Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore MIS Electronic Flip Book

MIS Electronic Flip Book

Published by marpsp.ebook, 2020-12-11 06:00:06

Description: MIS Electronic Flip Book

Keywords: Management Information System,DPB20043

Search

Read the Text Version

Software • Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work















Communications network • A Communications network is a group of nodes interconnected by links that are used to exchange messages between the nodes.

















Campus Area Network (CAN) • A campus network, campus area network, corporate area network or CAN is a computer network made up of an interconnection of local area networks within a limited geographical area.





















• The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.



World Wide Web • The World Wide Web, commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the Internet.

World Wide Web • The development of the World Wide Web was begun in 1989 by Tim Berner-Lee and his colleagues at CERN, an international scientific organization based in Geneva, Switzerland. They created a protocol, HyperText Transfer Protocol (HTTP), which standardized communication between servers and clients. Their text-based Web browser was made available for general release in January 1992.





Malicious software • Programs exploiting system vulnerabilities • Known as malicious software or malware • program fragments that need a host program • e.g. viruses, logic bombs, and backdoors • independent self-contained programs • e.g. worms, bots • replicating or not • Sophisticated threat to computer systems

Virus • A computer virus is a type of malicious software that once activated, will replicate itself from folder to folder, inserting its own code. • A virus can spread rapidly and will usually infect a system with the intention of stealing personal and financial information, sending spam or locking the system down.

Worm • A worm is very similar to a virus in that it replicates itself within a system but unlike a virus, it doesn’t spread to other programs. • Once installed, the worm silently goes to work and infects the machine without the user’s knowledge. • Worms can replicate themselves hundreds of times over, depleting system resources and damaging devices.

Trojan • A Trojan is a type of malware that disguises itself as legitimate software but really serves a malicious purpose. • A Trojan may claim to be a free update, game, or an anti-virus program, tricking the user into installing it onto their device. • Once installed, the Trojan works quietly in the background to steal sensitive data, install a backdoor or take other harmful actions.

Spyware • Spyware is a type of software that installs itself on a device and secretly monitors a victim’s online activity. • It collects all sorts of data, including passwords, credit card numbers and browsing activity.





Malicious software • Virus: attaches itself to a program • Worm: propagates copies of itself to other computers • Trojan horse: fakes/contains additional functionality Trojan horse looks like a useful tool but contains hidden code • Spyware : A program that is placed on a computer without a user’s knowledge and secretly collects information about the user.

Computer Crime Hackers • He or she is a person who enjoys the challenge of breaking into computers without the knowledge of the user. • Their main aim might be to know the detail of programmable system and how it works.

Spoofing and sniffing • Spoofing is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Spoofing is most prevalent in communication mechanisms that lack a high level of security.

Sniffing • Sniffing is a data interception technology. Sniffer is a program that monitor or reading all network traffic passing in and out over a network. • Telnet, Relogin, FTP, NNTP, SMTP, HTTP, IMAP that all protocol are vulnerable for sniffing because it send data and password in clear text. • Sniffing can be use both the ways legally or illegally like for monitor network traffic, network security and for stealing information like password, files from the network.

denial of service attack • A denial of service attack, or Dos attack is an assault on a computer whose purpose is to disrupt access to the web. Malicious hackers carry out a DoS attack in a variety of ways.

Identity Theft • Pretending to be someone you are not. Using another person’s name and personal information in order to obtain credit, loans, etc.

Click Fraud • Is a type of fraud that occurs on the internet pay-per- click online advertising. It’s can manipulating data such as changing banking records to transfer money to an account.

Information Resources Control a. Authentication b. Firewalls c. Intrusion detection system d. Antivirus and antispyware software e. Unified threat management system

Authentication The process of identifying an individual, usually based on a username and password.


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook