Information Technology (IT) PDF

Summary

This document is a lecture on Information Technology (IT). It covers a range of topics, from defining computers to hardware components and security measures. The document seems to be from the Applied College of Imam Muhammad Ibn Saud Islamic University, and might be suitable for undergraduate students.

Full Transcript

‫)‪Information Technology (IT‬‬ ‫الكلية التطبيقية بجامعة اإلمام محمد بن سعود اإلسالمية‬ Information Technology (IT) What is Information Technology (IT)? IT is a term used to describe several things, the task of gathering data and processing it into information, the ability to spread...

‫)‪Information Technology (IT‬‬ ‫الكلية التطبيقية بجامعة اإلمام محمد بن سعود اإلسالمية‬ Information Technology (IT) What is Information Technology (IT)? IT is a term used to describe several things, the task of gathering data and processing it into information, the ability to spread information using technology. IT combines people with computing resources, software, data, and computer networks. IT personnel, sometimes referred to collectively as "IT," are those people whose job is to supply and support IT. These include computer engineers who design and build computer chips, computer scientists who write software for computers, and administrators who provide the IT infrastructure for organizations. What Will Your Role be in IT? IT personnel have two general roles: Administration. Support. An administrator is someone who is in charge of some portion of the IT infrastructure. There are a diversity of administrator roles, as shown in the following table. Administrator Roles in IT Define a Computer A computer is a piece of electronic equipment that is capable of running programs, interacting with a user (via input/output devices), and processing/storing data. These tasks are often referred to as the IPOS (input, processing, output, storage) cycle. A general purpose of a computer is the ability to run any program. Hardware Components What is Hardware? Hardware are the physical components which make up the computer system. Each item of hardware have their specific roles in a computer system. Hardware components can be either internal or external. Examples of Some Internal Hardware Devices Central Processing Unit (CPU) The CPU is the 'brain' of the computer. It is the device that carries out calculations to complete software instructions. Motherboard The motherboard is circuit board which is connects to main components of the computer system. Memory Any data or instructions that are to be processed by the CPU must be placed into main memory. Examples of Some Internal Hardware Devices Graphic Video Cards A graphics card is a device that attaches to the motherboard to enable the computer to process and display graphics. Sound Card A sound card is a device that attaches to the motherboard to enable the computer to input, process, and deliver sound. Internal Hard Disk A hard disk drive is a hardware device that's used to store information like software and files. The capacity of hard drive ranges from GB to Tera Bytes. Examples of Some External Hardware Devices Input Hardware Devices – Input data into a Computer. Examples: Mouse. Keyboard. Microphone. Output Hardware Devices - Outputs data from a computer. Examples: Monitor. Speakers. Printers. External Storage Devices - Provides external storage or backup solutions. Examples: External Hard Drive. The Main Components of Computer Systems The Central Processing Unit (CPU) is the 'brain' of the computer. It is where all the searching, sorting, calculating and decision making takes place. The speed of the CPU is measured in Gigahertz (GHz). A 1 GHz CPU can carry out 1 billion instructions per second! Main Memory Applications are installed in the Secondary Storage (Hard drive). Temporary data from Applications in use are held in the Main Memory. The CPU will first check the Cache for the required piece of the data so that it can be processed. If the data is not in the cache then the CPU will check the RAM and transfer data to the CPU. The Cache will then transfer the next piece of data from the RAM into Cache. The CPU will again check the Cache for the next piece of data. This time the CPU will be able to get the data from the Cache Memory. Main Memory Cache Cache is the fastest type of Memory. It is located between the processor and the RAM. Cache collects data from the RAM. Holds onto commonly used data. The Cache will automatically transfer the next set of data from the RAM into the Cache so that it can be processed by the CPU. RAM (Random Access Memory) RAM stands for Random Access Memory. RAM is the part of the computer that temporarily stores the instructions that the computer is running whilst the data is being processed by the CPU. RAM is volatile which means that when the computer is turned off all data is lost. ROM (Read Only Memory) ROM stands for Read Only Memory. ROM is a built in memory that can not be changed (Read Only). ROM normally holds the 'boot up' instructions to start the computer - without it the computer wouldn't know what to do when on button is switched on (e.g. the operating system will not start). ROM is non-volatile memory which means that memory is not lost when computer is turned off. Secondary or Backing Storage Backing storage is also known as secondary storage. Backing storage is non-volatile which means that data is not lost when computer is turned off. Backing storage is used to store data for a long time (data can be read from and written to). Users tend to make copies of original files on backing storage. What is Security? “The quality or state of being secure to be free from danger” A successful organization should have multiple layers of security in place: Physical security. Personal security. Operations security. Communications security. Network security. Information security. Layers of Security Physical security – To protect the physical items, objects, or areas of an organization from unauthorized access and misuse. Personal security – To protect the individual or group of individuals who are authorized to access the organization and its operations. Operations security – To protect the details of a particular operation or series of activities. Communications security – To protect an organization’s communications media, technology, and content. Network security – To protect networking components, connections, and contents. What is Information Security? The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information Necessary tools: policy, awareness, training, education, technology C.I.A. triangle Was standard based on confidentiality, integrity, and availability. CIA Triad Components of Information Security Security Professionals and the Organization Wide range of professionals required to support a diverse information security program. Senior management is key component. Additional administrative support and technical expertise are required to implement details of IS program. It takes a wide range of professionals to support a diverse information security program. To develop and execute specific security policies and procedures, additional administrative support and technical expertise is required. Senior Management Chief Information Officer (CIO): The senior technology officer, although other titles such as Vice President of Information, VP of Information Technology, and VP of Systems may be used. The CIO is primarily responsible for advising the Chief Executive Officer, President, or company owner on the strategic planning that affects the management of information in the organization. Chief Information Security Officer (CISO): The individual primarily responsible for the assessment, management, and implementation of securing the information in the organization. The CISO may also be referred to as the Manager for Security, the Security Administrator, or a similar title. Information Security Project Team A number of individuals who are experienced in one or more facets/sides of required technical and nontechnical areas: Champion. Team leader. Security policy developers. Risk assessment specialists. Security professionals. Systems administrators. End users. Information Security Project Team The champion: A senior executive who promotes the project and ensures its support, both financially and administratively, at the highest levels of the organization. The team leader: A project manager, who may be a departmental line manager or staff unit manager, who understands project management, personnel management, and information security technical requirements. Security policy developers: Individuals who understand the organizational culture, policies, and requirements for developing and implementing successful policies. Risk assessment specialists: People who understand financial risk assessment techniques, the value of organizational assets, and the security methods to be used. Security professionals: Dedicated, trained, and well-educated specialists in all aspects of information security from both technical and nontechnical standpoints. Systems administrators: People with the primary responsibility for administering the systems that house the information used by the organization. End users: Those whom the new system will most directly impact. Ideally, a selection of users from various departments, levels, and degrees of technical knowledge assist the team in focusing on the application of realistic controls applied in ways that do not disrupt the essential business activities they seek to safeguard.

Use Quizgecko on...
Browser
Browser