IT Application Tools in Business - Module 1
IT Application Tools in Business - Module 1
IT Application Tools in Business - Module 1
2. Application Programs
b. Spreadsheet - A spreadsheet is a file that exists of cells in rows and columns and
can help arrange, calculate and sort data. Data in a spreadsheet can be numeric
values, as well as text, formulas, references and functions.
1. Cyberattacks- If your firm is attacked, knowing what’s happened can help limit
damage and restore your systems quickly. This guide explains how to recognize and
prevent the different threats. The most common cybercrimes are phishing and
vishing scams. They rely on people being tricked into sharing secure information.
Law firms are a common target for a type of phishing attack known as “Friday
afternoon fraud”. Data breaches must be reported to the Information
Commissioner's Office within 72 hours of being discovered. Everyone in your firm
should know how to do this. Supply chain attacks target less secure parts of your
supply network. You should know how to monitor your suppliers and manage the
risk.
Trolls - It is someone who deliberately starts a fight and insults others in online
forums. They disrupt discussions to cause drama. They are practically omnipresent
on social media.
Spies - Cyber espionage is a form of cyber-attack that steals classified, sensitive data
or intellectual property to gain an advantage over a competitive company or
government entity.
Thieves - Thieves are creating other types of Trojans that steal account information
and key files of various program products and resources from infected computers,
for the benefit of the thief.
3. Discuss security issues and threats to computers and communication - There are
many threats to computer and the communication system which are error, accident
and natural hazards.
1: Human Errors • • • •
Humans often are not good at assessing their own information Humans emotions
effect their performance Humans perceptions are slower compared to the
equipment information overload to humans can sometimes be a problem
2: Procedural Errors •
When people fail to follow the steps and instruction prepared, error tends to occur
3: Software Errors •
Mechanical system can wear out or become damaged after a period of usage They
can sometimes be badly designed or constructed Power surges and failures can
damage the equipment connected
6: Natural hazards •
7: Computer Crimes
Enforcing the law CERT to provide round the clock information on international
computer security threats Tools used to fight fraudulent and unauthorized online
uses Rule base detection software predictive statistical model software Employee
internet management Internet browsing filtering software Electronic surveillance
Verify legitimate right of access by what you have, what you know, and who you are
What you have like keys, cards, signatures, badges What you know like pin numbers
and passwords Who are you like bio metrics such as face scan and finger print scan
3: Encryption • • •
The process of altering and changing a data into unreadable form to prevent
unauthorized access Advantage is data is available over the internet Disadvantage is
law officer may not be able to read the data.
4: Protection of software and data: Restrict access to online files; use transaction
logs. Use audit controls to track who used what programs and servers, which files
were opened, and so on. Use people controls—screen applicants; do background
checks; monitor Internet, email, and computer usage; use shredders for discarded
documents and materials
5. Explain privacy surveillance: data collectors - Data Modelers and Data Governance
experts need to work with the company’s security experts to create policies and
procedures designed to handle confidential data within the organization and to
decide which data can be safely exposed to vendors and others outside the firm.
- Computer crime describes a very broad category of offenses. Some of them are the
same as non-computer offenses, such as larceny or fraud, except that a computer or
the Internet is used in the commission of the crime. Others, like hacking, are
uniquely related to computers. Read on to find out what kinds of activities are
considered computer crimes and how to protect yourself from them.
6. Thou shalt not copy or use proprietary software for which you have not paid
(without permission).
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.
9. Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect
for other humans
Advantages of Database
1) Data Abstraction:
Data abstraction means to hide the complexity of data from the basic users.
DBMS abstracts the data to the users, which is not useful for the users. It
shows only those data which are useful to the users.
2) Controlling Data Redundancy:
Data redundancy means having multiple copies of the same data. DBMS
controls the data redundancy and integrates all data into a single database
file.
6) Data Security:
Database provides data security means protecting your precious data from
unauthorized access. Data can be accessed only by authorized users of the
organization. A database can be accessed only by proper authentication, usually
by verifying login and password.
8) Concurrent Access: •
Several users can access the database concurrently.
Disadvantages of Database
1) Cost of Hardware and Software: To run the DBMS software, we need a high-
speed processor and large memory size is required which cause expensive
hardware is needed.
It is the difficult and time-consuming method to convert the data of data files
into database
3) Cost of Staff Training: DBMS are often complex system, so the training is
required for the users to use the DBMS. The organization has to be paid plenty of
amount for the training of workers to run the database management system.
General REFLECTION
END.