
EXAMPLES OF CYBERTERRORISM
- Unauthorized use
1. Life support an antarctic research station
- denying an end user access turned off

- using or conspiring to use computer 2. Release of untreated sewage into waterways

HACKING - The obsessive use of computer 3. Nonessential system shut down in nuclear
power plants

4. Estonian government ministry and banks


BREAKING AND ENTERING - Stealing nor knocked offline
damaging anything.

INTERNET ABUSES IN THE WORKPLACE


CRACKER - A malicious or criminal hacker who
maintain knowledge of vulnerabilities found for 1. GENERAL EMAIL ABUSES
private advantage.
2. PLAGIARISM

3. MOONLIGHTING
8 COMMON HACKING TACTICS
4. HACKING
1. DENIAL OF SERVICE - Common networking
5. UNAUTHORIZED USE AND ACCESS
prank
6. NEWSGROUP POSTINGS
2. SCANS - Widespread probes of the internet
7. USE OF EXTERNAL ISPs
3. SNIFFER - Programs that covertly search
individual packets of data. 8. PORNOGRAPHY

9. COPYRIGHT INFRINGEMENT
10. TRANSMISSION OF CONFIDENTIAL DATA

11. LEISURE USE OF INTERNET SPYWARE - Uses an internet connection in the


background, w/o the users permission or
12. NON-WORK-RELATED DOWNLOADS OR
knowledge.
UPLOAD
- Captures information about the user
and sends it over the internet.
SOFTWARE PRIVACY - Unauthorized copying of
computer programs.
PRIVACY ISSUES - The power of information
technology to store and retrieve information
LICENSING - Site license allows a certain can have a negative effect on every individuals
number of copies right to privacy.

THEFT OF INTELLECTUAL PROPERTY OPT-IN - Allow data to be compiled about you.


Default in the Europe.
1. INTELLECTUAL PROPERTY - Copyright
material include music, videos, images, articles, OPT-OUT - Data can be compiled about you.
books and software. Unless you specifically request that it not be.
Default in the U.S.
2. COPYRIGHT INFRINGEMENT IS ILLEGAL -
Peer to Peer networking techniques have made
it easy to trade pirated intellectual property
ADDITIONAL PRIVACY ISSUES
3. PUBLISHERS OFFER INEXPENSIVE ONLINE
1. VIOLATION OF PRIVACY - Accessing
MUSIC - Illegal downloading of music and video
individuals private email conversation.
is down and continues to drop
Collecting and sharing information about
individuals.

5 VIRUS FAMILIES OF ALL TIME 2. COMPUTER MONITORING - Always knowing


where the person is. Mobile and paging services
1. My Doom, 2004 - Spread via e mail and over are becoming more closely.
kazaa file-sharing network.
3. COMPUTER MATCHING - Using customer
2. NETSKY, 2004 - Mass mailing worm that information gained from many sources to
spreads by emailing itself to all email address. market additional business services.
3. SoBig, 2003 - Mass mailing email worm that 4. UNAUTHORIZED ACCESS OF PERSONAL FILES
arrives as an attachment - Collecting telephone numbers, e mail address,
credit card numbers and other information to
4. KLEZ, 2002 - Mass mailing email worm that
build customer profiles.
arrives w/ randomly named attachment

5. Sasser, 2004 - Exploits a Microsoft


vulnerability to spread from computer to PROTECTING YOUR PRIVACY ON THE INTERNET
computer w/ no user intervention.
 Encrypt email

 Send newsgroup posting through


ADWARE - Software that support to serve a anonymous remailers
useful purpose and often does.
 Ask your ISP not to sell your name and
- Allows advertisers to display pop-up information to mailing list providers and
and banner ads. other marketers.
 Don’t reveal personal data and interest on OTHER CHALLENGES
online service and website user profiles.
1. EMPLOYMENT

2. COMPUTER MONITORING

3. WORKING CONDITIONS
PRIVACY LAWS
4. INDIVIDUALITY
1. ELECTRONIC COMMUNICATIONS PRIVACY
ACT AND COMPUTER FRAUD AND ABUSE ACT -
Prohibit intercepting data communication HEALTH ISSUES
messages, stealing in federal computer systems.
1. Cumulative Trauma Disorders (CTDs) -
2. U.S. COMPUTER MATCHING AND PRIVACY Disorders suffered by people who sit at a PC or
ACT - Regulates the matching of data held in terminal and do fast-paced repetitive keystroke
federal agency files to verify eligibility for jobs.
federal programs.
2. CARPAL TUNNEL SYNDROME - Painful,
crippling ailment of the hand and wrist.
Typically requires surgery to cure.

OTHER LAWS
SOCIETAL SOLUTIONS/SOLVE SOCIAL
1. SARBANES-OXLEY
PROBLEMS
2. HEALTH INSURANCE PROBABILITY &
1. Medical Diagnosis
ACCOUNTABILITY ACT (HIPAA)
2. Computer-assisted instruction
3. GRAMM-LEACH-BLILEY
3. Government program planning
4. USA PATRIOT ACT
4. Environmental quality control
5. CALIFORNIA SECURITY BREACH LAW
5. Law enforcement
6. SECURITIES AND EXCHANGE COMMISION
RULE 17a-4 6. Job placement

COMPUTER LIBEL AND CENSORSHIP SECURITY MANAGEMENT - The goal is the


accuracy, integrity and safety of all information
1. SPAMMING - Indiscriminate sending of
system processes and resources.
unsolicited email messages to many internet
users.

2. FLAMING - Sending extremely critical, SECURITY MANAGEMENT


derogatory, and often vulgar email messages.
1. Virtual Private Networks

2. Firewalls
CYBERLAW - Laws intended to regulate
activities over the internet via electronic 3. Network Security Protocols
communication devices.Began to emerge in
4. Encryption
1996
5. Security Software Tools

6. Access Control

7. Proxy Agents/System
8. Authentication

9. Intrusion Detection

INTERNETWORKED SECURITY DEFENSES

1. ENCRYPTION - Data is transmitted in


scrambled form

2. FIREWALLS - GETEKEEPER SYSTEM

3. EMAIL MONITORING- Use content


monitoring software to scan for troublesome
words.

4. VIRUS DEFENSES - Centralize the updating


distribution of antivirus software.

3 LAYERS OF DENIAL SERVICE ATTACKS

1. The victim’s website - Create back up servers


and network connections.

2. The victim’s ISP - Monitor and block traffic


spikes

3. Zombie Machines - Scan for vulnerabilities,


set/enforce security policies

OTHER SECURITY MEASURES

1. SECURITY CODES - Multilevel password


system

2. BACK UP FILES - Duplicate files of data or


programs

3. SECURITY MONITORS - Monitor the use of


computer and networks.

INFORMATION SYSTEM CONTROLS

1. INPUT CONTROLS

2. PROCESSING CONTROL

3. OUTPUT CONTROL

4. STORAGE CONTROL

IT SECURITY AUDITS - Performed by internal or


external auditors.

Potrebbero piacerti anche