Anda di halaman 1dari 44

ICT - Development ,

Architecture
Management , Security
Puneet Sharma(Tel & IT- 11)
Ranjit Singh(Tel & IT- 13)
Mobile Phone

The mobile phone or cell phone is a long-range,


portable electronic device used for mobile


communication. In addition to the standard voice
function of a telephone, current mobile phones
can support many additional services such as
SMS for text messaging, email, packet switching
for access to the Internet, and MMS for sending
and receiving photos and video. Most current
mobile phones connect to a cellular network of
base stations (cell sites), which is in turn
interconnected to the public switched telephone
network (PSTN)
 Various cell phones from the past 10–15 years.
Legend:
1. NEC Cellstar 500 series (1992)
2. Nokia 2110 series (1994)
3. Nokia 5120 (1998)
4. Kyocera 2135 (2002)
5. Audiovox CDM8300 (2002)
6. Samsung SCH-A650 (2004)
History

 In 1945, the zero generation (0G - radio telephone) of mobile telephones was
introduced. 0G mobile telephones were not officially categorized as mobile
phones, since they did not support the automatic change of channel frequency
during calls, which allows the user to move from one cell (the base station
coverage area) to another cell, a feature called "handover".

 The first commercial cellular network was launched in Japan by NTT in 1979. Fully
automatic cellular networks were first introduced in the early 1980s (the 1G
generation) with the Nordic Mobile Telephone (NMT) system in 1981. This was
followed by a boom in mobile telephone usage, particularly in Northern Europe.
1G (or 1-G) is short for first-generation wireless telephone technology,
cellphones. These are the analog cellphonestandards. 1G networks use the
radio (analog ) signals.

 The first "modern" network technology on digital2G (second generation) cellular


technology was launched in 1991 in Finland on the GSM standard which also
marked the introduction of competition in mobile telecoms.
 A digital system is one that uses discrete values (often electrical voltages),
representing numbers or non-numeric symbols such as letters or icons, for input,
processing, transmission, storage, or display, rather than a continuous range of
values ( as in an analog system).

Iphones
 The iPhone is a multimedia,
Internet-enabled mobile phone
designed and marketed by
Apple Inc. It has a multi-touch
screen with virtual keyboard
and buttons. The iPhone's
functions include those of a
camera phone and a portable
media player ("iPod"), in
addition to text messaging and
visual voicemail. It also offers
Internet services including e-
mail, web browsing. It is a
mobile phone that uses the
GSM
 The iPhone was introduced, first
in the United States on June
29, 2007
Requirements of ICT
The main functional requirements for ICT
infrastructure in ECE Services are:

The ICT infrastructure will readily support the


applications children, educators, and
administrators want to use.
Access to the ICT infrastructure will be available
throughout the Service
The ICT infrastructure will be robust and reliable,
and always available, so that users can have
confidence in using it.
The ICT infrastructure will be sustainable.
Data will always be secured and the users always
protected.

Underlying Requirements

 The technical standards will specifically address factors which


will ensure:

 Reliability Unreliability compromises the learning


experience, frustrates the educator, and reduces
confidence and ultimately use of the facilities.
 Compatibility Compatible ICT technologies will be
deployed.  This includes equipment and services.
 Cost effectiveness The purchase cost of new ICT equipment
is only part of the total cost of ownership.  Expected life,
and support and maintenance costs will be factored into
the decision making process.
 Maintenance, user support, and sustainability Users
want to concentrate on educational and administration
activities, and not have to worry about maintaining the ICT
infrastructure.  Helpdesk and support services will be
available at a reasonable cost.

Specific Requirements

Service-wide access based on wired technology A


network that delivers multimedia services is required. 
Multimedia places heavy demands on the network
(e.g. streaming video which needs to be handled
intelligently). To meet these demands, wired networks
will continue to form the foundation of ECE networks
for the foreseeable future.
Wireless access Wireless access will be used to
complement access to the wired network 
Wireless network performance is inferior to wired
network performance.  While wireless technology will
provide the Service-wide and flexible access to the
network, image-intensive applications and services
place high bandwidth demands on a network which
can presently only be met by a wired infrastructure.

 Internet access Broadband internet access is an essential
element of the ECE ICT framework.  It will provide a tool for
better communication with families and a gateway for
parents to become more involved with the education of
their children.  Web-based information systems provide an
opportunity for a structured and managed learning
experience, extending a child’s interest, and adding an
extra dimension to their learning. 
Access to the internet enables educators to gather
resources relevant to the ECE sector, to open up new or
additional learning opportunities and access professional
development.
 Remote Access To facilitate authorised access to data from
outside the Service, VPN access may be necessary.  For
example, educators might want to access teaching
materials, children’s learning profiles, or administration
data.  In some cases, Services may want to offer parents
access to their child’s work and records.

Procedures

 All ICT equipment, software, systems and services are for official use only.


 Use of information from university applications and databases for personal or non-University
purposes is strictly prohibited.


 Users are responsible for the security and confidentiality of the data and information which they get
access to.


 All Kulliyyahs/Centres/Divisions should manage and record all ICT equipment through the Inventory
System.


 Users are liable for any case of loss, damage and theft due to improper use and negligence on all
ICT equipment.


 Users are not allowed to access any restricted areas without permission (e.g. LAN rooms and IIUM
Data Centre).


ITD SERVICE DESK

 All complaints, requests and enquiries on ICT services should be


forwarded to ITD Service Desk.

 Gombak Campus
 a. Telephone extension - 2222 / 5211
 b. Fax - 2221
 c. Email - servicedesk@iiu.edu.my
 Kuantan Campus
 a. Telephone extension - 6666
 b. Fax - NA
 c. Email - helpdeskktn@iiu.edu.my

2. Services offered are as follows:


 i. Computer repair and maintenance (for Centre/Division without
technicians)
 ii. Network request and complaint.
 iv. Email complaint.
 v. ICS related services.
 vi. Loan of ICT equipment.
 vii. Booking of ITD training laboratory.

 All requests should be recommended by
Dean/Director/Head of Department/IT Coordinator.

 All complaints related to the above services should be
forwarded to ITD Service Desk.

 All services provided are in accordance to ITD client
charter.


Account
i. Matric number will be used as username and PIN as

password.
ii. Account will be used for printing, storage and email

services.

Printing
i. Students may use the centralized printing system subject

to sufficient credit in the account.


ii. Each deposit must be in a multiple of Rs5.00.

iii. Students are charged Rs 0.10 (black and white) or Rs

1.00 (colour) per page.


Centralized storage
i. Students are allocated 80 MB of storage.

ii. The storage is assigned at P: drive for Windows and

home folder for Macintosh.



Email
i. Students are allocated 20 MB of storage.
ii. Email can be accessed through

http://webmail.stud.iiu.edu.my


ICT process
Communication
A chain
network e.g
formal
contact

Communication
A circle network e.g.
between people at
the same level

Communication
A wheel network
e.g. sales teams
report to head
office

Communication
An all-channel
network e.g.
brainstorming

Examples of ICT Use
Mobile telephones
Video and tele-conferencing
Lap-top computers
E-mail
Multi-media communications

 ICT Architecture
W h a t m a n a g e rs w a n t
fro m IC T ?
A cce ss a n y in fo rm a tio n
w h e re e ve r
a n d w h e n e ve r n e ce ssa ry
Fa st a lig n m e n t to
ch a n g e s in th e
b u sin e ss
A ccu ra te a n d
co n siste n t
in fo rm a tio n
C o n tro lla b le
Q oS at
m a n a g e a b le
co sts
How does an Architecture
help:
Information Architecture
Application Architecture
Infrastructure Architecture
How does an Architecture
help:
fast alignment to business
changes
Architecture as an interface between business <-
> ICT
Functional changes -> reuse of information and
applications
capacity upscaling -> scaling of applications and
infrastructure (insight in performance of
components)
continuity upscaling -> upscaling applications
and infrastructure (insight in continuity
components)

help:
fast alignment to business
changes
Complements business plan
Short term developments in long term
perspective
Documentation/ understanding business
decisions
Integration of old and new
Co-operation management\application
building\systems dept.
Help with mergers, new services, acquisitions,
etc.
Insight despite limited view non-specialists
Focus on strategic deployment of technology
How does an Architecture
help:
Controllable QoS at manageable costs
Insight in costs per component
pro-active performance management
focus on key technologies
common terminology
help for joiners/stayer
guideline for centralisation versus distribution
ICT Management
 Managing Information Communication Technology (ICT) will
enable organisations to get more out of their current
equipment and also to make better decisions around the
purchase of new equipment and ICT developments.
 Small organisations with one computer still need to manage
their ICT as it is likely to be used for important tasks, such
as:
 writing documents more efficiently
 managing accounting and budgeting so that you have better
information about your financial situation
 recording contact with clients more accurately and in more
detail
 improving communications within the organisation and with
others.
 Larger organisation may use ICT to carry out increasingly
complex functions which may include complicated software
solutions and hardware set-up.

organisations recognise the need to manage
their premises, accounting and other office
equipment, it is essential that managing ICT
is recognised as fundamental to the
development of the organisation.
Careful management of ICT will not only help
organisations meet their aims and objectives,
it will also prevent organisations making
possibly expensive mistakes.
Budgeting and finance

Calculating the technological budget - provides


instructions for using a downloadable Excel
spreadsheet for a simple way to help you
calculate your ICT budget
Planning & Budgeting for IT equipment – helps
organisations plan for equipment
replacement and explains the importance of a
purchasing plan
Allocating funds for ICT– provides help with
what to consider when putting together a
funding application or budget

ICT Security
Computers & networks are becoming a utility
(like water, electricity, gas, telephone)
Business and personal life are more and more
dependent on computers
Basic Security Services
Privacy / Confidentiality:
To know that no 3rd party can read a
message exchanged between 2
people
Authentication:
To know that someone is who he/she
says he/she is
Integrity:
To know that a message has not been
modified in transit
Non-repudiation:
To know that someone is not able to
deny later that she/he sent a
message

32
Security Applications
The security services that can be used:
Digital Signature
Anonymous e-cash
Certified e-mail
Secure elections
Simultaneous contract signing

33
Non-trivial Insights
Technology alone can not fix security
problems – Technology is necessary
but not sufficient
Security is everyone’s business, not just
the business of security experts
Security decisions must be taken by
Management, not by technical staff
Security is risk management – the art to
worry about the right things

34
Cryptography- the Beauty of
Mathematics
Cryptographic algorithms are “building
blocks” to construct secure system
Dramatic advances in cryptography in the
last 30 years:
 Public Key Cryptography (1976)
 Microprocessor: cheap computing power
 Quantum cryptography (future)

Reminder: security is more a “people


problem” than a technical problem

35
Secret Key Encryption
 Plain text Plain text
  
encrypt message with decrypt message with
 secret key same secret key
  
cipher text

 Both parties share a single, secret key


 Problem: exchanging keys in complete secrecy is
difficult
 Best-known example: DES (Data Encryption
Standard)

36
Public Key Encryption
 Plain text Plain text
  
encrypt message with decrypt message with
public (!) key of receiver (!) private key of
receiver
   cipher
text
Each participant has
 A private key that is shared with no one else,
plus
 A public key known to everyone
Problem: slower than Secret Key Encryption
Best-known example: RSA

37
Biometrics: your Body – your
Password?
Recognize a person upon physiological or
behavioral characteristics
Fingerprint
Face
Voice
Iris
Currently costs outweigh benefits

38
The Need for International
Security Standards
Technical standards should be
international:
Ensures interoperability - the whole
point of most of the standards
Economies of scale
Best practice standards would be very
helpful to be international
Raises awareness
Regulatory issues & law enforcement is a
national (or regional, e.g. European
Union) matter

39
Corporate ICT
Security Policy
Corporate ICT Security
Policy
The role of the above policy is to lay down company
procedures, guidelines and practices necessary to keep
the hardware, software and data safe from theft, misuse
and unauthorised access. This ensures there is a central
document of ICT security standards that managers and
ICT personnel can refer to when making decisions about
ICT related matters.

There are at least 5 factors that should be considered in this policy:


1 . P revention of misuse
2 . D etection of misuse Company Procedures should ensure all
computer systems are within the law, notably
3 . I nvestigation of misuse the Computer Misuse Act and the Data
Protection Act.
4.Staff responsibilities
5.Disciplinary procedures These two areas will go on to inform the
Code of Practice that all company staff
will have to sign.
Company Procedures within
the Corporate IS Security Policy
Prevention & detection of misuse procedures go hand in hand:

 Issue userids and passwords


 Have a backup and recovery plan Have company wide anti-virus
software running on each computer to prevent and detect virus
threats.
 Have a firewall installed between the company network and any external
network such as the Internet to prevent unauthorised access to the
network.
 Encrypt sensitive data and emails so that only a person with the correct
coded key can read them; unauthorised personnel can’t understand
data.
 Physical security procedures such as ID and swipe cards to enter rooms
to prevent/detect unauthorised personnel entering restricted areas.
Code of Practice

An employee Code of Practice (or Code of Conduct or Acceptable


Use Policy) is a behaviour code for computer users describing: their


responsibilities; rules for maintaining security; penalties for misuse.

Factors to consider:

 use of company software: infringing copyright


 use of company hardware: introducing viruses via USB stick from
game
 use of company data: disclosure to authorised people only
 correct use of time: use of computer facilities for personal use in
work time
 correct use of security available: passwords, swipe cards, logging
off …
 penalties for misuse

 Employees need to sign this policy before they can use the

 Thank You

Anda mungkin juga menyukai