BSC CSIT
BSC CSIT
It is the monitor based on cathode ray tube. It is the monitor based on liquid crystal display technology.
Vacuum Tube and electron gun used as functional component. Liquid crystal used as functional component.
Light glow when electron beam strikes on phosphor coated screen of CRT. Light glow while supplying electricity and liquid crystal becomes transparent
CRTS are big and bulky LCD's are thin and light.
High power consumption and more heat production. Low power consumption and less heat production.
• Anti Virus
• Disk Cleaners
• Disk compression
Anti Virus
• It is the utility software which is used to scan computer for viruses
and prevent the computer system files from being corrupt.
• Disk Cleaners: It is used to find files that have not been used for a
long time. This utility also serves to increase the speed of a slow
computer.
• Disk Compression: It increases the amount of information that can be
stored on a hard disk by compressing all information stored on a hard
disk.
Application Software
• The software that is written by the user to solve a specific user
oriented problem using the computer is known as application
software.
• A software that allows us to do things like create text documents, play
games, listen to music or surf the web is called application software.
These program directs a computer to solve user oriented problems.
such as preparing bills, mark-sheet etc.
Types of Application software
• A. Packaged software: It is generalized set of program designed and
developed for general purpose. It is generally large sized, error free,
advance and standard software for special work. Word processing,
database, graphics animation, web designing software are packaged
software.
• Advantages: It is user friendly and easy to run, it is designed for
general purpose.
Packaged software examples
• Word Processor: Word processing software is used to manipulate a
text document, such as a resume or a report. Examples of Word
processing software are: Soft Word, WordStar, Word perfect,
Microsoft Word.
Functions of word processing software are:
• Creating, editing, saving and printing documents.
• Copying, pasting, saving and printing documents.
• Formatting text, such as font type, bolding text.
• Inserting elements from other software.
• Creating and editing tables.
MS word window Elements
Spreadsheet
• A spreadsheet is computer software that is mainly used for making
calculations. It sets out grid where users can analyze and organize
number, financial data and other information. It is an application
program that contains grid of rows and columns.
• Some of the examples of spread sheet software are: Microsoft excel,
Spread 32 etc.
• MS-Excel is spreadsheet software developed by Microsoft company.
Excel window
Presentation Software
• Presentation is a way of attracting audience towards our views and
arguments. MS-PowerPoint is a software application included in MS-
office package. Features of MS PowerPoint:
• Slide show for presenting information
• Transition effect can be included.
• Support different multimedia facilities.
• Automatic slide transitions and animations.
Types of application software
• B. Customized or Tailored Software: It is a small software designed to
meet the specific requirements of an organization or individuals. It is
developed on the demand of customer. It serves only one user or
organization. It is written using a high level programming language
such as c, C++, java etc.
• Advantages: It is easy to modify, It is very cheap.
Unit 6
• Operating System
OS
• Operating System: An operating System is a system software, which is
set of specialized programs that are used to control the resources of a
computer system. It is an organized set or collection of software that
controls the overall operation of the computer system and provides
an environment.
• It is a large and complex software consisting of several components.
Functions of OS
• Process Management: A process is a program basically a program
that is being currently run by a user on a computer system. The
process management activities handled by the OS are: create, execute
and delete a process, Schedule a process , synchronization,
communication and deadlock handling for processes.
• Memory management: The OS manages the memory resources of a
computer system. All the programs are loaded in the main memory
before their execution. It allocate memory, free memory, reallocate
memory.
Functions of OS
• File Management: The OS manages the files and directories of a
computer system. The file management tasks include: Create and
delete files, provide access to files, keep back up of files.
• Protection and security: The OS protects the resources of system
from various threats such unauthorized access.
• User Interface : Operating system provides an interface between the
computer user and the computer hardware.
Types of OS
• Single User and single Task OS: These Operating systems allow only
one user to operate at a time. DOS is the most popular single user OS.
These OS are mainly used on personal computers. In DOS we can not
run another program at same time. For this we will have to close the
first program.
• Single User and Multitasking OS: In multi-tasking , two or more
program's can be executed by one user concurrently on the same
computer with one central processor. It allows execution of more
than one task or process concurrently. For this the processor time is
divided in different tasks. This division of time is also called time
sharing. Windows 95, 98, windows 2000 etc.
Types of OS
• Multi User OS: It allows simultaneous access to a computer system
through two or more terminals. it is use in computer networks that
allow same data and applications to be accessed by multiple users at
the same time. A dedicated transaction processing system such as
railway reservation system that supports hundreds of terminal under
control of a single program is an example of multi- user operating
system eg Linux, Unix etc.
• Multiprogramming OS: In multiprogramming operating system more
than one job resides in main memory and hence the memory is
utilized. The CPU picks one job and starts executing it, when the job
required to perform input /output operation, the CPU does not sit
idle and picks next job and start executing its instruction.
Types of OS
• Multiprocessing OS: Multi- processing is a processing done by two or
more computers or processors linked together to perform work
simultaneously at the same time. Unix, Linux and windows 7 are
examples of multiprocessing OS.
• Real time OS: The real time operating system has well defined, fixed
time constraint and processing must be done within fixed time
constraint. This operating system provides quick response time. These
are used to respond to queries in areas like medical imagine system,
industrial control systems.
Batch processing OS
• Batch processing Operating Systems are the operating system that do not interact
with users during execution of task. Users prepare their jobs on an off-line device
like punch card or tape and submit it to the computer operator. After collecting
large number jobs, operators will provide it to computer and jobs are executed
one by one.
Open source Operating system
• Open source operating system is any operating system that is free to used and
which provides the original code where the source code is available to the public,
which enables them to use , modify/ enhance the OS. The different open source
OS are:
• Linux, FreeDOS[IBM PC], Phantom OS[ Russian developers] etc.
Unit VII
Computer Network: Introduction of Networking, Types of Networking, Data
transmission, Communication protocol, Topology
Computer Network
Network: A computer network is a group of computer systems and other
computing hardware devices that are linked together through communication
channels to facilitate communication and resource- sharing among a wide range
of users.
It is the interconnection of two or more than two nodes which are able to
exchange information by means of transmission medium either wire or wireless
and protocols.
Communication Network
Computer Network
Advantages of Computer Network
• Computers in a network can access network-connected hardware devices like
printers, disk drives etc.
• Online communication
• Product promotion
• On-line shopping
On-line journals and magazines
On-line banking.
Protocols
• Communication between computers would be impossible without protocols.
Protocols are set of rules that the computers on the network must follow to
communicate and to exchange data with each other. They are used to make
logical connection between different computers and transfer data from one node
to another.
• TCP/IP: Transmission control Protocol/ Internet Protocol. It is responsible for
addressing data converting them into packets and routing the data packets.
• HTTP: Hyper Text Transfer Protocol is used to transfer data and files on the
Internet. FTP: File Transfer Protocol provides a method to transfer files between
two computers.
• SMTP: Simple Mail Transfer Protocol is used to transfer mail and attachment on
the network.
• POP: Post Office Protocol is a common protocol used for fetching mails from the
mail server to a user's computer.
TCP/IP
TCP/IP TCP/IP stands for Transmission Control protocol and
Internet Protocol. The main design goal of TCP/IP was
to build an interconnection of networks, referred to as
an internetwork, or internet, that provided universal
communication services over heterogeneous physical
networks. The clear benefit of such an internetwork is
the enabling of communication between hosts on
different networks, perhaps separated by a large
geographical area. TCP/IP layers are:
• Application Layer: The top layer of the protocol stack
is the application layer. It refers to the programs that
initiate communication in the first phase. TCP/IP
includes several application layer protocols for mail,
file transfer, remote access, authentication.
TCP/IP Transport Layer[Host to Host]: The transport layer is
responsible for providing the application layer with
session and datagram communication services.
Internet Layer: The Internet layer handles the transfer
of information across multiple networks through the
use of gateways and routers. It deals with the routing
of packets across these networks as well as with the
control of congestion.
Network Layer/ physical layer: Physical layer is
responsible for placing TCP/IP packets on the network
medium and receiving TCP/IP packets of the network
medium.
The Internet Architecture
• Internet is a network of interconnected networks and is designed to operate
without a central control. If a portion of the network fails, connection is made
through alternative paths available. The architecture of Internet is hierarchical in
nature.
• Client (User of computer): Lowest level in hierarchy.
• ISP (Internet service Provider) is at the next higher level.
• A router is a special hardware system consisting of a processor, memory and I/O
interface used for the purpose of interconnecting networks.
• Regional ISP
Managing the Internet
• Internet is not controlled by any one person or an organization. A
number of organizations manage the Internet. The Internet Society
(ISOC), World wide web consortium (W3C), Internet Architecture
Board (IAB), which are giving directives and guidelines for the proper
use of the Internet.
• Connecting to Internet: A TCP/IP enabled computer, Software(like
web browser), an account with an ISP, Connection line( telephone
line, coaxial cable or fiber connection).
Internet Connections
• Different types of internet connections are provided by the ISPs. User
can select the internet connection on the basis of their requirement
i.e. bandwidth and cost.
• Dial –Up
• Leased Line
• Integrated services Digital Network (ISDN)
• Digital Subscribe Line (DSL)
• Cable Modem
Services of Internet
E-mail: E-mail consist of text based message and the optionally attached
attachments which are used for sending, receiving and saving message over
electronic communication system. The E-mail service allows an internet user to
send mail to another internet user in any part of the world in a very short time.
• Uses of E-mail
• Information exchange
• Staying in touch professionally
• Staying in touch socially
• transmitting documents
• Publish an online newsletter
• Publicize special promotions or events etc.
Services of Internet
• Video Conferencing: Video Conferencing refers to live , visual
connection between two or more people in which two or more sets
of hardware and software interact while simultaneously transmitting
and receiving video and audio signals from two or more geographic
locations.
• " A live connection between people in separate locations for the
purpose of communication, usually involving audio and often text as
well as video.
Services of Internet [Telnet]
• Telnet is a program that allows the user to log into a remote computer on the
Internet as a user on that system. It allows the user to log in to a remote
computer in such a way that a person may use it as if it is being used locally.
• WWW: The world wide web is the most important service available on the
Internet. It was created in 1990 European Particle Physics laboratory in Geneva,
Switzerland to exchange and share data through the Internet using a protocol
known as HTTP.
• Terms used in Internet
• Download: Download refers to copying files or documents or programs or data
from the Internet server to the user's computer.
• Upload: Upload refers to copying files or documents or programs or data from
users computer to the Internet.
Terms used in Internet
• Web browser: Web browser is client based application software that allows a
user to display and interact with a hypertext documents. It can be a graphical
interface or text based interface browser. Some common web browsers are
Microsoft Internet Explorer, Mozilla, Google Chrome, Netscape etc.
• Web page: The fundamental unit of web is the web page. Web page is the
collection of information that is stored in the website. It is a document that
contains links, texts, images, audio and video as well as other internet services.
Terms used in Internet
• Website: Website is the location of web pages created by any organizations,
government offices or personal site to provide information. Each and every
website has its own address, is called internet address. After connecting the
internet, we have to search any information by using related websites address.
• Web server : A web server is a program that, using the client/server model and
the World Wide Web's hypertext transfer protocol (HTTP), serves the files that
form web pages to web users. Every computer on the internet that contains a
web site must have a web server. Two leading web servers are Apache, the most
widely-installed web server and Microsoft's Internet Information sevices (IIS).
• Apache Web Server: One of the most popular web server in the world developed
by the Apache software Foundation. Apache is an open source software
which supports almost all operating systems including Linux, Unix, Windows,
Mac OS.
• IIS Web Server: Internet Information Services formerly known as Internet
Information Server, Is a web server produced by Microsoft. This server has all
the features just like apache. But it is not an open source .
Terms used in Internet
URL:Every resource on the Internet has its own location identifier or Uniform
Resource Locator (URL). URLs are used to address and access individual web pages
and internet services or access as well as the access method and the location. It is a
web addressing scheme that spells our exact location of an internet resource. The
protocol that the www uses is Hypertext Transport Protocol (HTTP), and web page
is programed using HTML codes.
• DNS (Domain Name System):
• DNS is used for converting host names and domain names into IP addresses on
the Internet or on local networks that use the TCP/IP protocol. IP address is a
unique number separated by period. DNS automatically converts the website
names types in web browser address bar to the IP addresses of web servers
hosting those sites. DNS implements a distributed database to store this website's
name and IP address information for all public hosts in the Internet.
Terms used in Internet
• Search Engine:
• A search engine is a web site that collects and organizes content from all over the
internet. Those wishing to locate something would enter a query about what
they'd like to find and the search engine provide links to content that matches
what they want. It constitutes of its various database and searches the term
relevant to the query or keyword entered, gathers and reports information that
contains, and display the URL of the website as a returned query related to
specified terms. For example: google.com, yahoo.com, bing.com etc.
ISP
• Internet service Provider is a company that offers its customers access
to the Internet. ISP connects to its customers using a data
transmission technology appropriate for delivering Internet Protocol
such as dial-up, Cable modem or dedicated high speed interconnects.
Proxy Server
• A proxy Server verifies and forwards incoming client requests to other
servers for further communication. A proxy server is located between
a client and a server where it acts as an intermediary between the
two, such as a web browser and a web server.
• The proxy server's most important role is providing security.
Intranets
• An intranet is a private computer network that uses Internet technologies to
securely share any part of an organization's information or operational systems
with its employees.
• An intranet can be understood as a private version of the Internet or as a private
extension of the Internet confined to an organization
Extranet: It is a business to business intranet that allows limited, controlled, secure
access between a company's intranet ad designated, authenticated users from
remote locations. It is an intranet that allows controlled access by authenticated
parties. An extranet can be viewed as part of a company's intranet that is extended
to users outside the company.
Internet of Things (IOT)
• The Internet of Things, also called the Internet of objects refers to a wireless
network between objects, usually the network.
• The term "Internet of Things" has come to describe a number of technologies and
research disciplines that enable the Internet to reach out into the real world of
physical objects.
Wearable Computing
• The terms "Wearable technology", "Wearable devices" and technologies or
computers that are incorporated into items of clothing and accessories which can
comfortably be worn on the body. These wearable devices can perform many of
the same computing tasks as mobile phones and laptop computers.
• Features of wearable computer:
• Consistency: The computer runs continuously and is user friendly.
• Enhancement, Privacy
Cloud Computing
• The term cloud has been historically as a metaphor for the Internet and has
become a familiar. Cloud computing is a model for enabling convenient, on
demand network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal management effort or
service provider interaction.
• It entrusts remote services with a user's data, software and compution.
E-commerce
• E-commerce or electronic commerce, a subset of e-business, is the purchasing,
selling and exchanging of goods and services over computer networks through
which transactions or terms of sale are performed electronically. It is any form of
business transaction in which the parties interact electronically. E-commerce
provides the mechanism of selling and buying of goods and services using
Internet technologies.
Advantages: 24*7 operation, Knowledge of Customer behavior, Global reach.
E- governance
• E-governance stands for electronic governance which is composed of information
technology, people and governments. E-governance is the application of
electronic means to improve the interaction between government and citizens;
and to increase the administrative effectiveness and efficiency in the internal
government operations.
• Why e-governance?
• To bridge the gap between government and citizens.
• To provide effective and efficient services.
• To enhance participation of people in choice and provision of governance
products and services.
Advantages of e-governance
• It is easy to access data and information.
• It become one portal for delivering government services.
• The government services will be made a available to the citizens in a
convenient, efficient and transparent manner.
Smart City
• A smart city is an urban area that uses different types of electronic data collection
/ sensors to supply information used to manage assets and resources efficiently.
This includes data collected from citizens, devices and assets that is processed
and analyzed to monitor and manage traffic and transportation systems, power
plants, water supply networks, waste management, information systems, schools,
libraries, hospitals and other community services.
• Information and communication technology(ICT) is used to enhance quality,
performance and interactivity of urban services, to reduce costs and resource
consumption and to increase contact between citizens and government.
Geographical Information System
• GIS is a computer based tool for mapping and analyzing things that exist and
events that happens on earth. It is an information system that integrates stores,
edits, analyzes, shares and displays geographic information. GIS is a computer
based information system used to digitally represent and analyze the geographic
features present on the earth's surface and the events taking place on it.
• Applications of GIS
• Scientific investigations, Resource management, Urban planning, Geographic
history, marketing
Advantages of GIS
• Cost savings from greater efficiency
• Improved communication
• Better Decision making
• Better Record Keeping
• Managing Geographically
Unit 9 Fundamentals of Database
• Database system, Database Management System, applications, Data
warehousing, Data Mining and Big data.
DBMS
• Database and database technology are having a major impact on the growing use
of computers. Database plays a critical role in almost all areas where computers
are used including business, engineering, medicine, law, education, and library
science, etc.
• A database management system (DBMS) is a collection of interrelated data and a
set of programs to access those data. The collection of data, usually referred to as
the database, contains information relevant to an enterprise. The primary goals
of DBMS are to provide a way to store and retrieve database information that is
both convenient and efficient. Database systems are designed to manage large
bodies of information. Management of data involves both defining structure for
storage of information and provides mechanisms for the manipulation of
information. In addition, the database system must ensure the safety of the
information stored, despite system crashes or attempts at unauthorized access. If
data are to be shared among several users, the system must avoid possible
anomalous results. Because information is so important in most organization,
computer scientists’ have developed a large body of concepts and techniques for
managing data.
Application of DBMS
• Enterprise information : Sales: for customer, product, and purchase information.
• Accounting: for payments, receipts, account balance, assets and other accounting
information.
• Human resources: for information about employees, salaries, payroll taxes, and
benefits, and for generation of pay checks.
• Manufacturing: for management of supply chain and for tracking production of
items in factories, inventories of items in warehouses and stores and orders for
items.
• Banking and finance : Banking: for customer information, accounts, loans, and
banking transaction . Credit cards and transactions: for purchases on credit cards
and generation of monthly statements.
• Universities: for students information, course registrations, and grades (in
addition to standard enterprise information such human resources and
accounting). Telecommunications: for keeping records of calls made, generating
monthly bills, maintaining balances on prepaid calling cards, and storing
information about the communications networks
Functions of DBMS
• Systematic organization of Information:
• For performing Common Operation:
• Quick retrieve of information:
• To centralize the data and improve the security of the data.
SQL
• Structured Query Language a database computer language designed
for managing data in relational database management system
(RDBMS). SQL allows an individual to create, update, and retrieve
data from database. SQL is very easy to learn.
• Features of SQL:
• SQL is an English- like language. It uses words, such as select, insert,
delete .
• SQL is a non- procedural language.
• Creating, modifying and deleting database objects.
Data Security
• Data security refers to protective digital privacy measures that are applied to
prevent unauthorized access to computers, databases and websites. It is a
process of protecting files, databases, and accounts on a network by adopting a
set of controls, ,applications and techniques that identify the relative importance
of different datasets.
• Essential steps for data secure
• Establish strong Passwords:
• Anti virus protection:
• Secure systems:
• Backup regularly:
Data warehouse
• Data warehouse is a collection of data designed to support
management decision- making. It is a computer database that
collects, integrates and stores an organization's data . It is a subject
oriented, integrated, time variant and non volatile collection of data
in support of management decision making process. The primary goal
of a data warehouse are :
• Provide access to the data of an organization
• Capacity to separate and combine data.
• Drive business re-engineering
Advantages of Data warehouse
• More cost-effective decision-making
• Enhanced customer service
• Business reengineering
• Information System reengineering
Data Mining
• Data mining, the extraction of hidden predictive information from large
databases, is a powerful new technology with great potential to help companies
focus on the most important information in their data warehouses.
DBMS Model
Hierarchical Model: It is one of the oldest database Model. This model arranges the
files used in the database in a top-down structures. The top file is called the root,
the bottom files are called leaves and intermediates files have 1 parent and one or
several children files.
Advantages: It is easiest model of database. Searching is fast and easy if parent is
known. This model is very efficient in handling one to many relationship.
Disadvantages: It is outdated database model. Can't Handle 'many to many'
relationship.
Database Model
• Network Database Model: Network model systems are still popular for high
volume transaction. This model is very flexible as any relationship can
implemented. Advantages : More flexible than hierarchical because it accepts
many to many relationship. Reduce redundancy because data should not
repeated. Searching is fast because of multi- directional pointers.
• Disadvantage: Very complex type of database model. Needs long programs to
handle the relationship. Pointers need in the database increases overhead of
storage. Less security in comparison to hierarchical model because it is open to
all.
Relational Database Model
• It is most common database model for new systems . The relational model was
developed by E.F. codd . This model defines simple tables for each relation and
many to many relationship. Primary and secondary key indexes provide rapid
access to data based upon qualifications. Advantage: Rapid database processing
is possible. It has very less redundancy. Normalization is possible.
• Disadvantages: It is more complex than other models. Too many rules makes
database non user friendly.
E-R Model
• Entity Relationship model : E-R model is a model of the real world. E-R model
represents the entities contained in the database. The entities are further
described in the database using attributes. The relationship between the entities
is shown using the relationships.
• Entity: An entity is the basic unit for modeling. It is a real –world object that exists
physically or conceptually. An entity that exists physically is a tangible object like
student, employee, room etc. A set of entities of the same type having same
properties or attributes is defined as an entity set. For example, a set of all
persons who are students of the university can be defined as an entity set
student.
• Attribute: An attribute describes some property or characteristics of the entity.
For e.g. student name, student address, student age are attributes of the entity
student.
Relationship
• An association or link between two entities is represented using a relationship.
• One to one
• One to many
• many to one
• Many to many
Relationship
Relationship
DBA
• DBA is a person or a group of persons who manages the data, determine the
content, internal structure of Database, defines security and monitors
performance. DBA has centralized control of the database and coordinates all
activities of the database system.
• The function of DBA:
• Defining of schema
• Manage all the users who use database and apply security.
• Granting user authority to access the database.
• Make proper backup and also develop recovery procedure if database crashes.
Unit 9
• Multimedia Introduction
Introduction Multimedia
• The word multimedia is made up of two separate words: multi and media, which
mean many and materials, through which information may be transmitted. This
includes text, graphics, animation, video, sound and computer programs.
• Advantages :
• Multimedia enhances the information for better communication.
• It makes teaching learning easier in the classroom.
• It is portable.
• It makes presentation of the related subject matter attractive.
• Presentation can be done in a big screen, so that many people can see it.
Disadvantages of Multimedia
• It needs a multimedia computer set and techno man to prepare the multimedia
presentation. So it may be more expensive to prepare in the beginning.
• It is not possible to distribute and use in the remote area where poor people stay.
Elements of Multimedia
• Text: Displays alphanumeric characters on the screen to present information. It is
the base layer of almost all programs.
• Graphics /Image : Computer graphics make a computer capable of displaying and
manipulating pictures. It is a more powerful way to illustrate information than the
text. Quality of images determine by following two factors: Resolution [Higher the
resolution better will be the image quality] Color Depth [ Number of bits used to
represent a color is called color depth.]
• Animation: Animation is a simulation of movement created by displaying a series
of pictures or frames. Cartoons on television are an example of animation.
• Video: Video deals with recording and display of a sequence of images at a
reasonable speed to create an impression of movement.
• Sound: Sound is a significant aspect of exciting and successful multimedia
application. Sound effects are used to accompany animation and increased the
interactivity with the user.
Application areas of Multimedia
• Video Games : Multimedia technology is adopted in computer video games. Due
to the arrival of multimedia technology, it is making possible to keep interactive
and exciting sound, graphics or animation in the video games available in the
computer.
• Education and Training : Computer based training (CBT) is a type of multimedia
product which allows users to learn at their own place. Information is presented
using different media types and allows the user the opportunity to review
previous topics.
• Apply special effects in Film: Several movies nowadays contain many visual
tricks, which could never be accomplished without the aid of multimedia
computer technology. The English movies like Titanic, star war, superman, spider
man have used multimedia technology for providing special effects.
Application areas of Multimedia
• Product Promotion: Advertising is perhaps one of the biggest
industry's that use multimedia to send their message to the masses.
Using multimedia techniques can significantly make an item being
advertised better received by the masses and in many cases with
greater results.
Unit 11
• Computer Security: [ Confidentiality, Integrity, Availability]
• With the development of public networks like internet, it needs more and better
security. To make a system secure, various security dimensions are needed such
as, good physical security is necessary to protect physical assets like system.
• Confidentiality: Confidentiality is the concealment of information or resources.
Cryptography can be the better choice for maintaining the privacy of information,
which traditionally is used to protect the secret messages. Similarly, privacy of
resources, i.e. resource hiding can be maintained by using proper firewalls.
Confidentiality is sometimes called secrecy or privacy.
• Integrity: Integrity ensures the correctness as well as trustworthiness of data or
resources. For example, if we say that we have preserved the integrity of an item,
we may mean that the item is accurate, unmodified, modified only by authorized
people.
Computer security
• Availability: Availability refers to the ability to use the information or resource
desired.
It is present in a usable form.
It has capacity enough to meet the service's needs.
It is making clear progress, and if in wait mode, it has a bounded
waiting time.
The service is completed in an acceptable period of time.
Goals of Security
• prevention: Prevention is to prevent the attackers from violating security policy.
Prevention means that an attack will fail. Typically, prevention involves implementation
of mechanisms that users can not override and that are trusted to be implementation of
mechanisms that users can not override and that are trusted to be implemented in a
correct ways so that the attacker can not defeat the mechanism by changing it.
• Detection: Detection is to detect attacker's violation of security policy. so it occurs after
someone violate the policy. The mechanism determines that a violation of the policy has
occurred due to attack and reports it. Detection is most useful when an attack can not be
prevented.
• Recovery: Recovery is to stop attack and to assess and repair if any damage caused by
attack. With recovery, it should be such that the system continues to function correctly,
possibly after a period during which it fails to function correctly, due to attack.
Security Threat & Security Attack
• Threat: It is a potential for violation of security, which exists when there is a
circumstance, capability, action or event that could break security and cause
harm. Threats can be categorized into four classes:
• Disclosure: It leads to an unauthorized access to information. [Snooping]
• Deception: It leads to acceptance of false data.
• Disruption: It leads to an interruption of correct operation.
Types of Attack
• Attacks may be classified based on the nature. It may be an active attack or
passive attack. A passive attack attempts to learn or make use of information
from the system but does not affect system resources. An active attempts to alter
system resources or affect their operation.
• Passive attack
• Active attacks
Malicious Software
• Malicious software refers to a broad category of software threats to the
computer network and systems. The most sophisticated types of threats to
computer systems are presented by malicious codes or software that exploit
vulnerabilities in computer systems.
• Any code which modifies or destroys data, steals data, allows unauthorized
access, exploits or damage a system and does something that user did not intend
to do, is called malicious code.
Security Mechanisms
• To secure every system from attacks a set of security mechanism are
implemented. Security mechanism is a process that is designed to detect, prevent
or recover from a security attack.
• Cryptography: The word cryptography comes from Greek words Kryptos meaning
"hidden or secret", and graphein meaning writing thus cryptography means
"secret writing". It is an art and science of information hiding.
• It consist of encryption and decryption process. The encryption is the process of
encoding a message so that its meaning is not obvious i.e. converting information
from one form to some other unreadable form using some algorithm.
• The decryption is the reverse process, transforming an encrypted message back
into its normal, original form. In decryption process also the use of key is
important.
Digital Signature
• Digital signature schemes normally give two algorithms, one for
signing which involves the user's secret or private key, and one for
verifying signatures which involves the user's public key.
• A signature provides authentication of a "message", Messages may be
anything, from electronic mail to a contract or even a message sent in
a more complicated
Security services
• A processing or communication service that enhances the security of the data
processing systems and information transfers of an organization. The services are
intended to counter security attacks and they make use of one or more security
mechanisms to provide the service. Security services include following services,
• Authentication
• Access control
• Data confidentiality
• Data Integrity
Firewall
• Firewall is hardware device or software applications that act as filters between a
company's private network like Local Area Network and public Wide Area
Network (WAN) like Internet. It protects networked computers.
• The main purpose of a firewall system is to control access to or from a protected
network. It implements a network access policy by forcing connections to pass
through the firewall, where they can be examined and evaluated. A firewall
system can be a router, a personal computer. It provides several types of
protection.
They can block unwanted traffic.
They hide vulnerable systems, which can't easily be secured from the
Internet.
They can provide more robust authentication.
User Identification and Authentication
• identity is simply a compute's representation of an entity. A principal is a unique
entity and an identity specifies a principal.
• User identification(User ID) is a logical entity used to identify a user on a
software, system, website or within any generic IT environment.
• Authentication is the process of validating user identity. The fact that the user
claims to be represented by a specific object like user id does not necessarily
mean that this is true. Authentication is the binding of an identity to a subject.
• Password based authentication
• Biometric Authentication
Intrusion Detection Systems
• Intrusion Detection is a technique of detecting unauthorized access to a
computer system or a computer network. An intrusion into a system is an attempt
by an outsider to the system to illegally gain access to the system. An intrusion is
a deliberate unauthorized attempt, successful or not, to break into, access,
manipulate or misuse some valuable property .
• Security Awareness: Security awareness defines the knowledge and
consciousness regarding security measures. This also includes the attitude the
members of an organization possess regarding the protection of the physical and
logical assets of that organization. It includes the trade secrets, privacy concerns
and government classified information, employee and contractor responsibilities
in handling sensitive information.
Security Policy
Practical
• Prepare your bio data in MS word, Insert watermark in background of
your college name.[5]
• Prepare a mark sheet of ten student with total, result percentage,
division and remarks.[10]
• Create a power point presentation with customized animation on
your campus.[5]
Switching
• The controlling or routing of signals in circuits to transmit data between specific
points in a network is called switching. Networks allow sharing of communication
medium using switching. Switching routes the traffic(data traffic) on the network.
It sets up temporary connections between the network notes to facilitate sending
of data. There are there kinds of switching 1. packet switching 2. Circuit switching
3. Message switching.
Circuit switching
• It is a method of implementation a telecommunication network in
two network nodes establish a dedicated communication medium. It
is commonly used in the telephone communication network.
• Message Switching: Message switching is a network switching
technique in which data is routed in its entirety from the source node
to the destination node. In this switching, every intermediate switch
in the network stores the whole message.
• Message switching does not establish a dedicated path between the
two communicating devices i.e. no direct link is established between
sender and receiver. It uses the “store and forward” mechanism. In
this mechanism , the network nodes have large memory storage.
Packet switching
• Packet switching is a digital network transmission process in which data is broken
into suitably sized pieces or blocks for fast and efficient transfer via different
network devices. When a computer attempts to send a file to another computer,
the file is broken into packets of defined size so that it can be sent to the network
in the most efficient way. These packets are then routed by network devices to
the destination. Each packed is numbered. Packet switching is commonly used for
computer networks, including the Internet.