71%(7)5 out of 7 people found this document helpful
This preview shows page 11 - 14 out of 30 pages.
organizations rents computing resources from providers, instead of having their own locally managed hardware and software-Enables ease of scalability, lower costsbecause not so many IT staff, migration costs to stay current, and backup costs-Enables access anywhereVIRTUALIZATION-Virtualizationallows one physical devices, such as a server or computer, to operate as if it is several machines, called virtual machines-Virtualization is the key behind cloud computingWEB 2.O-Web 2.0 is the second generation of the web-Key is the addition of interactivity, users now drive contentoWikisoSocial NetworkingoBlogsoMashupsoCollaborative ContentWEB 3.0-Web 3.0is when computers start to understand the meaning called semantics, of what is there; understanding the information and data to better make it usable-Referred to as the Semantic Web11
-Idea is that everything is linked, perhaps utopian idea, but the goal of some-Webis a huge document storage system-Internetfacilitates exchange of documents-Search Engineslocate documents-Core Problem – our ability to create informationhas exceeded our ability to manage it-Computer blindly retrieve and share informationoThey understand syntaxoThey do not understand meaning-Syntax vs. SemanticsoSyntax – letters words and punctuationoSemantics – what it means-Web 3.0 will be an intuitive web, with the ability to scan and label information automatically and link the right information to the right person in the right moment-Knowledge society will come closer because people won’t have to take steps to makes themselves known as a specialist on a certain subjectWeek 13 – Lecture 2: INFORMATION SECURITY THREATS-Information securityis a broad concept that involves dealing with any threat to computerized systemssuch as:oVirusesoHackersoAccidental loss of data or systemsoNatural disasters-Three main categories of threats:oDenial/disruption of serviceoUnauthorized AccessoTheft and FraudDENIAL/DISRUPTION OF SERVICE-Threats are those that,oRender a system inoperativeoLimit its capability to operateoMake data unavailable-Result from,oIntentional actsoCareless behavioroNatural disasters12
-Careless behaviors, such as forgetting to perform proper backups of one’s computer, not installing security updates and tools, leaving computer so that it is easily accessiblyUNAUTHORIZED ACCESS-The internet allows an attacker to attack from anywhereon the planet-Ricks caused by poor security knowledge and practice:oIdentity TheftoMonetary TheftoLegal RamificationsoTermination if company policies are not followed-The top vulnerabilities available for a cyber criminal are:oWeb BrowseroIM Clients oWeb ApplicationsoExcessive User RightsSECURITY VS. SAFETY-Security: we must protect our computers and data in the same way we secure the doors to our homes-Safety: we must behave in ways that protect us against risks and threats that come with technologyENSURING INFORMATION SECURITY-