Lecture Introduction to computing - Lecture 31

The contents of this chapter include all of the following: Discuss the special information requirements of an enterprise-sized corporation; identify information systems and software used in the functional units of an enterprise; describe and list general purpose and integrated information systems used throughout an enterprise | CSC 101 Introduction to Computing Lecture 32 Dr. Iftikhar Azim Niaz ianiaz@ 1 1 Last Lecture Summary I Countermeasures Avoiding Identity Theft Protecting your privacy Managing Cookies and spyware Protection from Malware Protecting your System Backup your system Unauthorized Access and Use Preventing Unauthorized Access and Use 2 2 Last Lecture Summary II Digital Forensics Hardware Theft and Vandalism Software Theft Information Theft Handling Storage Media Health Concerns of Computer Use Ethics and Society Computer Ethics, Copyright and Intellectual Property Rights, IT Code of Conduct Green computing, Information privacy 3 3 Objectives Overview Objectives Overview Enterprise Enterprise is large organization such as multinational corporation, university, hospital, research laboratory, or government organization Requires special computing solutions because of its size Enterprise manages large amounts of information over an extensive geographical area and disparate groups of people 6 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures Figure 14-1 Enterprise is large organization such as multinational corporation, university, hospital, research laboratory, or government organization Requires special computing solutions because of its size How does information flow within an enterprise? Enterprise manages large amounts of information over an extensive geographical area and disparate groups of people 7 Enterprise Types Types of enterprises include Enterprise Organization Most traditional enterprises are organized in a hierarchical manner Centralized vs Decentralized Approach Figure 14-2 9 Levels of Users in Enterprise In an enterprise, users typically fall into one of four categories: Figure 14-3 10 Enterprise Information Enterprise information is the information . | CSC 101 Introduction to Computing Lecture 32 Dr. Iftikhar Azim Niaz ianiaz@ 1 1 Last Lecture Summary I Countermeasures Avoiding Identity Theft Protecting your privacy Managing Cookies and spyware Protection from Malware Protecting your System Backup your system Unauthorized Access and Use Preventing Unauthorized Access and Use 2 2 Last Lecture Summary II Digital Forensics Hardware Theft and Vandalism Software Theft Information Theft Handling Storage Media Health Concerns of Computer Use Ethics and Society Computer Ethics, Copyright and Intellectual Property Rights, IT Code of Conduct Green computing, Information privacy 3 3 Objectives Overview Objectives Overview Enterprise Enterprise is large organization such as multinational corporation, university, hospital, research laboratory, or government organization Requires special computing solutions because of its size Enterprise manages large amounts of information over an extensive geographical area and disparate groups

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.