Information and communications technology or information and communication technology:
ICT is often used as an extended for information technology but is usually more general term that stresses the role of unified communications and the integration of telecommunications.
Intelligent building management systems and audio-visual systems in modern information technology.
ICT consists of all technical means used to handle information and aid communication,including computer and network hardware,communication as well as necessary software.
ICT also consists of IT as well as telephony, broadcast media,all types of audio and video processing
and transmission and network based control and monitoring functions.
ICT is often used in the context of "ICT roadmap" to indicate the path that an organization will take their ICT needs.The term ICT is now also used to refer to the merging (convergence) of audio- visual and telephone networks with computer networks through a single cabling,or link system.There are large economic incentives to merge the audio-visual, building management and telephone network system using a single unified system of cabling,signal distribution and management.This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems.ICT covers any products that will store,retrieve,manipulate,transmit or receive information electronically in a digital form.
ICT is often categorised into two broadtypes of product:
1.The traditional computer-based technologies - things you can typically do on a personal computer.
2.Digital communication technologies- which allow people and organizations to communicate and share information digitally.
Traditional Computer Based Technologies:
The C is part of ICT refers to the communication of data by electronic means,usually over some distance.This is often achieve via networks of sending and receiving equipment,wires and satellites links.
ICT in a Broader Context:
The nature of information-This covers topics such as the meaning and value of information .
Management of information-This covers how data is captured,verified and stored for effective use; the manipulation,processing and distribution of information;keeping information secure designing networks to share information.
Information systems strategy -This considers how ICT can be used within a business or organization as part of achieving goals and objectives.
is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. ICTs are often spoken of in a particular context, such as ICTs in education, health care, or libraries.
The importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations. Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only serve to exacerbate the already-existing economic gap between technological "have" and "have not" areas.
Information Communications Technology/Technologies (ICT) is an umbrella term that encompasses any communication source, device, or application that allows for participation in a world in where all activities are constantly transformed by access to various developing technologies. ICT has impacted the world socially and economically. It has facilitated the ease of communication by allowing life to be lived through emails, video conferencing, and cellular phone technology twenty-four hours of the day. ICT’s have become a crucial part of integrating developing areas into the global economy. However, some consider it detrimental, as people are replaced in the workforce by the developing technologies.
IT104doraengene isidoro
Ahm, im friendly....
Wednesday, February 9, 2011
Sunday, December 12, 2010
assignment 1.
1.Why has there been a dramatic increase in the number of computer related security incidents in recent years?
The number of computers increase in recent years because in today's generation many people uses computers..
And many children spend a lot of time to use computers in their homes..And many people spend a lot of time to use computers in their office.
2.What are some characteristics of common computer criminals including their objectives?
Breaches of Physical Security
Breaches of Personnel Security
Breaches of Communications and Data Security
Breaches of Operations Security
Ways of Detecting Common Attack
Computer crimes range from the catastrophic to the merely annoying. A case of computer-driven espionage might wreak devastating losses to national security. A case of commercial computer theft might drive a company out of business. A cracker's prank might not actually cause damage at all--but might cause a video game company or another computer user some annoyance. Some computer crimes are perpetrated for kicks, and some for social or political causes; others are the serious business of professional criminals. There is perhaps no other form of crime that cuts so broadly across the types of criminals and the severity of their offenses.
3.What actions must be taken in response to a security incidents?
If there is an incident and it’s identified as an attack, there are several things that can be done. The worst of course is the “lets close our eyes and maybe it will go away.” This happens more often than not. So with that said there are two ways to approach incident response: Reactive and Proactive. Either is better then nothing, but if you can set your organization up to incorporate both you have a plan that will carry you through the worst situation
The number of computers increase in recent years because in today's generation many people uses computers..
And many children spend a lot of time to use computers in their homes..And many people spend a lot of time to use computers in their office.
2.What are some characteristics of common computer criminals including their objectives?
Breaches of Physical Security
Breaches of Personnel Security
Breaches of Communications and Data Security
Breaches of Operations Security
Ways of Detecting Common Attack
Computer crimes range from the catastrophic to the merely annoying. A case of computer-driven espionage might wreak devastating losses to national security. A case of commercial computer theft might drive a company out of business. A cracker's prank might not actually cause damage at all--but might cause a video game company or another computer user some annoyance. Some computer crimes are perpetrated for kicks, and some for social or political causes; others are the serious business of professional criminals. There is perhaps no other form of crime that cuts so broadly across the types of criminals and the severity of their offenses.
3.What actions must be taken in response to a security incidents?
If there is an incident and it’s identified as an attack, there are several things that can be done. The worst of course is the “lets close our eyes and maybe it will go away.” This happens more often than not. So with that said there are two ways to approach incident response: Reactive and Proactive. Either is better then nothing, but if you can set your organization up to incorporate both you have a plan that will carry you through the worst situation
Assignment 2
Long term readers of this blog will know that I am keen on personal security from the computer perspective and also that I am keen on windows users installing personal firewalls. My friends will tell you how often my eyes roll when they ask me to fix their unprotected machines. First I guess, a definition of personal is required here. By this I simply mean it is a software based firewall that sits on the same machine it is intending to protect. So I’m not talking standalone stuff like Smooth wall or Fire starter (both *nix based and free) and neither am I talking about the big boys of Corporate security such as Checkpoint, Crisco Pixels, Cyberguards, well the list does go on.
Friday, December 10, 2010
IT104 Doraengene Isidoro.
firewall
(f+r´wâl) (n.) A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Subscribe to:
Posts (Atom)