Computers work by receiving input, processing data, and producing output. The main components involved in this process are:
1. Input devices like keyboards and mice allow the user to provide input to the computer.
2. The CPU processes the input using instructions stored in memory and produces output. It contains the control unit which directs operations and the ALU which performs calculations.
3. Output devices like monitors display the results of processing back to the user.
Networks allow computers to be connected, enabling sharing of resources and data across systems. Risks associated with IT adoption include strategic, operational, portfolio, project, and other risks that could impact organizational goals.
Computers work by receiving input, processing data, and producing output. The main components involved in this process are:
1. Input devices like keyboards and mice allow the user to provide input to the computer.
2. The CPU processes the input using instructions stored in memory and produces output. It contains the control unit which directs operations and the ALU which performs calculations.
3. Output devices like monitors display the results of processing back to the user.
Networks allow computers to be connected, enabling sharing of resources and data across systems. Risks associated with IT adoption include strategic, operational, portfolio, project, and other risks that could impact organizational goals.
Computers work by receiving input, processing data, and producing output. The main components involved in this process are:
1. Input devices like keyboards and mice allow the user to provide input to the computer.
2. The CPU processes the input using instructions stored in memory and produces output. It contains the control unit which directs operations and the ALU which performs calculations.
3. Output devices like monitors display the results of processing back to the user.
Networks allow computers to be connected, enabling sharing of resources and data across systems. Risks associated with IT adoption include strategic, operational, portfolio, project, and other risks that could impact organizational goals.
Computers work by receiving input, processing data, and producing output. The main components involved in this process are:
1. Input devices like keyboards and mice allow the user to provide input to the computer.
2. The CPU processes the input using instructions stored in memory and produces output. It contains the control unit which directs operations and the ALU which performs calculations.
3. Output devices like monitors display the results of processing back to the user.
Networks allow computers to be connected, enabling sharing of resources and data across systems. Risks associated with IT adoption include strategic, operational, portfolio, project, and other risks that could impact organizational goals.
•used to refer to the organizational Input Devices
department with main responsibility for • A computer, in the same way will ‘listen’ to technology. its user by accepting an instruction. This is Information & Technology called providing an Input. • all the information the enterprise generates, • Input can be given to a computer in a variety of ways. One can do this by typing processes and uses to achieve its goals, as them out on a keyboard, clicking on well as the technology to support that something on the screen using a mouse, throughout the enterprise. speaking through a microphone, etc. Information Technology • Devices through which, we can give • Using computers or computer systems to instructions to the computer, or interact with manage all this information it, are called Input Devices. • They are used to create, store, retrieve and Output Devices transmit data or Information across large • Usually it will display its ‘answer’ or results distances. back to us by displaying it on the screen, or Information Technology executing the command given to it. This is • The study, or use, of computer systems for called the output of the computer. Hence storing, retrieving or sending information’. devices used to share output with the user (Oxford Dictionary) are called Output Devices. • They are used to create, store, retrieve and Processing transmit data or information across large • Between the Input and Output is the crucial distances, thus they have become step of Processing. indispensable to our 21st century lives. • Processing takes place in the Central Why do we need computer? Processing Unit or the CPU. The CPU uses • We built computers to expand our brains. the instructions, given to it by the user, • Modern times meant complex problems along with the stored instructions in its with complex solutions. We needed help. memory to give a result. • Computers gave us a way to store, retrieve • You could say that the CPU, along with the and process data. memory units, make up the Processing • Computers process data and carry out stage in the working of a computer. complex calculations within a few seconds. • As mentioned earlier, The CPU is the main • They can also be connected to a network component of the computer that performs making it possible to share information over calculations, actions and runs programs. It large distances. is called the Brain of the computer. How do computers work? • The CPU further consists of the Control Unit • A computer is an electronic device that can (CU), the Arithmetical and the Logical Unit receive information, perform actions on the (ALU) basis of rules and provide an output. • The ALU Performs all the calculations and • Using these functions a computer can logical operations of the computer, access, store, process and relay information manipulating numbers in a structured and to its user. purposeful way. • It accepts data, makes changes to it, based • Computers understand instructions in on certain conditions, and displays the combinations of 0s and 1s. Since everything result. is expressed in numbers, the Arithmetic and • Computers understand everything in Logical Unit becomes crucial. combinations of 0s and 1s, but also know how to build complex things out of them. • The Control Unit directs and controls the This is called Binary Code. operation of the processor. It constantly • Computers are able to convert these 0s and communicates with the ALU, the memory 1s to mean various things such as in a and the Input/Output devices game, a web page and even the application. telling them what to do. • The Control Unit directs and controls the • This translation stage is called Compiling operation of the processor. It constantly and is done by a program called a communicates with the ALU, the memory Compiler. and the Input/Output devices telling them Computer Networking what to do. Resource Sharing • The CU reads and interprets instructions. • As computers become more compact, they • ‘It controls information flow from various were produced in large numbers and devices of the computer and regulates the gradually they became cheaper in the timing of the processor’s working. market. • Handles multiple tasks of fetching, • Pretty soon companies and workspaces had decoding, executing and storing results and, multiple computing devices. It then became is obviously indispensable to the working of useful to share data and resources amongst a computer. a network of machines. • There are 2 kinds of memory in a computer, • It was cheaper to have a large, shared Primary memory and Secondary storage drive and have one common printer memory. among multiple computer systems • The Secondary Storage is the unit where all Connecting People the computer’s data and instructions are • They existed mainly to allow the sharing of stored. This is the permanent memory data and resources within a single containing data and programs. It is workspace rewritable. Computer network • There is another memory called ROM • basically, is a group of two or more (Read Only Memory) where essential computing devices, connected using a instructions related to the startup of the telecommunications network, allowing them computer and other vital functions are to share data and resources. stored. It’s not rewritable. IT Risk Defined • From the ROM and the Storage, everything 1. The combination of the probability of an required for immediate use is copied and event and its consequence. stored in the Memory section. This Memory 2. The business risk associated with the adoption and use of information technology. Is temporary and is called the RAM 3. Risk is a function of the likelihood of a given (Random Access Memory). threat-source’s exercising a particular What are computer programs? potential vulnerability and the resulting • The fundamental use of a computer is to impact of that adverse event on the work for us, to carry out our instructions. organization • The computer will execute exactly as it is “An event, that, if it occurs can affect enterprise instructed to; hence, the task must be goal achievement “ explained in a series of detailed steps. So, a Types of Risks computer program, in simple terms, is a list Strategic Risk of instructions for the computer to perform. • risks that involve future business plans and • All the programs used by a computer are strategies collectively called software and all the Operational Risk • potential losses caused by failed processes, tangible components of a computer are policies, systems or events that disrupt called hardware. business operations. Programming Language Portfolio Risk • Instructions are written to the computer in a • risks related to IT achieving its objectives in language that is partly English and partly optimizing business value contains connotations understandable by a Project Risk machine. • involving acquisition, procurement or • Cannot be directly understood by the funding including risk concerning the computer, it has to be translated into Binary people, cost, technical aspects and Code before execution resources of the project Risk Ownership Digital transformation Risk • Organizations are adopting digital • The potential of undesirable or unfavorable technology at a rapid pace, this is a positive outcome from a given action transformation but while this is generating Threat new opportunities, it is also creating new • Natural, environmental, or human event that risks. Adopting advanced technology can be could cause harm an enabler or a distractor but all have risks. Vulnerability High velocity IT • A weakness that could be exploited by a • Organizations are transforming at a break threat next speed. Agile and DevOps are hot Inherent Risk topics today in this fast-paced and high • The level of risk before security measure velocity environment. For most are applied organizations these aggressive deployment Residual risk techniques can often evolve so fast that • The level of risk after security measures are they can create critical vulnerabilities. applied Aggressive compliance requirements Risk appetite • Growth of laws, rules and regulations • The amount of risk an entity is willing to internationally. This is tipping the scale accept in pursuit of its mission between performance and compliance or Risk tolerance performance. It forces some organizations • How much undesirable outcome the risk to become checklist compliant and not focus taker is willing to accept on the risk-based scenarios that the company actually faces. Risk Governance Global disruptions (pandemic) • Ensure that IT related enterprise risk does Political and social landscape not exceed risk appetite and risk • Increasing sensitivity to political factors are tolerance creating extreme social and political Risk Management divisions that are seemingly non-negotiable. • Continually identify, assess and reduce IT • In addition, the ease of using social media risk within the tolerance levels set or web to quickly spread information by the enterprise whether real or not too many people instantly are numerically high. This again maybe creating more vulnerabilities. Global climate concerns • Global climate concerns put pressure on nations and companies to become more environmentally friendly and this contrived many decisions that the organization makes.
Types of Emerging Risk
Cyber threat sophistication • Although organizations are getting better at cyber defense, the bad actors are also becoming increasingly sophisticated in their tactics, techniques and procedures. Cyber criminals are successful in large part because many organizations are not carrying out due diligence in addressing the problems.