Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
IMAGE NETWORKING
OPEN SYSTEMS
3 CATEGORIES OF TELECOMMUNICATIONS -
Are information systems that use common
BASED SERVICES
standards for hardware, software,
applications, and networking.
ENTERTAINMENT
HIGH-DEFINITION TV
MIDDLEWARE
INTERACTIVE TV
Programming that mediates between two
INTERACTIVE VIDEO GAMES separate programs.
DISTANCE LEARNING
Allows a particular database to access - Can move massive quantities of data, audio ,
other database w/out custom and video
programming.
-Useful in isolated areas
THE “ PLUMBING”
1. E-business processes
ANALOG
2. Electronic commerce
Voice oriented transmission
3. Enterprise collaboration
DIGITAL
INTERNET 2 - The next generation
Discrete pulse transmission
1. High performance
2. Different infrastructure
DIGITAL NETWORK TECHNOLOGIES BENEFITS
3. Will not replace current internet
2. STELLITE TRANSMISSION
- for monthly fee, they provide software,
username, passwords, and internet access.
3 TYPES OF EXTRANETS
- connected to one another through
network access point.
1. NETWORK LINKS - CONNECT THE INTRANET
- easily connect to another to obtain address
OF A BUSINESS TO THE INTRANETS OF
of websites or user nodes.
ANOTHER.
1. Surf - point and click you way to thousands 3. UNSECURED EXTRANET - link between the
of hyper-linked web sites and resources. company and other via the internet, relying on
encryption of sensitive data and firewall
2. E-mail - instant messaging to exchange
security system.
electronic message w/ colleagues.
4. Publish - post your opinion, subject matter A sender transmits a message to a receiver
or creative work to a website.
Over a channel
5. Buy and Sell - buy and sell practically
Consisting of some sorts of a medium
anything via e-commerce retailers.
3. FIBER-OPTIC CABLE - One or more hair thin E. GATEWAY - interconnect networks that
filaments of glass fiber. uses different communications
architecture.
IV. CRIME
1. PROTOCOL - A standard set of rules and V. INDIVIDUALITY
procedures for control of communications in a
network. VI. PRIVACY
3. HONESTY
COMPUTER CRIME
EXAMPLES OF CYBERTERRORISM
- Unauthorized use
1. Life support an antarctic research station
- denying an end user access turned off
HACKING - The obsessive use of computer 3. Nonessential system shut down in nuclear
power plants
3. MOONLIGHTING
8 COMMON HACKING TACTICS
4. HACKING
1. DENIAL OF SERVICE - Common networking
5. UNAUTHORIZED USE AND ACCESS
prank
6. NEWSGROUP POSTINGS
2. SCANS - Widespread probes of the internet
7. USE OF EXTERNAL ISPs
3. SNIFFER - Programs that covertly search
individual packets of data. 8. PORNOGRAPHY
9. COPYRIGHT INFRINGEMENT
10. TRANSMISSION OF CONFIDENTIAL DATA
2. COMPUTER MONITORING
3. WORKING CONDITIONS
PRIVACY LAWS
4. INDIVIDUALITY
1. ELECTRONIC COMMUNICATIONS PRIVACY
ACT AND COMPUTER FRAUD AND ABUSE ACT -
Prohibit intercepting data communication HEALTH ISSUES
messages, stealing in federal computer systems.
1. Cumulative Trauma Disorders (CTDs) -
2. U.S. COMPUTER MATCHING AND PRIVACY Disorders suffered by people who sit at a PC or
ACT - Regulates the matching of data held in terminal and do fast-paced repetitive keystroke
federal agency files to verify eligibility for jobs.
federal programs.
2. CARPAL TUNNEL SYNDROME - Painful,
crippling ailment of the hand and wrist.
Typically requires surgery to cure.
OTHER LAWS
SOCIETAL SOLUTIONS/SOLVE SOCIAL
1. SARBANES-OXLEY
PROBLEMS
2. HEALTH INSURANCE PROBABILITY &
1. Medical Diagnosis
ACCOUNTABILITY ACT (HIPAA)
2. Computer-assisted instruction
3. GRAMM-LEACH-BLILEY
3. Government program planning
4. USA PATRIOT ACT
4. Environmental quality control
5. CALIFORNIA SECURITY BREACH LAW
5. Law enforcement
6. SECURITIES AND EXCHANGE COMMISION
RULE 17a-4 6. Job placement
2. Firewalls
CYBERLAW - Laws intended to regulate
activities over the internet via electronic 3. Network Security Protocols
communication devices.Began to emerge in
4. Encryption
1996
5. Security Software Tools
6. Access Control
7. Proxy Agents/System
8. Authentication
9. Intrusion Detection
1. INPUT CONTROLS
2. PROCESSING CONTROL
3. OUTPUT CONTROL
4. STORAGE CONTROL