ICT
Puneet Sharma(Tel & IT- 11)
Ranjit Singh(Tel & IT- 13)
1
Contents
ICT’s
Development
Requirements
Procedures
Processes
Architecture
Management
Security
2
Mobile Phone
3
4
Various cell phones from the past 10–15 years.
Legend:
1. NEC Cellstar 500 series (1992)
2. Nokia 2110 series (1994)
3. Nokia 5120 (1998)
4. Kyocera 2135 (2002)
5. Audiovox CDM8300 (2002)
6. Samsung SCH-A650 (2004)
5
History
In 1945, the zero generation (0G - radio telephone) of mobile telephones was
introduced. 0G mobile telephones were not officially categorized as mobile
phones, since they did not support the automatic change of channel frequency
during calls, which allows the user to move from one cell (the base station
coverage area) to another cell, a feature called "handover".
The first commercial cellular network was launched in Japan by NTT in 1979. Fully
automatic cellular networks were first introduced in the early 1980s (the 1G
generation) with the Nordic Mobile Telephone (NMT) system in 1981. This was
followed by a boom in mobile telephone usage, particularly in Northern Europe.
1G (or 1-G) is short for first-generation wireless telephone technology,
cellphones. These are the analog cellphonestandards. 1G networks use the
radio (analog ) signals.
6
Iphones
The iPhone is a multimedia,
Internet-enabled mobile phone
designed and marketed by
Apple Inc. It has a multi-touch
screen with virtual keyboard
and buttons. The iPhone's
functions include those of a
camera phone and a portable
media player ("iPod"), in
addition to text messaging and
visual voicemail. It also offers
Internet services including e-
mail, web browsing. It is a
mobile phone that uses the
GSM
The iPhone was introduced, first
in the United States on June
29, 2007
7
Requirements of ICT
The main functional requirements for ICT
infrastructure in ECE Services are:
All ICT equipment, software, systems and services are for official use only.
Use of information from university applications and databases for personal or non-University
purposes is strictly prohibited.
Users are responsible for the security and confidentiality of the data and information which they get
access to.
All Kulliyyahs/Centres/Divisions should manage and record all ICT equipment through the Inventory
System.
Users are liable for any case of loss, damage and theft due to improper use and negligence on all
ICT equipment.
Users are not allowed to access any restricted areas without permission (e.g. LAN rooms and IIUM
Data Centre).
12
ITD SERVICE DESK
password.
ii. Account will be used for printing, storage and email
services.
Printing
i. Students may use the centralized printing system subject
15
Centralized storage
i. Students are allocated 80 MB of storage.
http://webmail.stud.iiu.edu.my
16
ICT process
17
Communication
A chain
network e.g
formal
contact
18
Communication
A circle network e.g.
between people at
the same level
19
Communication
A wheel network
e.g. sales teams
report to head
office
20
Communication
An all-channel
network e.g.
brainstorming
21
Examples of ICT Use
Mobile telephones
Video and tele-conferencing
Lap-top computers
E-mail
Multi-media communications
22
ICT Architecture
23
W h a t m a n a g e rs w a n t
fro m IC T ?
A cce ss a n y in fo rm a tio n
w h e re e ve r
a n d w h e n e ve r n e ce ssa ry
Fa st a lig n m e n t to
ch a n g e s in th e
b u sin e ss
A ccu ra te a n d
co n siste n t
in fo rm a tio n
C o n tro lla b le
Q oS at
m a n a g e a b le
co sts 24
How does an Architecture
help:
Information Architecture
Application Architecture
Infrastructure Architecture
25
How does an Architecture
help:
fast alignment to business
changes
Architecture as an interface between business <-
> ICT
Functional changes -> reuse of information and
applications
capacity upscaling -> scaling of applications and
infrastructure (insight in performance of
components)
continuity upscaling -> upscaling applications
and infrastructure (insight in continuity
components)
26
help:
fast alignment to business
changes
Complements business plan
Short term developments in long term
perspective
Documentation/ understanding business
decisions
Integration of old and new
Co-operation management\application
building\systems dept.
Help with mergers, new services, acquisitions,
etc.
Insight despite limited view non-specialists
Focus on strategic deployment of technology 27
How does an Architecture
help:
Controllable QoS at manageable costs
Insight in costs per component
pro-active performance management
focus on key technologies
common terminology
help for joiners/stayer
guideline for centralisation versus distribution
28
ICT TRENDS IN INDIA
Information and Communication Technology (ICT) is changing the face
of
contemporary World. The ICT has not only connected the World at one
single
platform but it is also helping in the integration of various traditional
societies
into modern societies. The mandates of globalisation also require an
interaction
between Indian economy and World’s economy. Globalisation is closely
related to
ICT and the ICT strategy of a nation is very crucial to put it on a global
map. The
ICT strategy in India must be techno-legal in nature rather than purely
legal or
purely technological. Unfortunately, Indian ICT Strategy is not upto the
mark and
the same is further degraded with the introduction of the proposed
covers cyber
forensics, computer and cyber security, etc.
(b) The cyber law in India also imposes certain restrictions and their
violations
may take the form of offences and contraventions. Cyber crimes in
also
mandates adherence to certain compliance requirements. These
aspects must be
kept in mind by Companies, Individual and even by the Government.
requirement in
India. The same is missing for the time being.
30
(d) There is also a dire need of judicial reforms in India keeping in mind
the
requirements of ICT.
step towards
implementing the judicial reforms in India in an effective manner.
(f) The electronic era has its own challenges that must be tackled
effectively.
(g) The introduction of wireless technology in India would require its
own
security requirements. Thus, the wireless security in India must be
considered on
a priority basis.
(h) There are legal risks of electronic commerce as well that also
cannot be
ignored.
sound
31
e-commerce platform can be established in India.
(j) At the same time the ICT strategy in India must be “reformulated”
so that it is
conducive for the overall development of Indian economy.
purposes in
India.
legal KPO
and legal BPO.
(m) The proposed amendments of the cyber law of India, i.e. IT Act,
2000 must
be made public and transparent. The IT Act, 2000 must be amended
properly and
the proposed amendments to the IT Act, 2000, as originally suggested
by the
Expert Committee, must be rejected at all costs. If some changes have
been made
in the original recommendations of the Expert Committee, they must
be discussed 32
ICT Management
Managing Information Communication Technology (ICT) will
enable organisations to get more out of their current
equipment and also to make better decisions around the
purchase of new equipment and ICT developments.
Small organisations with one computer still need to manage
their ICT as it is likely to be used for important tasks, such
as:
writing documents more efficiently
managing accounting and budgeting so that you have better
information about your financial situation
recording contact with clients more accurately and in more
detail
improving communications within the organisation and with
others.
Larger organisation may use ICT to carry out increasingly
complex functions which may include complicated software
solutions and hardware set-up.
33
organisations recognise the need to manage
their premises, accounting and other office
equipment, it is essential that managing ICT
is recognised as fundamental to the
development of the organisation.
Careful management of ICT will not only help
organisations meet their aims and objectives,
it will also prevent organisations making
possibly expensive mistakes.
34
Budgeting and finance
36
Basic Security Services
Privacy / Confidentiality:
To know that no 3rd party can read a
message exchanged between 2
people
Authentication:
To know that someone is who he/she
says he/she is
Integrity:
To know that a message has not been
modified in transit
Non-repudiation:
To know that someone is not able to
deny later that she/he sent a
message
37
Security Applications
The security services that can be used:
Digital Signature
Anonymous e-cash
Certified e-mail
Secure elections
Simultaneous contract signing
38
Non-trivial Insights
Technology alone can not fix security
problems – Technology is necessary
but not sufficient
Security is everyone’s business, not just
the business of security experts
Security decisions must be taken by
Management, not by technical staff
Security is risk management – the art to
worry about the right things
39
Cryptography- the Beauty of
Mathematics
Cryptographic algorithms are “building
blocks” to construct secure system
Dramatic advances in cryptography in the
last 30 years:
Public Key Cryptography (1976)
Microprocessor: cheap computing power
Quantum cryptography (future)
40
Secret Key Encryption
Plain text Plain text
encrypt message with decrypt message with
secret key same secret key
cipher text
41
Public Key Encryption
Plain text Plain text
encrypt message with decrypt message with
public (!) key of receiver (!) private key of
receiver
cipher
text
Each participant has
A private key that is shared with no one else,
plus
A public key known to everyone
Problem: slower than Secret Key Encryption
Best-known example: RSA
42
Biometrics: your Body – your
Password?
Recognize a person upon physiological or
behavioral characteristics
Fingerprint
Face
Voice
Iris
Currently costs outweigh benefits
43
The Need for International
Security Standards
Technical standards should be
international:
Ensures interoperability - the whole
point of most of the standards
Economies of scale
Best practice standards would be very
helpful to be international
Raises awareness
Regulatory issues & law enforcement is a
national (or regional, e.g. European
Union) matter
44
Corporate ICT
Security Policy
45
Corporate ICT Security
Policy
The role of the above policy is to lay down company
procedures, guidelines and practices necessary to keep
the hardware, software and data safe from theft, misuse
and unauthorised access. This ensures there is a central
document of ICT security standards that managers and
ICT personnel can refer to when making decisions about
ICT related matters.
46
Company Procedures within
the Corporate IS Security Policy
Prevention & detection of misuse procedures go hand in hand:
47
Code of Practice
Factors to consider:
Employees need to sign this policy before they can use the 48
Thank You
49