Beruflich Dokumente
Kultur Dokumente
DCL412 Q1:
Briefly describe the categories of computer networks?
A network allows computers to exchange data where networked computing devices pass
data to each other along data connections. It helps to share hardware, software, data,
information or communication. Following are broadly classified types of computer
networks,
Bus
(Linear Architecture; Bidirectional Communication; Non-Recipient station
discards the information frame if not intended based on address)
Ring
(Closed Loop Architecture; Unidirectional transmission; Each Active
station receives & re-transmits frames in the ring, if disrupted data is lost)
Star
(LAN Architecture in which end points on network are connected to a
common central hub; Bidirectional Point-to-point Communication; Ease
to detect failure of station and rectify but if central controller fails network)
Tree
(LAN Architecture identical to bus topology except that it branches with
multiple nodes; Hierarchical Architecture: existence of a central node
(root) and of various sets of level organized nodes (intermediary nodes);
the leaves of the tree are the workstations. The data flow between any
two nodes goes up-down using the upper levels nodes.)
Mesh
(Mesh topology: there are at least two nodes with two or more paths
between them)
Internetwork (Internet)
An internetwork is the connection of multiple computer networks via a common
routing technology using routers.
Intranet
An intranet is a set of networks that are under the control of a single
administrative entity. The intranet uses the IP protocol and IP-based tools such
as web browsers and file transfer applications. The administrative entity limits
use of the intranet to its authorized users. Commonly, an intranet is the internal
LAN of an organization. A large intranet typically has at least one web server to
provide users with organizational information. An intranet is also anything behind
the router on a LAN.
Extranet
An extranet is a network that is also under the administrative control of a single
organization, but supports a limited connection to a specific external network. For
example, an organization may provide access to some aspects of its intranet to
Search Tools and Methods - describes the means used in conducting a search.
Key word search operators - describes use of operators to compose queries.
Preferred search tools - Lists preferred search tools their keyword operators.
Planning and conducting a search - Provides a guide for conducting search.
Hints and information - Useful facts about the working of the internet.
Comments - Useful information
Advanced information:
A search tool is a computer program that perform searches using a search method which
is the way a search request and retrieves information from web site. There are different
types of methods to conduct the search as mentioned above. There are 4 types search
tools each of them has its own search method.
1. Directory search: It is a hierarchical that starts with general subject heading &
follows with succession of increasingly more specific sub headings. The search
method it employs is Subject Search. Its advantage is the ease of use & indexing of
the information placed in its database by skilled persons to ensure its value.
Disadvantage is it is time consuming limiting the number of directory reviews and
indexing & also limiting the descriptive information about its site because of
comparatively small directory data base & low updating frequency.
2. Search engine tool: It uses keywords and responds with list of references or
heads. The search method it employs is known as Key word search. Advantages
being its information content or database is substantially larger & more current than
that of directory such tool. However, disadvantage is it is not very exacting in the way
it indexes and retrieves induction in its data base, which makes finding relevant
documents more difficult. Key word searches required far more explanation than
subject searches because of their broader scope & greater complexity.
3. A directory with search engine: It uses both subject & key word search method
interactively. In the directory search part the search follows the directory path
through increasingly more specific subject matter; at each stop along the path, a
search engine option is provided to enable the searcher to convert to a key word
search. The subject & key word search is thus said to be coordinated. Advantage of
this kind is its ability to narrow the search field to update to better results & relevant
Stemming (Truncation): Use the truncation symbols to create searches where you want
to retrieve all variants of a word stem. The most commonly used truncation symbol is the
asterisk (*). E.g.: A search for educat* will retrieve: educate, educating, education,
educational, educator, educators, etc.
Wildcards: A wildcard symbol is used within a word to provide for all possible spellings
or variations inside a word or word stem. The most commonly used wildcard symbols for
internal truncation are the number symbol (#) and the question mark (?).
E.g.: a search for wom?n will retrieve: woman and women
Proximity operators
You can use proximity operators to search for words that occur within a specified number
of words of each other in a database record. The most commonly used are within (w) or
near (n). You combine the proximity operator with a number and place it between two
words or phrases to specify how many words should be between them. The NEAR
operator looks for words within a specified number of each other in any order.
Above are examples for we can use more specific searches through natural language,
case-sensitiveness, more professional search tools or increasing complex searches
DCL412 Q3:
Define HTML, What does a Basic HTML document contain?
HTML (Hypertext Markup Language) is a formatting language that is used to create
documents for the World Wide Web. It is the set of markup symbols or codes inserted in
a file intended for display on a World Wide Web browser page. The markup tells the Web
browser how to display a Web page's words and images for the user. Each individual
markup code is referred to as an element (but many people also refer to it as a tag).
Some elements come in pairs that indicate when some display effect is to begin and
when it is to end. It can include formatting, graphics, and links to documents or sound or
video clips.
HTML documents are made up of elements called tags, which define the presentation of
the web page. Most tags in an HTML document must be followed somewhere in the file
with a closing tag. HTML is a relatively simple implementation of Standard Generalized
Markup Language (SGML). For example:
This is an opening tag: <blockquote>.
This is a closing tag: </blockquote>.
Note that the difference between these two tags is only the presence of a forward slash
after the opening bracket of the tag. The forward slash is what makes this a closing tag.
SGML is a system for defining markup languages. Authors mark up their documents by
representing structural, presentational, and semantic information alongside content.
HTML is one example of a markup language. Here is an example of an HTML document:
A basic HTML Document structure Contains following elements,
HEAD
o INDEX
o REFERENCES
o LINKS or META-INFORMATION
o TITLE
BODY
o PRAGRAPHS
o BACKGROUND
o TABLES and related TABLE FROMATTING
o LINKS or ANCHOR elements
o IMAGES or MULIMEDIA/JAVA APPPLETS
o FORMS and FRAME SETS
Example of a HTML document:
o
An HTML document is divided into a head section (here, between <HEAD> and
</HEAD>) and a body (here, between <BODY> and </BODY>). The title of the document
appears in the head (along with other information about the document), and the content
of the document appears in the body. The body in this example contains just one
paragraph, marked up with <P>.
We could also use ISINDEX for interfacing to a simple script. The script itself is not
discussed here, but it is of course essential that it can handle the queries generated.
e.g. <ISINDEX PROMPT="Search string :">
The REV attribute specifies the relationship between the linked document and the current
document. The rev attribute is the reverse of the REL attribute.
e.g. <link rev="value"> However, the support for this syntax has been seized with
HTML5.0
Dynamic HTML, or DHTML, is an umbrella term for a collection of technologies used
together to create interactive and animated web sites by using a combination of a static
markup (such as HTML), a client-side scripting language (such as JavaScript), a
presentation definition language (such as CSS), and the Document Object Model.
DHTML allows scripting languages to change variables in a web page's definition
language, which in turn affects the look and function of otherwise "static" HTML page
content, after the page has been fully loaded and during the viewing process. Thus the
dynamic characteristic of DHTML is the way it functions while a page is viewed, not in its
ability to generate a unique page with each page load.
By contrast, a dynamic web page is a broader concept, covering any web page
generated differently for each user, load occurrence, or specific variable values. This
includes pages created by client-side scripting, and ones created by server-side
scripting (such as PHP, Perl, JSP or ASP.NET) where the web server generates content
before sending it to the client.
DCL412 Q4:
Why do people go in for websites? Build a website of your choice following the
elements of good website.
Website marks our presence on the internet who ever we are whether a company or an
individual. It is the address we need to have to let the million other finders. Like any other
identity cards, website address is our identity on the net. Any information that we wish to
spread over a wide area, economically, could be done through our website. Just put in
the site in an organized way. The benefits of website include, cost advantages, time
advantage, & Personal reach & also feedback we can get. A recent survey on internet
usage statistics, suggests internet has become a means in our daily lives. So many
business websites skimp on valuable information and just list products or services as
though that is enough. Business owners often feel like their sales pitch should be
sufficient to lure in a customer. However if we asked anyone else they would probably
give us a list of other top reasons they use the internet such as,
staying updated on news
connecting with friends
killing time
research
be entertained
And the study shows that is exactly the case. Sadly, killing time ranks as the #1 reason to
go online, which also means millions of people being present online. Well, this was
followed closely by educating yourself, connecting with others and research. This
particular context entrusts significance of individual presence online and increasing online
community means a medium for more opportunities and connecting with more people
and what not! The internet is growing rapidly, in 1993 it was just 130 WWW addresses in
High level Requirements: The Home page should reflect the following structure,
o A public web site portraying services offered for client in IS & law
advisory. The web site should cover following components
About us (displays),
Leadership
Management
Key Pointers
Services Offered (displays),
Security and GRC Advisory Services
Cyber Law and Regulatory Advisory
Forensics Research and Support
Contact Us (displays),
Locations, Addresses, and contact details
Request Contact
This site will be targeting all those audience individual or corporate looking to get services
from the independent service advisory group and personnel.
Home.html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="en-us" http-equiv="Content-Language" />
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>ashvin</title>
<a href="AboutUs.html">ABOUT
US</a>
<a
href="Services.html">SERVICES</a>
<a href="ContactUs.html">CONTACT US</a></head>
<body style="background-color: #FFFFCC">
<br /><hr />
<p> Ashvin is passionate to drive Audits, Advisory and Process Re-Engineering initiatives and help
individuals to imbibe value-based and holistic approach for achieving Excellence in Security and GRC
Practices. Look to leverage Leadership and drive Key GRC Initiatives to accelerate business growth and
gain competitive edge. </p>
<hr />
<iframe name="Iframe1" style="width: 1067px" src="homeText.htm">
This page doesnot support inframes
</iframe><hr />
<p>Honored for Asia-Pacific Information Security Leadership Achievement in 2011, by (ISC) 2 for
contribution towards global Information Security Workforce.</p>
Successfully Grand-fathered to C|CISO in 2014, given by EC-Council USA.
</body>
</html>
HomeText.html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>Home</title>
</head>
<body>
<p>A Governance, Risks, Compliance (GRC) and Security Executive with proven ability to Lead
Programs in Global Assurance and Advisory Engagements. .Strong Partnering skills and keen insight to
Drive Practice(s) and Key GRC Initiative(s) to facilitate Corporate Growth, Excellence through various
Process-Technology-Business alignment. 12+ years of progressive experience in implementing Effective
Governance and Well-Defined, Right-Sized Risk based Solutions through Profit-Oriented approach.
Global Enterprise Security, Compliance, Data-center and Business Transformation Experience. Managed
role of an Advisory CISO and have Led Asias largest Tier4 Datacenter client; Exposure in handling
clients in India, EMEA, USA and Asian regions.
Ashvin and team help our customers bring the best of GRC parctices across our
clientele.</p>
</body>
Aboutus.html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="en-us" http-equiv="Content-Language" />
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>About Us</title>
ABOUT US
DCL412 Q5:
&
What does a webnbsp;
server do? How does it work? How do you choose a web server
platform?
<a href="ContactUs.html">CONTACT
US</a>
<a
A web server is a href="Services.html">SERVICES</a>
server used to communicate with Web Browsers as its clients and the
<a href="Home.html">HOME</a></head>
communication protocol
used in this case is HTTP (Hyper Text Transfer Protocol). This is
why a Web Server</head>
is also called an HTTP Server.
<body>
<body style="background-color:
#FFFFCC">
HTTP a stateless request-response
based communication
protocol. It's used to send and
<br /><hr />
<iframe name="Iframe1" style="width: 1067px" src="aboutText.html">
<p> About Ashvin and Team </p>
<hr /></iframe>
<hr />
</body>
</html>
Services.html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="en-us" http-equiv="Content-Language" />
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>Services</title>
SERVICES
DCL412 Q5:
What does a web<a
server
do? How does it work? How do you choose a web server
href="ContactUs.html">CONTACT
platform?
US</a>  
<a
href="Services.html">SERVICES</a>
A web server is a
server used to communicate with Web Browsers as its clients and the
<a href="Home.html">HOME</a></head>
communication protocol
used in this case is HTTP (Hyper Text Transfer Protocol). This is
why a Web Server</head>
is also called an HTTP Server.
<body>
<body style="background-color:
#FFFFCC">
HTTP a stateless request-response
based communication
protocol. It's used to send and
<br /><hr />
<iframe name="Iframe1" style="width: 1067px" src="servicesText.html">
<p> About Ashvin and Team </p>
ServicesText.html<hr /></iframe><hr />
</body>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
</html>
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>serviceText</title>
</head>
<body><ul>
<li>IT Infrastructure Audits and Support</li>
<li> Risk Advisroy and GRC Solutions</li>
<li>Continual Compliance Support Services</li>
<li>Forensics Research and Support</li>
<li>Security Operations and Outsourcing </li>
</ul></body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
ContactUs.html <html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type" />
<title>ContactUs</title>
CONTACT
US
<a href="AboutUs.html">ABOUT
US</a>  
<a href="Services.html">SERVICES</a>
DCL412 Q5:
<a href="Home.html">HOME</a></head>
</head>
<body>
<body style="background-color: #FFFFCC">
<br /><hr /> <iframe name="Iframe1" style="width: 1067px" src="contactText.html">
<p> About Ashvin and Team </p><hr /></iframe><hr />
</body>
</html>
DCL412 Q5:
What does a web server do? How does it work? How do you choose a web server
platform?
A Web server is a system that delivers content or services to end users over the Internet.
A Web server consists of a physical server, server operating system (OS) and software
used to facilitate HTTP communication. A Web server is also known as an Internet server.
Web server handles the HTTP protocol. When the Web server receives an HTTP request,
it responds with an HTTP response, such as sending back an HTML page. To process a
request, a Web server may respond with a static HTML page or image, send a redirect,
or delegate the dynamic response generation to some other program such as CGI
scripts, JSPs (Java Server Pages), servlets, ASPs (Active Server Pages), server-side
JavaScript, or some other server-side technology. Whatever their purpose, such serverside programs generate a response, most often in HTML, for viewing in a Web browser.
Depending on context, the term can refer to the hardware or Web server software on the
server. In terms of software, there have been literally hundreds of Web servers over the
years, but Apache and Microsoft's IIS have emerged as two of the most popular systems.
The term web server, can refer to either the hardware (the computer) or the software (the
computer application) that helps to deliver web content that can be accessed through the
Internet. Understand that a Web server's delegation model is fairly simple. When a
request comes into the Web server, the Web server simply passes the request to the
program best able to handle it. The Web server doesn't provide any functionality beyond
simply providing an environment in which the server-side program can execute and pass
Unfortunately, these goals are not totally compatible. For example, a simple web server
could follow the logic below,
Accept connection
Generate static or dynamic content and return to browser
Close connection
Accept connection Back to start
How to choose the Web Server Platform:
Though this works for simple web sites, the server would start encountering problems as
soon as clients started hitting the site in numbers, or if a dynamic page takes long time to
generate. Although this model works, it would need to be re-designed to serve more
users than just few at a time. Web servers tend to take advantage of two different ways of
handling this concurrency; multi-threading and multi-processing. Early web servers used
inetd to spawn a web server process that could handle each web browser request. They
were fairly simple applications, and there was no expectation of than having to cope with
high number of hits, so this was a totally reasonable design decision to make at the time.
The easiest way to write a server applications for unix system that need to handle
multiple connections is to take advantage of the field domain, which manages all needed
TCP/IP communication.
Using this method also makes administration of the machine easier. On most UNIX
machines, inetd is rule by default, and is a very stable process. Web servers on the other
hand, are more complex proglains and can be prone to crashing or dying unexpectedly. It
also means that administrator doesnt have to worry about starting and stopping the web
server; as long as inetd is running. It will be automatically run each time an HTTP request
is received on the given port. On the downside, having a web server process run for each
HTTP request is expensive on the web host, and is completely impractical for modern
popular web sites. These days, most web sites run a Web server that supports either
multi-processing or multi-threading, and are thus able to handle a much higher loan. Web
server is chosen based on the loads it handles, type of applications and business
requirements.
DCL412 Q6:
"The potential of world wide web (WWW) on the internet has led to an explosion in
Commercial activity". Discuss
The World-Wide Web is a collection of documents and services, distributed across the
Internet and linked together by hypertext links. The web is therefore a subset of the
Internet, not the same thing.
The potential of the World Wide Web on the Internet as a commercial medium and
market has been widely documented in a variety of media. However, a critical
examination of its commercial development has received little attention. First, we explore
the role of the Web as a distribution channel and a medium for marketing
communications. Second, we examine the factors that have led to the development of the
Web as a commercial medium, evaluating the benefits it provides to both consumers and
firms and its attractive size and demographic characteristics. Third, we discuss the
barriers to commercial growth of the Web from both the supply and demand side
perspectives. This analysis leads to a new classification of commercialization efforts that
categorizes commercial Web sites into six distinct types including 1) Online Storefront,
2)Internet Presence, 3)Content, 4)Mall, 5)Incentive Site, and, 6)Search Agent. The first
three comprise the Integrated Destination Site," and the latter three represent forms of
"Web Traffic Control." Let us discuss in the context of integrated marketing, facilitates
Figure 1
Figure 2
The Internet, a revolution in distributed computing and interactive multimedia many-tomany communication, is dramatically altering this traditional view of communication
media. As Figure 2indicates, the new many-to-many marketing communications model
defining the Web offers a radical departure from traditional marketing environments
(Hoffman & Novak, 1995). From a business and marketing perspective, the most exciting
developments are occurring on that portion of the Internet known as the World Wide
Web.
Business houses observed following benefits as result of WWW potential,
Reduced costs and Better Quality
Wider business coverage and reduced time of communication
Access to huge information and Enhanced Decision Making
Efficient handling potential for Demand and Supply chain
Revolutionized Distribution and Marketing using web as a channel
Reduced errors, time, and overhead costs in information processing
Buyer/End Consumer also started enjoying following benefits as result of WWW potential,
Availability of searchable and precise information
Reduced uncertainty in purchase decision
Wider options and reduced spends
Ease of access
The statistic shows the trend in the global number of internet hosts in the domain name
system from 1993 to 2014. In January 2014, approximately 1 billion internet hosts were
available on the DNS, almost double the amount of five years prior to that compared to
6.64 million hosts in 1995
Thought the trend also observed few barriers listed below, WWW growth and internet has
not stopped growing into the lives of people and continues to grow globally in complexity
commercial usage and day to day necessity through its ease of access & plethora of
benefits in todays world. Here are few barriers that continues to float around the context,
Concerns over security of information stored and transmitted over internet
Uncertainty of usage of information by the kind, type or state of people
Rapid advancements in technology and challenges involved in its usage
Modes and means of competition and risks questioning the viability
No or limited control over public information, etc.
Still the internet and WWW continues to grow with huge business and commercial
activities happening around the world with few of them being listed below,
Cloud technologies Infrastructure/Software/Product/Security as a Service
E-commerce online Ads/ classified, e-shopping sites, e-Marts, Banking, etc.
Hosting/Development Application Development, Mail, Web hosting, ERP, etc
The inter active nature of the Web is especially conducive to relationship building and
offers marketers new opportunities to create stronger brand identities which have the
potential to translate to brand loyalty (Upshaw, 1995). Research efforts should be
especially concentrated at developing integrated marketing approaches that specify the
ways in which these different elements can be combined for maximum advantage. The
Internet, especially that portion known as the World Wide Web, has the potential to
change radically the way businesses interact with their customers. The Web frees
customers from their traditionally passive role as receivers of marketing communications,
gives them much greater control over the information search and acquisition process,
and allows them to become active participants in the marketing process. However,
significant adoption barriers to commercialization preclude predictable and smooth
development of commercial opportunities in this emerging medium. Commercial
development of the Web must follow the demand ("demand pull"), instead of being driven
by "gold fever." Firms have and will reap the benefits of innovation in interactivity by being
closer to the customer than ever.
DCL412 Q7:
Discuss the uses of internet activity?
We will focus on three classes of Internet activity. The first is that of electronic
communications - the use of the networks for person-to-person communications as an
alternative to the traditional services. The second class is that of electronic publishing using the networks as an alternative or supplement to traditional publishing methods. The
third is that of hybrid uses that combine elements of both electronic communications and
electronic publications.
1. Electronic communications
The Internet provides an alternative means of person-to-person communication to the
telephone, fax, telex and postal services. Interestingly, the power of electronic mail,
known as 'email' (Suarez 1994, section 2), lies in its plasticity. The technology can be
moulded and shaped in such a way as to provide the benefits of any or all the traditional
services mentioned above.
Email can be set up to provide instantaneous, 'real-time' communication, known as
'Internet Relay Chat' or 'IRC'. Equally, it can be sent out of hours or whilst the recipient is
away and then stored in an electronic mailbox until accessed by that recipient. Email can
take the form of no more than a textual message or can be used as a vehicle to which to
'attach' or enclose files containing processible documents, diagrams, graphics,
photographs, sounds, video and software. The email message itself is capable of being
conveyed as sound instead of text and, in this situation, is known as 'voice mail'. Voice
mail itself can be combined with moving images of the correspondents to produce video
communications.
How does email manifest itself?
At the simplest level, it takes the form of one-to- one communication. One individual
sends a message to another, who may then reply. At the second level, email may be
distributed on a one-to-many basis. It is possible manually to address an identical or very
similar message to a number of recipients at the same time.
Neither staff nor students are to be in a particular location at any particular time;
Tutorials and seminars do not have to be squeezed into one short, timetabled slot.
Discussion can take place over a period of time in a more relaxed and considered
way;
Where text is the primary or sole method of communication, students will get practice
in composing their views in written form; and
Let us turn, now, to electronic publishing (O'Donnell 1994). Twenty-four hour access to
primary and secondary sources based on campus can be offered in order to help
alleviate the pressures caused by large numbers of students squeezing into law libraries
designed for smaller numbers and all attempting to get hold of the same required or
recommended reading at the same time.
USAGE OF INTERNET IN ADMINISTRATION
Following are the points of advantageous usage of internet with law offices,
Enhanced Public Relations and Marketing Organizations with websites
providing necessary first means of contact, timely/online customer relationship
management, Publishing and Communications to clients via internet. E.g. British
law firms, Law firm publically accessible in USA (Cornell Law School 1995b).
It is likely that some law offices will develop EFT links with their major clients.
Periodic billing can be generated automatically by a law firm's accounts system
and then communicated electronically to the client. The client will then be able to
authorize the appropriate credit transfer to be made by its bank to the law firm.
Online availability of supplies. Suppliers such as Hammicks bookshop offer
hybrid systems which take the form of on-line catalogues coupled with an email
link enabling customers to order items via Internet (Legal Information Network
1994)
In legal education, development of home pages on the Internet provides a new
and exciting forum in which law schools can advertise and would-be students can
'shop' for suitable courses. We are also seeing a rise in online universities.
Automating the student admission processes evades the soul-destroying task of
wading through thousands of application forms trying to identify the very able
from amongst the able - the highly suitable from amongst the suitable to reduce
all the involved paperwork. More quick and ease of sorting and selection is
enabled.
Enabling online connect with potential employers online and available online
references which are sought to help students who apply for vacation placements.
CONCLUSION
Just as frequently, futurists forecast developments that stubbornly refuse to happen.
Three striking examples of the latter category are: (i) the wholesale dematerialization of
paper-based information resulting in the evolution of the 'paperless office'; (ii) the
widespread move towards on-line shopping and banking; and (iii) the universal exodus
from the traditional education establishment and workplace in favour of tele studying and
teleworking. At this moment, however, a new generation is growing up for whom the
screen is as natural a medium as the page. This and later generations may well be as
comfortable in the electronic world as they will be in the physical world. For a long time,
the technologies that are essential to the development of the Internet - one of the key
components of cyberspace - were slow, unreliable and insecure. In some respects, they
still are (Millard & Carolina 1995). Just from being a hobby, we are seeing all this change
before our eyes. Indeed, the rate of both technological and cultural change is increasing
so fast that there is some risk of it creating a blur in our minds. At this point, it then
becomes essential for us to refocus our understanding to ensure not only that we keep
control of our technology but also that we can exploit its potential for the utmost benefit.
DCL412 Q9:
Define networking. Highlights the issues of Network security.
Application
Presentation
Session
Transport
Network
Data Link
DCL412 Q10:
"Security is a term with both business meaning and technical meaning". Discuss
the statement in terms of security basics?
Security is term with both a business meaning and a technical meaning. In this paper we
will discuss the issue on both levels, and discuss the relationship between technology
and business process where appropriate. Security depends, however, on more than just
technology. It depends on the proper administration of systems, client and server, as well
as the faithful obsenance of related business procedures, physical access controls, and
audit functions.
As business matter, security usually means;
Legitimate use
Confidentiality
Data integrity
Auditability
Looking at each of these, legitimate use requires the authentication of users. It requires
granular controls over which users can access what data, and execute which programs.
Confidentiality implies that a system will provide appropriate services, such as data
encryption, to ensure that only authorized personnel can see sensitive data. Data
integrity requires a robust file system, and ways for files or databases hosted on the
operating system to recover from system, application and network faults and failures,
Auditability requires that systems have the ability to log a wide variety of events for
review, that these log files are themselves secure and that actions (alerts) can be
triggered by certain events which may indicate that a system, account or application is
under attack.
SECURITY IS NOT ABSOLUTE
There is not one standards that will fill all business and industries. National defense
applications, or funds transfer in a financial institution, will require a more secure system
than order entry in small business, for example. While Windows NT server provides a
wide range of features and settings, individual enterprises and government accounts will
need to carefully assess their security needs and make appropriate security decisions
about standards and/ or optional security products.
CORPORATE I.T OBJECTIVES
The general requirements of information Technology necessary for a corporation to
effectively meet its business objectives may be stated as the corporate IT objectives. By
varying the degree of emphasis it places on each of these requirements adding ifs user
needs and regulatory requirements, a corporation can tailor the following general IT
objectives in to its own unique corporate IT objectives. Once formulated_ technology
systems strategy. General components of these objectives are described in below table,
Effectiveness: Deals with information being relevant and pertinent to the business
process as well as being delivered in a timely, correct, consistent and usable manner.
System level access control: Access to the computer system programs and data
should be appropriately restricted.
Application level access controls: access to particular functions within applications
should be appropriately restricted to ensure segregation of duties and prevent
unauthorized activity.
Sensitive facilities: Use of sensitive facilities, such as master passwords, powerful
utilities, and system manager facilities, should be adequately controlled.
Physical access: Physical access to computer facilities and data should be
appropriately restricted.
External network connections: External network connections should be used for valid
business connections purpose only and controls should be in place to prevent these
connections from undermining system security.