IT-SECURITY(COMPUTER NETWORKING)

BASICS OF COMPUTER NETWORKING Networking is the convenient way of making information accessible to anyone, anytime & anywhere. A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. A computer … Read more

IT-SECURITY(DATA COMMUNICATION BASICS)

DATA COMMUNICATION BASICS Data Communications is the transfer of data or information between a source and a receiver. The source transmits the data and the receiver receives it. Data communication involved the following like communication networks, different communication services required, the kind of networks available, protocol architectures, OSI models, TCP/IP protocol models etc. Data Communication … Read more

IT-SECURITY(OPERATING SYSTEM BASICS)

OPERATING SYSTEM BASICS An Operating system is basically a intermediary agent between the user and the computer hardware. Manages the computer’s resources (hardware, abstract resources, software) It’s a resource allocator. It is also used to control programs to prevent errors and improper computer use. It is interrupt driven. Users and Processes access the Computer’s resources … Read more

IT SECURITY SERVICES LIFE CYCLE

IT SECURITY SERVICES LIFE CYCLE The IT security services life cycle provides IT security decision makers and managers with a six phase process by which they can select, implement, and manage IT security services. This Topic details the various life-cycle phases and the issues and decisions within each phase.  the security services life cycle has … Read more

Introduction of Internet of Things

What is an Internet of Things (IoT) The Internet of Things(IoT) can be defined as a network of physical objects or people called “things” that are embedded with software, electronics, network, and sensors which allows these objects to collect and exchange data. The goal of IoT is to extend to internet connectivity from standard devices … Read more

Internet of Things (Government perspective)

Government perspective Several countries have recognised the importance of the Internet of Things for future economic growth and sustainability. From 2006 onwards the European Commission launched public consultations and stimulated widely open discussions on RFID and the Internet of Things, especially regarding critical policy issues such as governance, privacy, and resilience/security. These initiatives reached their … Read more

Java Changed the Internet

How Java Changed the Internet The Internet helped catapult Java to the forefront of programming, and Java, in turn, had a profound effect on the Internet. In addition to simplifying web programming in general, Java innovated a new type of networked program called the applet that changed the way the online world thought about content. … Read more

Development of the Internet of Things

Development of the Internet of Things Today, there are roughly 1.5 billion Internet-enabled PCs and over 1 billion Internet-enabled cell phones. The present “Internet of PCs” will move towards an “Internet of Things” in which 50 to 100 billion devices will be connected to the Internet by 2020. Some projections indicate that in the same … Read more

IT-SECURITY(NECESSARY)

WHY IS IT SECURITY NECESSARY? Most companies use electronic information extensively to support their daily business processes. Data is stored on customers, products, contracts, financial results, accounting,  etc. If this electronic information were to become available to competitors or to become corrupted, false or disappear, what would happen? What would the consequences be? Could the … Read more

IT-SECURITY (SECURITY AND ITS NEED)

SECURITY AND ITS NEED What needs to be protected, against whom and how? Security is the protection of information, systems and services against disasters, mistakes and manipulation so that the likelihood and impactof security incidents are minimized. A threat is a danger which could affect the security (confidentiality, integrity, availability) of assets, leading to a … Read more