Вы находитесь на странице: 1из 35

IMPLEMENTATION OF IT

BY:
RAM BABU
RAJIL RAMAKRISHNAN
PRERNA THAKUR
PRATHIMA.R
Introduction:
• In an information technology (IT) context, software or hardware
implementation encompasses all the post-sale processes
involved in something operating properly in its environment,
including analyzing requirements, installation, configuration,
customization, running, testing, systems integrations, user
training, delivery and making necessary changes. The word
"deployment" is sometimes used to mean the same thing.

Ram Babu
ETHICS
• Computers and information systems are used everywhere in society.
New technologies are invaluable tools but they may have serious
ethical consequences.
• The way an information technology tool affects sensitive issues has a
direct impact on its effectiveness and usability. It may be difficult for
users and stakeholders to adopt a computer system if they feel that its
use violates important values and interests.
• To take advantage of a computer tool may not be easy in situations
dominated by ethical conflicts. There is a great risk that expensive but
necessary computer systems are abandoned because of scandals
and conflicts.

Ram Babu
Copyrights and Intellectual Rights

Ram Babu
Copyrights:
• Copyright refers to the legal right of the owner of intellectual property.
In simpler terms, copyright is the right to copy. This means that the
original creators of products and anyone they give authorization to are
the only ones with the exclusive right to reproduce the work.

• Copyright law gives creators of original material the exclusive right to


further use and duplicate that material for a given amount of time, at
which point the copyrighted item becomes public domain.

• Copyright law protects creators of original material from unauthorized


duplication or use.

Ram Babu
Intellectual Property Rights:
• Intellectual property rights are the rights given to persons over
the creations of their minds.
• They usually give the creator an exclusive right over the use of
his/her creation for a certain period of time.

Intellectual property rights are customarily divided into two main


areas:

(i) Copyright and rights related to copyright.

• The rights of authors of literary and artistic works (such as books


and other writings, musical compositions, paintings, sculpture,
computer programs and films) are protected by copyright, for a
minimum period of 50 years after the death of the author.
Ram Babu
(ii) Industrial property.

Industrial property can usefully be divided into two main areas:

• One area can be characterized as the protection of distinctive


signs, in particular trademarks (which distinguish the goods or
services of one undertaking from those of other undertakings) and
geographical indications.

• The protection of such distinctive signs aims to stimulate and ensure


fair competition and to protect consumers, by enabling them to
make informed choices between various goods and services. The
protection may last indefinitely, provided the sign in question
continues to be distinctive.

• The protection is usually given for a finite term (typically 20 years in


the case of patents). Ram Babu
PRIVACY POLICY

By:
Rajil Ramakrishnan. T

RAJIL
INTRODUCTION
◦ Closely associated with copyrights and intellectual property right is the issue of privacy.
Data privacy or information privacy is a branch of data security concerned with the
proper handling of data – consent, notice, and regulatory obligations

◦ More specifically, practical data privacy concerns often revolve around . Whether or
how data is shared with third parties. How data is legally collected or stored.

RAJIL
Data Protection

RAJIL
Electronic Surveillance

◦ Electronic surveillance is the monitoring of a home, business, or individual using a


variety of devices such as CCTV, legal wiretapping, cameras, digital video equipment,
and other electronic, digital, and audio-visual means.

◦ Electronic surveillance is the act of recording, observing or listening to individuals in


real-time with or without their knowledge.

RAJIL
Types of Electronic surveillance

◦ Cameras. Digital cameras continue to offer ever-increasing capability in smaller packages


for lower cost.

◦ Audio Surveillance Equipment. Most frequently, small and easily concealed microphones
are used for intercepting conversations.

◦ Signals Tracking.

◦ Signal Interception.

◦ Computer Surveillance.

RAJIL
Digital Surveillance

◦ Digital surveillance is the monitoring of computer activity, data stored on a hard drive,
or being transferred through computer networks. Digital surveillance is usually done
superstitiously and can be done by anyone, government, corporations and even
individuals.

◦ Information from surveillance systems can be used to monitor the burden of a disease
over time, detect changes in disease occurrence determine risk factors for the disease
and populations at greatest risk, guide immediate public health actions for individual
patients or the community, guide programs

RAJIL
Surveillance Network

RAJIL
Cyber security
◦ Cyber security or information technology security are the techniques of protecting
computers, networks, programs and data from unauthorized access or attacks that are
aimed for exploitation.

◦ The purpose of cybersecurity is to help prevent cyberattacks data breaches and


identity theft and can aid in risk management. When an organization has a strong
sense of network security and an effective incident response plan, it is better able to
prevent and mitigate cyber-attacks

RAJIL
Importance of Cyber Security

◦ The rising cost of breaches

◦ Increasingly sophisticated hackers

◦ Widely available hacking tools

◦ A proliferation of IoT devices

◦ Tighter regulations

RAJIL
DIGITAL DIVIDE
BY:
PRERNA THAKUR

PRERNA
IMPACT OF IT

• Technology stress
• Power and stress
• Digital divide
• Social capital
• Education
IMPACT OF IT
• TECHNOLOGY STRESS :- All the technological
equipments , where they are faster computer pagers
or cellphones – these things have opened a world of
oppourtunity.
• In a study , MCI communication corporation ( a
famous research organisation of USA ) found that
59% of American’s experienced some hesitation ,
frustration with technology.
• In some cases, expert say technology overload can
even lead to job loss, divorce and suicides.
• These are several other technological stress
indicators, including sleep deprivation, family and
relationship strain tendency towards multitasking
doing several things.
◦Power and stress

◦Many people use latest techonology


equipments just to keep it as a symbol of
power and status.
◦Expensive it gadgets give them power to
influence and dominate those who are poor
in society. PRERNA
Digital Divide
◦ The term “digital divide” as emerged which
commonly describe the inequalities that exist with
respect with the use of internet and other
telecommunication services.
◦ the digital divide is a disparity of access to
information and communication technologies
(ICTs) between rural and urban areas, separating
those in rural areas from the worlds information
and knowledge resources.

PRERNA
Social Captial
◦Social capital is acquired to repeated
interactions with other individuals or groups
of individuals . Connecting to the internet
create another set of means by which to
achieve repeated interactions.

PRERNA
Education
◦The digital divide is also impact childrens
ability to learn in groups in low incomes
school districts
◦42% students received lower grade
because of this disadvantage.

PRERNA
DEFENSE STRATEGIES

BY:
PRATHIMA.R

PRATHIMA
Defense Strategies
◦ Defense strategies and security in a system involves protecting all
components of the system. This includes data, software and the
hardware. The systems need protector from internal as well as
unintentional damage and misuse.
◦ It is an approach to cybersecurity in which a series of defensive
mechanisms are layered in order to protect valuable data and
information.
◦ Following are some of the strategies to make secure an automated
system.

PRATHIMA
Audit Trails
◦ An audit trail(audit log) is a security relevant chronological record, that
provide documentary evidence of the sequence.
◦ An audit trail is a step-by-step record by which accounting or trade
data can be traced to its source. Audit trails are used to verify and track
many types of transactions including accounting transactions and
trades in brokerage accounts.

PRATHIMA
Controlled Access
◦ Controlled access is a security measure to control the system.
◦ In controlled access, the stations seek information from one another
to find which station has the right to send. It allows only one node to
send at a time, to avoid collision of messages on shared medium.

PRATHIMA
Data Encryption
◦ Data encryption translates data into another form, or code, so that only
people with access to a secret key (formally called a decryption key) or
password can read it.
◦ Encrypted data is commonly referred to as ciphertext, while
unencrypted data is called plaintext. Currently, encryption is one of the
most popular and effective data security methods used by
organizations. Two main types of data encryption exist - asymmetric
encryption, also known as public-key encryption, and symmetric
encryption.
◦ It is a security method where information is encoded and can only be
accessed by a user with correct encryption key

Cipher
Plaintext Plaintext
Text
PRATHIMA
AUTHENTICATION
• Authentication is the process of verifying the identity of a
person or device.
• A common example is entering
a username and password when you log in to a website.

Entering the correct login information lets the website know


1) who you are and
2) that it is actually you accessing the website.

PRATHIMA
AUTHORIZATION

•Authorization is a security mechanism to determine access levels or


user/client privileges related to system resources including files, services,
computer programs, data and application features.
• This is the process of granting or denying access to a network resource
which allows the user access to various resources based on the user's
identity.
•It is a process of verifying what you want to access.

PRATHIMA
PRATHIMA
Virus Protection
◦ Virus protection software is designed to prevent viruses, worms and
Trojan horses from getting onto a computer as well as remove any
malicious software code that has already infected a computer.
Most virus protection utilities now bundle anti-spyware and anti-
malware capabilities to go along with anti-virus protection.

PRATHIMA
FIRE WALL
◦ Fire wall is a network security that monitor and controls network traffic.
◦ A firewall is a system designed to prevent unauthorized access to or
from a private network. You can implement a firewall in either hardware
or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected
to the internet, especially intranets.

PRATHIMA
Back Up and Recovery Process
◦ Back up and recovery is a process of backing up of data incase loss of
information.
◦ Backup and recovery describes the process of creating and storing
copies of data that can be used to protect organizations against data
loss. This is sometimes referred to as operational recovery. Recovery
from a backup typically involves restoring the data to the original
location, or to an alternate location where it can be used in place of the
lost or damaged data.

PRATHIMA
PRATHIMA

Вам также может понравиться