Information Technology Unit2
Information Technology Unit2
For
UNIT I
Introduction and basic concept of modern communication and technology: CDMA, WLL, GSM,
VOIP, Bluetooth, WI-Fi, Communication Technology: 2G, 3G, 4G, And 5G. Communication
over radio, microwave systems, Communication satellite, radar, fiber optics, ISDN-their
properties, Geographic Information System (GIS), Components of a GIS- H/W,S/W, Data,
people, methods, working and application of GIS.
UNIT II
Information Security: Introduction, malicious programs, cryptography, digital signature,
Firewall, Users Identification and Authentication, Security awareness and policies, Application
areas requiring security. Mobile Commerce: Introduction, Growth, Success Stories of Mobile
commerce, Technologies for mobile commerce, M-commerce in India, Digital Marketing.
UNIT III
Artificial Intelligence: Concept of Artificial Intelligence, Introduction to branches of Artificial
Intelligence: Machine Learning, Neural Network, Robotics, Natural Language Processing,
Expert System, and Fuzzy Logic. Applications of all the branches of AI, General application of
AI.
UNIT IV
Introduction to IoT: Characteristics of IoT, physical design of IoT, Logical design of IoT,
Functional blocks of IoT, home Automation, Industry applications, Surveillance and other IoT
applications. Introduction to Virtual Reality (VR): Definition, Application of VR, Smart
Systems,
Embedded Systems.
UNIT V
Computing and Cloud Computing: History of Centralized and Distributed Computing,
Overview of Distributed Computing, Cluster computing, Grid computing. Introduction to
Cloud Computing- Cloud issues and challenges – Properties – Characteristics – Service models,
Deployment models. Cloud resources: Network and API – Virtual and Physical computational
Resources – Data-storage.
Text Books
1. Fundamental of Information Technology by Alex Leon & M.Leon, Vikas Publications,
New Delhi
2. Security in Computing (Third Edition) by C.P. Pfleeger, S.L. Pfleeger,D.N. Shah, S. Ware,
Prentice Hall 2002.
3. Recent Magazines of Computers and Communication.
4. Cloud Computing PHI by Rao M.N.
5. Internet of Things, McGrawHill by Raj Kamal
Reference Books
1. Introduction to Information Technology – ITL Education Solutions Ltd.,Seventh
Impression, Pearson Education 2008.
2. Concepts in Computing-Kenneth Hoganson, First Indian Edition, Jones & Bartlett
Publishers, Inc. 2010
Information security is the name given to the preventive steps we take to guard our information
and our capabilities.
Characteristics:
Availability
Accuracy
Authenticity
Confidentiality
Integrity
Malicious program:
M alicious programs can be divided into the following groups: worms, viruses, trojans, hacker
utilities and other malware. All of these are designed to damage the infected machine or
other networked machines.
Network Worms
This category includes programs that propagate via LANs or the Internet with the following
objectives:
Worms use different networking systems to propagate: email, instant messaging, file-sharing
(P2P), IRC channels, LANs, WANs and so forth.
Most existing worms spread as files in one form or another: e-mail attachments, in ICQ or IRC
messages, links to files stored on infected websites or FTP servers, files accessible via P2P
networks and so on.
There are a small number of so-called file less or packet worms; these spread as network packets
and directly penetrate the RAM of the victim machine, where the code is then executed.
Worms use a variety of methods for penetrating victim machines and subsequently executing
code, including:
Today's malware is often a composite creation: worms now often include Trojan functions or are
able to infect exe files on the victim machine. They are no longer pure worms, but blended
threats.
Classic Viruses
The virus infects files on a network resource that other users can access.
The virus infects removable storage media which are then attached to a clean machine.
The user attaches an infected file to an email and sends it to a 'healthy' recipient.
Trojan Programs
A trogen horse is a version of virus which, unlike a computer virus, does not attempt to inject
itself on other files. Instead, a Trojan horse is programmed to deceive the user by appearing to be
genuine file. However when used it perform other malicious activities like make a copy of itself,
steal information or harm their host computer. Trojan sometimes access personal details like
email address, credit card number stored locally at home computer, then send this data to remote
party via the internet.
Utilities such as constructors that can be used to create viruses, worms and Trojans.
Program libraries specially developed to be used in creating malware.
Hacker utilities that encrypt infected files to hide them from antivirus software.
Programs that deliberately misinform users about their actions in the system.
Other programs that are designed to directly or indirectly damage local or networked
machines.
Cryptography
Introduction to cryptography: Human being from ages had two inherent needs − (a) to
communicate and share information and (b) to communicate selectively. These two needs gave
rise to the art of coding the messages in such a way that only the intended people could have
access to the information. Unauthorized people could not extract any information, even if the
scrambled messages fell in their hand.
The art and science of concealing the messages to introduce secrecy in information security is
recognized as cryptography.
The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden
and ‘graphene’ meaning writing.
Definition: Cryptography is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular
form so that only those for whom it is intended can read and process it. Cryptography not only
protects data from theft or alteration, but can also be used for user authentication.
Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at
a later stage
Cryptography is used in many applications like banking transactions cards, computer passwords,
and e- commerce transactions.
1. Symmetric-key cryptography
2. Public-key cryptography
3. Hash functions.
Symmetric-key Cryptography: Both the sender and receiver share a single key. The sender
uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the
receiver applies the same key to decrypt the message and recover the plain text.
Public-Key Cryptography: This is the most revolutionary concept in the last 300-400 years. In
Public-Key Cryptography two related keys (public and private key) are used. Public key may be
freely distributed, while its paired private key, remains a secret. The public key is used for
encryption and for decryption private key is used.
Public key is a cryptographic key that can be obtained and used by anyone to encrypt messages
intended for a particular recipient, such that the encrypted messages can be deciphered only by
using a second key that is known only to the recipient (the private key ).
Hash Functions: No key is used in this algorithm. A fixed-length hash value is computed as per
the plain text that makes it impossible for the contents of the plain text to be recovered. Hash
functions are also used by many operating systems to encrypt passwords.
Hash functions are extremely useful and appear in almost all information security applications.
A hash function is a mathematical function that converts a numerical input value into another
compressed numerical value. The input to the hash function is of arbitrary length but output is
always of fixed length.
Values returned by a hash function are called message digest or simply hash values. The
following picture illustrated hash function −
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or
documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very
strong reason to believe that the message was created by a known sender (authentication), and
that the message was not altered in transit (integrity).
Alice signs a message—"Hello Bob!"—by appending to the original message a version of the
message encrypted with her private key. Bob receives the message, including the signature, and
using Alice's public key, verifies the authenticity of the message, i.e. that the signature can be
Digital signatures allow us to verify the author, date and time of signatures, authenticate the
message contents. It also includes authentication function for additional capabilities.
Applications
There are several reasons to implement digital signatures to communications:
Authentication
Digital signatures help to authenticate the sources of messages. For example, if a bank’s branch
office sends a message to central office, requesting for change in balance of an account. If the
central office could not authenticate that message is sent from an authorized source, acting of
such request could be a grave mistake.
Integrity
Once the message is signed, any change in the message would invalidate the signature.
F irewall: A firewall is a system designed to prevent unauthorized access to or from a private
network. You can implement a firewall in either hardware or software form, or a combination of
both. Firewalls prevent unauthorized internet users from accessing private networks connected
to the internet, especially intranets. All messages entering or leaving the intranet (the local network to
which you are connected) must pass through the firewall, which examines each message and blocks
those that do not meet the specified security criteria.
Firewall is a network security device, either hardware or software based, which monitors all incoming
and outgoing traffic and based on defined set of security rules it accept, reject or drop that specific
traffic.
When a user registers for an account, they must create a unique ID and key that will allow them
to access their account later on. Generally, a username and password are used as the ID and key,
but the credentials can include other forms of keys as well .
In order to gain access, users must prove to the website that they are who they say they are. The
ID and key are enough to confirm the user’s identity, which will allow the system to authorize
the user.
Manage the connection between the human (user) and the website’s server (computer).
Approve (or decline) the authentication so the system can move to authorizing the user.
The process is fairly simple; users input their credentials on the website’s login form. That
information is then sent to the authentication server where the information is compared with all
the user credentials on file.
When a match is found, the system will authenticate users and grant them access to their
accounts. If a match isn’t found, users will be prompted to re-enter their credentials and try
again. After several unsuccessful attempts, the account may be flagged for suspicious activity or
require alternative authentication methods such as a password reset or a onetime password.
When your user authentication isn’t secure, however, cybercriminals can hack the system and gain
access, taking whatever information the user is authorized to access. In order to prevent such a
situation, it’s a good idea to invest in high-quality authentication tools to help you secure your website
and protect it from potential breaches.
I nformation security awareness is an evolving part of information security that focuses on raising
consciousness regarding potential risks of the rapidly evolving forms of information and the rapidly
evolving threats to that information which target human behavior. As threats have matured and
information has increased in value, attackers have increased their capabilities and expanded to broader
intentions, developed more attack methods and methodologies and are acting on more diverse motives.
As information security controls and processes have matured, attacks have matured to circumvent
controls and processes. Attackers have targeted and successfully exploited individuals human behavior
to breach corporate networks and critical infrastructure systems. Targeted individuals who are unaware
of information and threats may unknowingly circumvent traditional security controls and processes and
enable a breach of the organization.
The goal of Information security awareness is to make everyone aware that they are susceptible to the
opportunities and challenges in today's threat landscape, change human risk behaviors and create or
enhance a secure organizational culture.
Computer based crimes are not something new to us. Viruses have been
with us for well over 20 years; spyware has clocked up more than a decade since the earliest
incidents; and large-scale use of phishing can be traced back to at least 2003. One of the reasons
researchers agreed upon that the pace at information system is evolving and expanding, the security
awareness program among the employees is falling way behind.
A pplication security describes security measures at the application level that aim to
prevent data or code within the app from being stolen or hijacked. It encompasses the
security considerations that happen during application development and design, but it
also involves systems and approaches to protect apps after they get deployed.
Application security may include hardware, software, and procedures that identify or minimize security
vulnerabilities. A router that prevents anyone from viewing a computer’s IP address from the Internet is
a form of hardware application security. But security measures at the application level are also typically
built into the software, such as an application firewall that strictly defines what activities are allowed
and prohibited.
Authentication: When software developers build procedures into an application to ensure that
only authorized users gain access to it. Authentication procedures ensure that a user is who they
say they are. This can be accomplished by requiring the user to provide a user name and
password when logging in to an application. Multi-factor authentication requires more than one
form of authentication—the factors might include something you know (a password), something
you have (a mobile device), and something you are (a thumb print or facial recognition).
Authorization: After a user has been authenticated, the user may be authorized to access and use
the application. The system can validate that a user has permission to access the application by
comparing the user’s identity with a list of authorized users. Authentication must happen before
authorization so that the application matches only validated user credentials to the authorized
user list.
Encryption: After a user has been authenticated and is using the application, other security
measures can protect sensitive data from being seen or even used by a cybercriminal. In cloud-
based applications, where traffic containing sensitive data travels between the end user and the
cloud, that traffic can be encrypted to keep the data safe.
Logging: If there is a security breach in an application, logging can help identify who got access
to the data and how. Application log files provide a time-stamped record of which aspects of the
application were accessed and by whom.
Application security testing: A necessary process to ensure that all of these security controls
work properly.
M -commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as Smartphone’s and tablets. As a form of e-commerce, m-
commerce enables users to access online shopping platforms without needing to use a
desktop computer. Examples of m-commerce include in-app purchasing, mobile banking, virtual
marketplace apps like the Amazon mobile app or a digital wallet such as Apple Pay, Android Pay and
Samsung Pay.
G
rowth: eMarketer expects global ecommerce sales to reach $4.058 trillion by 2020, representing 15% of
total retail sales.
And the percentage of that belonging to m-commerce will also continue to grow, as more online retailers
see more than 50% of traffic coming from mobile devices.
Buying and selling products and services through mobile devices are the new trend. A housewife can
purchase her kitchen appliances from the comfort of her living room, a busy person can order lunch
from office, one can use mobile platforms to sell goods and services − all with a few clicks.
There are a number of content assets that can be bought and sold via a mobile device such as games,
applications, ringtones, subscriptions etc.
Companies that have an online customer base for instance e-commerce portals have noticed that
the sales and subscriptions they get from their apps are higher in comparison to that of their
websites. This means, online purchasing from the mobile phones are easier.
Most of the users feel that the mobile are more personal device than say a laptop or a desktop.
Therefore, they expect that the content they receive on their mobile phones must be
personalized as well.
Whether your customers are business professionals, students, home-makers, teenagers etc.,
commonly, they spend more than 3 hours a week on social media channels, such as Twitter,
Facebook etc. Surprisingly, most of these customers access these channels on their
smartphones.
Slowly but surely technicians and developers are packing the mobile phones with computer-like
features. With bigger screens, faster performance, optimum storage capacity, longer battery life,
and a ton of productivity booster applications. The evolution of phones from a simple calling
device to multi-tasking-pocket-size computers has revolutionized the world.
D igital India: Discussion and debate around the topic “Digital” and “Digital India” has
increased in the past few years after the initiation of Digital India program by
Government of India. GOI’s aim of bringing digital in governance, among people has
increased in the recent years, where most of the government organization and services are
migrated towards digital format. As a result of migration towards the digital life or digital India,
opportunities for techies have increased. It has also influenced in the creation of large number of
Startup communities in India.
We are going to see the opportunities for the young generation in Digital India, especially in the
area of SMAC (Social Mobility and Cloud). These are the core area, which is used by the
Government organization and private organization to migrate towards the digital life. The term
digital India or digitization can be defined as,
Analytics and Automation is the budding domain in the information and technology sector,
which has tremendously changed the nature of the common business. Analytics has influenced
the business by predicting the nature of the business with the previous old historical data. It has
also wide opened by creating a new area of analytics such as Big Data analytics. Big Data
Analytics helps to identify the scope of the business and automation takes it forward. Data which
were (was/is) once considered as memory occupier is now considered as Gold.
Yes, in the (today’s) digital world Data is considered as Gold. Data analytics will predict the
future of the business and automation will implements the same. Data analytics helps the human
engineers to increase the productivity by helping them to identify the key area of the business.
These kinds of analytics have opened a new branch of science called as Data science. Data
science is the combination of Mathematics and Data structures.