ICT Assignment
ICT Assignment
ICT Assignment
BUS7103
Final Assignment
On
“Key points of Cloud Computing, Storage Devices, Securing Information
Resources, Block Chain, Machine Learning, and E-commerce.”
Submitted to:
Submitted by:
0
Storage Devices & Cloud Computing
A storage device is any computing hardware that is used for storing, porting and extracting
data files and objects. Now a day high capacity storage devices are available.
Data organization:
1
Finding data on disk
Hard disks:
A hard disk drive, hard disk, hard drive or fixed disk is an electro-mechanical data storage
device that uses magnetic storage to store and retrieve digital data using one or more rigid
rapidly rotating platters coated with magnetic material.
2
Optical Storage Devices:
CD-ROM
DVD-ROM
CD Recordable (CD-R)
CD Rewritable (CD-RW)
The recording layer of the CD-RW disc is polycrystalline. During recording, a laser
selectively heats areas of the recording track and melted. During rewrite the CD, the
amorphous position is heated above certain temperature. The CD is ready to rewrite.
3
Blu-ray (not Blue-ray) also known as Blu-ray Disc (BD), is the name of a new optical disc
enable recording, rewriting and storing large amounts of data. This offers more than five
times the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer
disc and 50GB on a dual-layer disc or much more.
The benefits
So it’s possible to focus the laser on more tiny spot with even greater precision. Thus, it is
providing higher capacity.
In Solid-state drives data is saved to a pool of NAND flash. NAND itself is made up of what
are called floating gate transistors. Electrons are stored in the floating gate, which then reads
as charged means “0” or not-charged means “1”. Common page sizes are 2K, 4K, 8K, or
16K, with 128 to 256 pages per block.
RAM:
Random access memory is a form of computer memory that can be read and changed in any
order, typically used to store working data and machine code.
Double Data Rate (DDR) could run at a clock rate (100-200MHz), using energy (2.5 volts)
speeds (transfer rates of up to 400 MTps). DDR2 was about twice as fast as the original DDR
(200-533MHz, with transfer rates up to 1,066MTps), used power (1.8 volts). DDR3 was
appeared around 2007 its speed about twice that of DDR2 (400-1,066MHz, maximum
transfer rate of 2,133MTps), and power usage 1.5 volts. The DDR4 standard allows for
DIMMs of up to 64 GB in capacity, compared to DDR3's maximum of 16 GB per DIMM.
DDR4 runs at lower voltage (1.2V) than either DDR3.
Cloud Computing:
Cloud computing means storing and accessing the data and programs over the internet rather
than the computer’s hard disk. The speed of transfer depends on various factors such as
internet speed, the capacity of the server, and many more.
4
Types of Cloud Computing:
Iaas
PaaS
SaaS
With the help of IaaS, the user can use IT hardware and software just by paying the basic
price of it. It provides cloud-based services, pay-as-you-go for services such as storage,
networking, and virtualization.
This helps the user by providing the facility to make, publish, and customize the software in
the hosted environment.
Examples: AWS Elastic Beanstalk, Heroku, Windows Azure (mostly used as PaaS),
Force.com, OpenShift, Apache Stratos, Magento Commerce Cloud.
It provides a facility to the user to use the software from anywhere. This software as a service
that’s available via a third-party over the internet. It is also known as software on demand.
Deployment methods:
1. Private Cloud
2. Public Cloud
3. Community Cloud
4. Hybrid Cloud
Private Cloud: Cloud Company maintains the management, deployment, and operation of
the cloud.
5
Community Cloud: Companies having similar interest and work can share the same cloud
and it can be done with the help of Community Cloud.
Public Cloud: The Company serves the infrastructure to the customer on a commercial basis
Hybrid Cloud: Combination of Public and Private Cloud which supports the requirement to
handle data in an organization.
Economical:
Need to pay only for the basic services. Here 24 hours and 7 days Availability. The cloud
service is available every time.
Security:
As the data has been saved at multiple places, there is no loss of data. Cloud Computing
offers a high level of security as the data stored is important and should not be lost.
Cloud Computing Companies:
Netflix
Pinterest
Xerox
Instagram
Apple
Google
Facebook and etc.
6
Securing Information Resources
Security:
Policies, procedures and technical measures used to prevent unauthorized access, alteration,
theft, or physical damage to information systems.
Controls:
Methods, policies and organizational procedures that ensure safety of organization’s assets;
accuracy and reliability of its accounting records; and operational adherence to management
standards.
The architecture of a Web-based application typically includes a Web client, a server, and
corporate information systems linked to databases. Each of these components presents
security challenges and vulnerabilities.
7
Viruses
Rogue software program that attaches itself to other software programs or data files in order
to be executed
Worms
Independent computer programs that copy themselves from one computer to other computers
over a network.
Trojan horses
They may sit quietly in your computer, collecting information or setting up holes in your
security, or they may just take over your computer and lock you out.
Common actions: Creating backdoors spying, Turning your computer into a zombie
Malware
SQL injection attacks: user input directly in an SQL query. Eg. Itemed=999 OR 1=1 UNION
SELECT user-name, password FROM USERS
Spyware
Small programs install themselves surreptitiously on computers to monitor user Web surfing
activity and serve up advertising
Key loggers
Record every keystroke on computer to steal serial numbers, passwords, launch Internet
attacks.
Activities include
System intrusion
System damage
Cyber vandalism
Spoofing
8
Sniffer
Botnets
Computer crime
Defined as “any violations of criminal law that involve a knowledge of computer technology
for their perpetration, investigation, or prosecution”
Identity theft
Theft of personal Information (social security id, driver’s license or credit card numbers) to
impersonate someone else
Phishing
Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to
ask users for confidential personal data.
Social engineering:
9
When Antivirus Software cripples your computers:
Failed computer systems can lead to significant or total loss of business function.
Confidential personal and financial data, Trade secrets, new products, strategies
A security breach may cut into firm’s market value almost immediately
Inadequate security and controls also bring forth issues of liability
Legal and regulatory requirements for electronic records management and privacy
protection
Electronic evidence
Computer forensics:
General controls
Govern design, security, and use of computer programs and security of data files in general
throughout organization’s information technology infrastructure.
10
Establishing a Framework for Security and Control:
Software controls
Hardware controls
Computer operations controls
Data security controls
Implementation controls
Administrative controls
Security policy
Ranks information risks, identifies acceptable security goals, and identifies mechanisms for
achieving these goals
Authorization policies
Both types of plans needed to identify firm’s most critical systems. Business impact analysis
to determine impact of an outage
MIS audit:
11
Authenticates users, protecting identities, controlling access
Authentication
Firewall:
Combination of hardware and software that prevents unauthorized users from accessing
private networks
Technologies include:
A CORPORATE FIREWALL
The firewall is placed between the firm’s private network and the public Internet or another
distrusted network to protect against unauthorized traffic.
Checks computers for presence of malware and can often eliminate it as well
Encryption:
Transforming text or data into cipher text that cannot be read by unintended recipients
12
Public key encryption
Uses two, mathematically related keys: Public key and private key
Sender encrypts message with recipient’s public key
Recipient decrypts with private key
Digital certificate:
Data file used to establish the identity of users and electronic assets for protection of online
transactions. Uses a trusted third party, certification authority (CA), to validate a user’s
identity
For continuous availability, e.g. stock markets. Contain redundant hardware, software, and
power supply components that create an environment that provides continuous, uninterrupted
service.
Number of transactions
13
Block Chain
Cryptography:
The use of math and logical problem solving to encipher or decipher encoded messages.
Computer cryptography is heavily reliant upon mathematical proofs and the computational
difficulty of specific mathematical problems.
Cryptocurrency:
Digitally distributed and traded currencies for which proof of ownership is established via
cryptographic methods. For example, Ether cannot be transferred from an account without
having control of the private key that is associated with that account.
Available Cryptocurrencies:
Bitcoin
Litecoin (LTC)
Ethereum (ETH)
Zcash (ZEC)
Bitcoin Cash
Dash
Ripple (XRP)
Monero (XMR)
Bitcoin:
One can accept both Bitcoin Cash and Bitcoin payments. Digital wallet app(cash), Bitcoin
payment gateway (online businesses) or a point-of-sale app (in-store businesses).
14
Block chain:
Mining:
It is the process by which transactions are verified and added to a blockchain. This process of
solving cryptographic problems using computing hardware also triggers the release of
cryptocurrencies.
Block:
Data is permanently recorded on the Bitcoin network through files called blocks. A block is a
record of some or all of the most recent Bitcoin transactions that have not yet been recorded
in any prior blocks.
Hash:
A hash code is created by a math function that takes digital information and generates a string
of letters and numbers from it. Performing a hash function on the output data in a blockchain
is termed as hash. Commonly used in sentences like “the hash of “geeksforgeeks file is
142c53v2v31vc1526v35v63v5v4”. Hashes are used to efficiently identify data.
Hash Function:
A cryptographic function that maps inputs to specific, but seemingly arbitrary, outputs.
Hash rate:
A function that takes a variable-size input and output is a fixed-size unique value. SHA-256
algorithm is a cryptographic hash function example.
Nonce:
The nonce is the short form for Number Only Used Once is a number added to an encrypted
block in a block chain, which when rehashed, meets the difficulty level limitations.
15
Node:
A node is basically a small server that stores, updates and broadcasts a full copy of the block
chain. It is a computer that is participating in the global peer-to-peer Bitcoin network.
Wallet:
is a file that contains a collection of private keys and communicates with the corresponding
block chain. Wallets contain keys, not coins.
Digital Signature:
Private keys are used for signing transactions. Each time a transaction is sent over the
blockchain it gets signed by the user’s private key.
Private Key:
It is a string of data that shows you have access to bitcoins in a specific wallet. Private keys
can be thought of as a password, private keys must never be revealed to anyone but you, as
they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic
signature.
Public Key:
16
Machine Learning (ML)
What is Machine Learning?
1. Association
2. Supervised Learning
Classification
Regression
3. Unsupervised Learning
4. Reinforcement Learning
1. Association: A typical example of association rule mining is market basket analysis. This
process analyzes customer buying habits.
2. Supervised Learning:
Supervision: The training data are accompanied by labels indicating the class of the
observations
Classification:
17
classifies data (constructs a model) based on the training set and the values (class
labels) in a classifying attribute and uses it in classifying new data
Typical applications:
Credit/loan approval
Medical diagnosis: if a tumor is cancerous or benign
Fraud detection: if a transaction is fraudulent
Web page categorization: which category it is
3. Unsupervised learning (clustering): The class label of training data is unknown. Given a
set of measurements, observations, etc. with the aim of establishing the existence of classes
or clusters in the data
Applications:
Game playing
Robot in a maze
Uses of ML in Business:
Personalizing product
Product recommendation
Predictive Maintenance
Financial analysis
18
Generative model
Digital Firm: All the functional activities by means of computer, internet and technology is
called digital firm.
E-Business: If any firm perform their activities through internet, computer and technology is
called e-business. E-commerce is a part of e-business.
Mobile commerce: The e-commerce which is run through portable devices is called mobile
commerce.
Digital Marketing: refers to introduce any product or company to the people using digital
platform. This can be via sending email, sending sms etc.
Digital Goods: refers to any goods that are sold, delivered and transferred in digital form.
Advantages:
Cost of producing first unit almost entire cost of product. Marginal cost of 2nd unit is
about zero.
Low cost
Marketing costs remain the same; pricing highly variable.
1. Ubiquity: It refers to the availability of the internet or web technology. For example:
home, work etc. people can access to the internet.
2. Global reach: the technology reaches across national boundaries, around earth.
3. Universal standards: It refers to One set of technology standards. Such as Internet
standards.
4. Richness: Supports of video, audio, and text messages.
5. Interactivity: The technology works through interaction with the user.
19
6. Information density: The total amount and quality of information available to all
market participants.
7. Personalization or Customization: Technology permits modification of messages,
goods etc.
8. Social technology: The technology promotes user content generation and social
networking.
Types of e-commerce:
E-tailer:
Transaction broker:
Provides a digital environment where buyers and sellers can meet, search for products,
display products, and establish prices for those products.
Content provider:
20
Creates revenue by providing digital content, such as news, music, photos, or video, over the
Web.
Community provider:
Provides an online meeting place where people with similar interests can communicate and
find useful information.
Service provider:
Provides Web 2.0 applications such as photo sharing, video sharing, and user-generated
content as services.
21
eBay provides an online auction marketplace and receives a small transaction
fee from a seller if the seller is successful in selling an item.
Affiliate Revenue Model:
In the affiliate revenue model, Web sites (called “affiliate Web sites”) send
visitors to other Web sites in return for a referral fee or percentage of the
revenue from any resulting sales.
Amazon uses affiliates who steer business to the Amazon Web site by placing
the Amazon logo on their blogs.
Business-to-business e-commerce:
ATM
Function of ATM:
Cash Withdrawals
Cash Deposits
Balance Enquiry
Mini Statement
Fund Transfer
Utility Bill, Tax Payment
22
Cheque Processing Module
Promotional Features
Technical Overview:
Hardware
CPU
Magnetic Stripe and chip card reader
Encrypted PIN Pad (EPP)
Display
Cash Handler
Receipt and Journal Printer
Vault
Software
RMX (Real-time Multitasking eXecutive) by Intel, OS/2, Microsoft OS.
XFS Middleware (eXtensions for Financial Services) provides client-server
architecture for financial applications on the Microsoft Windows platform,
especially peripheral devices such as ATMs to the financial industry.)
23