COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

IT: Communication and Impacts
Information Security and Common Sense Richard Henson University of Worcester October 2008.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Networking at Home and Abroad
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
© Vera Castleman Networks Grade 10. The Network System A network links components electronically. Each component is a NODE. A node could be: A PC A printer.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Principles of Information Technology
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Networking LAN (Local Area Network) A network is a collection of computers that communicate with each other through a shared network medium. LANs are.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Computer networks 2 A Informatica prof.sse ALLEMANI e CARUSO.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Client-Server & Peer-to-Peer Networks
DATA COMMUNICATION. Data Communication Data communication is the transmission of data from one location to the other. Data can be sent in two ways: directly.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Networking LAN (Local Area Network)  A network is a collection of computers that communicate with each other through a shared network medium.  LANs.
Networks QUME 185 Introduction to Computer Applications.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
COMP1321 Networks in Organisations Richard Henson March 2014.
Networks.
Information Security Training for People who Supervise Computer Users.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
The Online World ONLINE DOCUMENTS. Online documents Online documents (such as text documents, spreadsheets, presentations, graphics and forms) are any.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
COMP2322 Network Management Richard Henson Worcester Business School March 2016.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
UNIT 4 NETWORK ENVIRONMENTS.
Chapter 7. Identifying Assets and Activities to Be Protected
Virtual Private Networks (VPN)
Introduction to Networks
People used to install software on their computers
Richard Henson University of Worcester September 2016
Virtual Private Networks (VPN)
Networks, telecommunications
Unit 27: Network Operating Systems
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Progress leisure OCR GCSE ICT.
COMP1321 Digital Infrastructure
Networks, telecommunications
Networking at Home and Abroad
COMP1321 Digital Infrastructure
LO3 – Understand Business IT Systems
Networks By the end of this session, you will:
Communicating in the IT Industry
Topic 12: Virtual Private Networks
Principles of Information Technology
Presentation transcript:

COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012

Week 11: Access to Network Resources n n Explain the fundamental differences between documenting client-server and peer-peer networks n n Explain the two fundamental types of network routing n n Explain the system of network device naming used for Internet routing

History of Digital Data Management n n Historically:   digital data held on massive very expensive mainframe systems in secure “Data Centres”   only accessed by skilled professionals   true until late 1980s n n How that has changed… (!)   driven by the “end user computing” revolution: 1990 recession

Intranets, Extranets, and The Internet n n For Organisational infrastructures…   Intranets essential for a long time   data originally shared via dumb terminals   only authorised personnel had access   everything was “read only”

Precursor of Extranets n n New in late 1980s… laptops   employees could carry digital data outside organisations » »would improve productivity (?)   no real acknowledgement of the danger to data   or of the Data Protection Act (1984)…

The Extranet n n Laptops became networkable n n Networks became “PC compatible”   connect to Intranet to upload data to laptops or download data from laptops n n Organisations became more reliant on Intranet   updates not available to employees working “in the field” n n Remote access to the Intranet via login and telephone line allowed them to keep up-to- date without returning to base   improved productivity!!!

The Internet (circa 1996) n n Why bother to spend on long distance telephone lines   Internet now available to laptops n n Data could be sent directly   no worries about interception if sent encrypted…   further cost cutting…

Digital Phone Lines n n Asynchronous Digital Subscriber Line (ADSL) n n Final stage to the digital infrastructure…   no modems needed   data transfer rates greatly improved   Internet protocols could be used throughout   In terms of physical connections, one massive global network….

Why Network anyway? n Advantages of joining computers, and advantages of keeping them “standalone” n Quick exercise in Groups…

Management of Digital Resources n n Traditional model:   resources completely centralised n n Intranet/Extranet/Internet model:   resources can be used anywhere   expected that they will be used responsibly n n How important to the organisation are its digital resources?

A Policy for use of Digital Resources n n Until recently…   overlooked my many organisations n n Problem:   digital resources not physical…   organisations are based on physical assets and their management   networks seen as servers, routers, cables, and staff to maintain them

Who has access to what? n n Not just an organisation problem any more… n n Until fairly recently   personal data kept in locked filing cabinet   person with access had key to cabinet… n n Nowadays on a database…   connected to network… » »connected to the Internet

Availability of Data n n People can’t do their jobs without the right:   Information   Tools to manipulate and store information n n Achieved through “Users” and “Groups of Users”   what about a temp?   or a student on placement?

Restriction of Access Locally n n Only one person (network manager)…   provides access   restricts access n n All information resources need to be assessed in terms of who should have access   e.g. salaries database   accessible to all? HR? managers?

Checking of Users n n Networking software provides many automated functions to watch users   can provide accountability n n Need to be read by someone   Network Manager busy   audit trails have to be scrutinised n n Breaches of security often missed…   sometimes for years!

Restriction of Access on the Internet? n n Cannot be controlled… n n If someone irresponsible gets access to a salaries database…   they could provide global access in seconds! n n If personal data gets onto the Internet who is responsible in law…?   the organisation itself!!!   So far, the Information Commissioner has been lenient. Too lenient?

Attitudes to Privacy of Data n n Seems to be a generational thing n n “Generation Y” (under 40) or digital natives (under 30) often comfortable with information being “out there” n n “My generation” (40-65) a little more suspicious   see advantages & disadvantages n n Most 65+ want to use the Internet as little as possible and would prefer not to have their personal data available at all…

Staffing and Information Management n n Network: network manager n n Data: finance manager n n People’s use of data: HR manager n n Overall responsibility?   who should be responsible?

Salaries and Digital Architecture n n Figures taken from n n Network Manager: £50000 n n Network Security Manager: £55000 n n Network Infrastructure Manager: £57500 n n Information Architecture: £55000 n n Chief Information Officer: £80000

Digital Architecture and Small Organisations n n Most organisations have networks n n Small organisations with <10 staff can’t usually afford a specific network manager   expected to combine function with information security officer, information architecture, etc…   usually report to the finance manager (or the two roles may be combined…

Digital Architecture, Outsourcing, & The Cloud n n Temptation for small organisation to let someone else look after digital information n n Very complex & difficult question   may save money (and even staff…)   but organisation sacrifices control (and may need to change their infrastructure)

Mobile Digital Infrastructure n n As if the job wasn’t already hard enough…   now people save company data on their smartphones   accepted in many companies because it “increases productivity   where did you hear that before? n n Productivity gains need to be seen in a broader perspective…   without proper management of information there can be no organisation…

The World in 2015 n n More networks n n Bigger networks n n More cloud services n n More smart phones n n More personal data “out there” n n Hopefully NOT out of control   those who can help keep it under control will be greatly sought after…