organizations rents computing resources from providers instead of having their

Organizations rents computing resources from

This preview shows page 11 - 14 out of 30 pages.

organizations rents computing resources from providers , instead of having their own locally managed hardware and software - Enables ease of scalability, lower costs because not so many IT staff, migration costs to stay current, and backup costs - Enables access anywhere VIRTUALIZATION - Virtualization allows one physical devices, such as a server or computer, to operate as if it is several machines , called virtual machines - Virtualization is the key behind cloud computing WEB 2.O - Web 2.0 is the second generation of the web - Key is the addition of interactivity, users now drive content o Wikis o Social Networking o Blogs o Mashups o Collaborative Content WEB 3.0 - Web 3.0 is when computers start to understand the meaning called semantics , of what is there; understanding the information and data to better make it usable - Referred to as the Semantic Web 11
Image of page 11
- Idea is that everything is linked, perhaps utopian idea, but the goal of some - Web is a huge document storage system - Internet facilitates exchange of documents - Search Engines locate documents - Core Problem – our ability to create information has exceeded our ability to manage it - Computer blindly retrieve and share information o They understand syntax o They do not understand meaning - Syntax vs. Semantics o Syntax – letters words and punctuation o Semantics – what it means - Web 3.0 will be an intuitive web, with the ability to scan and label information automatically and link the right information to the right person in the right moment - Knowledge society will come closer because people won’t have to take steps to makes themselves known as a specialist on a certain subject Week 13 – Lecture 2: INFORMATION SECURITY THREATS - Information security is a broad concept that involves dealing with any threat to computerized systems such as: o Viruses o Hackers o Accidental loss of data or systems o Natural disasters - Three main categories of threats: o Denial/disruption of service o Unauthorized Access o Theft and Fraud DENIAL/DISRUPTION OF SERVICE - Threats are those that, o Render a system inoperative o Limit its capability to operate o Make data unavailable - Result from, o Intentional acts o Careless behavior o Natural disasters 12
Image of page 12
- Careless behaviors, such as forgetting to perform proper backups of one’s computer, not installing security updates and tools, leaving computer so that it is easily accessibly UNAUTHORIZED ACCESS - The internet allows an attacker to attack from anywhere on the planet - Ricks caused by poor security knowledge and practice: o Identity Theft o Monetary Theft o Legal Ramifications o Termination if company policies are not followed - The top vulnerabilities available for a cyber criminal are: o Web Browser o IM Clients o Web Applications o Excessive User Rights SECURITY VS. SAFETY - Security: we must protect our computers and data in the same way we secure the doors to our homes - Safety: we must behave in ways that protect us against risks and threats that come with technology ENSURING INFORMATION SECURITY -
Image of page 13
Image of page 14

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture