Information Technology: Sem I
Information Technology: Sem I
Information Technology: Sem I
Contents
What is Ethernet? .......................................................................................................................................................2 Ethernet products...................................................................................................................................................2 Trans receivers....................................................................................................................................................2 Hubs ....................................................................................................................................................................2 Repeaters...........................................................................................................................................................3 Bridges ................................................................................................................................................................3 Routers ...............................................................................................................................................................3 Firewall ...............................................................................................................................................................3 Difference between Internet, Intranet and Extranet .................................................................................................3 Internet ...................................................................................................................................................................3 Application of internet .......................................................................................................................................4 Business value of internet ..................................................................................................................................4 Six major Value propositions of building commercial websites by the organizations .......................................4 Intranet ...................................................................................................................................................................4 Characteristics ....................................................................................................................................................4 Extranet ..................................................................................................................................................................5 Business value ....................................................................................................................................................5 Corporate governance ................................................................................................................................................5 The ISO....................................................................................................................................................................6 Governance of Internal IT processes ......................................................................................................................7 IT Security ...................................................................................................................................................................7 CIA Triangle.............................................................................................................................................................7 Confidentiality ....................................................................................................................................................7 Integrity ..............................................................................................................................................................7 Availability ..........................................................................................................................................................8 Security management controls ..............................................................................................................................8 Physical security .....................................................................................................................................................8
1|Page
Difference between Internet, Intranet and Extranet Internet It does not have a central computer system or telecommunication center instead each message sent on the internet has a unique IP address code, so any internet server in the network can forward it to its destination. The internet does not have a head quarter or a governing body
3|Page
Corporate governance It is defined as a system of structuring, operating and controlling a company with a view to achieve long term sand regulatory strategic goals to satisfy shareholders various stake holders and complying with the legal and regulatory requirements apart from meeting environmental and local community needs. The SEBI committee on corporate governance defines corporate government as acceptance by management of the inalienable rights of shareholders as the true
5|Page
6|Page
7|Page
Physical security
Physical security is the security of personnel, hardware, programs, networks and data from physical circumstances and events that could cause serious losses or damages to the enterprise or institution It means the protection of building sites and equipment, and all information and software contained therein from theft, vandalism, natural disasters, manmade catastrophe and accidental damages It requires solid building constructions, suitable and reliable power supplies, adequate climate control and appropriate protection from intruders which involves locks and physical securities and asset tagging and asset life cycle management
8|Page
9|Page