Uploaded by afree.chitra

MANAGEMENT INFORMATION SYSTEMS

advertisement
Opt-in
 A comparison table of Opt-in and Opt-out
1. An opt-in framework is one in
which an individual should
effectively show intrigued or a
longing to be a portion of
something.
1. An opt-out course of action
makes clients a portion of a
system and gives them the
opportunity
to
evacuate
themselves from it.
2. An opt-in ascension is one in
which somebody needs to
effectively choose that the
individual in question needs to be
a piece of a bulletin or other
chance.
2. In an opt-out course of action,
somebody is naturally qualified as
a contact and they become
enrolled
through
another
framework.
3. Here, You unequivocally agree
to permit information to be
incorporated about you.
3. In contrast, data can be
accumulated about you except if
you explicitly demand it not be.
4. Ordinarily, opt-out is utilized as
a term for the administration
that's being connected for USAmerican coordinate promoting
messages.
5. Opt in mail promoting is known
as “authorization-based”
5. Opt out is ordinarily called
SPAM.
6.
How
one's
personal
information is gathered is
imperative - must fall inside 6
legitimate bases.
6. Implicit opt-in, no requirement
for explicit assent.
7. Assent must be openly given,
educated and unambiguous, and
got preceding any information
assortment.
7. Opt-out guide companies to
not sell information.
Opt-out
4. Opt-in is the administration
that's utilized beneath European
and
Canadian
information
assurance rules.
 A comparison table of LAN, WAN and VPN
SL
no.
Basis of
comparison
1.
Stands For
2.
3.
4.
5.
6.
7.
LAN
WAN
Virtual Private
Network
Covers
Nearby regions only
Large geographic ranges Covering a few
(e.g., homes,
(e.g., cities, states,
distinctive platforms.
workplaces, schools) countries)
(e.g., private servers)
Definition
A local area network A wide area network
A VPN is a protected
(LAN) may be a
(WAN), is an expansive association from
bunch of devices
network of data that isn't exterior the LAN,
inside a geographic
attached to a solitary
through the web. A
zone that share the
area. WANs can
VPN makes a passage
same
encourage
that utilizes
communications line. communication and the encryption algorithms
sharing of data from
to make sure about
around the globe
the data from the
through a WAN
exterior to the interior
supplier.
of the system.
Data
LANs have a high
WANs have a lower
VPN services are
transfer
information exchange information exchange
ordinarily speedier,
rates
rate.
rate contrasted with
on the grounds that
LANs
they can oversee more
servers for data
exchange capacity for
per client
Technology Tend to utilize certain WANs will in utilize
VPN guarantee to
network
technologies like
secure sends
technologies,
MPLS, ATM for the
encrypted congestion
principally Ethernet
network over longer
over an open system,
and Token Ring.
separations
for example, the
Internet. The Secure
VPN of technologies
are IPsec and SSL.
Ownership
Ordinarily owned and WANs are not owned
ownership of
overseen by a single
by any one association
distinctive VPNs is
individual or
but or maybe exist
part among several
organization.
beneath collective or
subsidiaries
conveyed ownership
over long separations.
Maintenance Since it covers a
Keeping up WAN is
Though VPN burrows
costs
moderately little
troublesome in view of
are genuinely low
topographical region, its more extensive
upkeep, their
LAN is simpler to
geological inclusion and maintenance and
preserve at generally higher Maintenance
support expenses can
low expenses.
expense.
rapidly mount
Local Area Network
Wide Area Network
VPN
8.
Bandwidth
9.
Connection
10.
Congestion
High data transfer
capacity is accessible
for transmission.
One LAN can be
associated to other
LANs over any
separate by means of
phone lines and radio
waves.
Low data transfer
capacity is accessible
for transmission.
Computers associated
with a wide territory
arrange are frequently
associated through open
systems, for example,
the phone framework.
Less congested
More congested
Here, Bandwidth
depends on server’s
affordable speed.
VPN permits you to
make a protected
association with
another system over
the Internet. VPNs
can be utilized to get
to area confined sites.
Depends on networks,
the more clogged the
system is, the less
steady VPN
association will be.
• Bluetooth
is
a
broadcast
communications
industry
determination that depicts how cell
phones, computers and different
devices
can
effectively
communicate with one another
utilizing a short-extend wireless
connection.
• Bluetooth adapter on all the
devices interfacing with each other.
• Fairly basic to use and exchanging
between devices is simpler.
Wi-Fi
Bluetooth
 A comparison table of Bluetooth and Wi-Fi
• Wi-Fi is a wireless networking
technology,
which
permits
computers and other gadgets to
communicate through a wireless
signal that are commonly utilized
for nearby zone organizing of
devices and Web access.
• The wireless connector on all the
gadgets of the system and a
wireless switch.
• It is more complicated and requires
the setup of hardware and
programming.
• Short-range wireless technology,
about to 10 meters.
•
• Bluetooth is relatively less secure.
• Whereas in Wi-Fi this range is
broader than Bluetooth, about to
100 meters.
• Bluetooth consumption power is
low.
• Security highlights are way better.
Still, there remain some risk
factors.
• Connects PCs to devices, such as a
printer. Also connects with
industrial computerization devices.
• Whereas, Wi-Fi consumption
power is higher than Bluetooth.
• Bluetooth is less adaptable
methods as it is support limited
users.
• Wi-Fi connects with desktop
computers, servers, TV, latest
mobiles.
• Impartially low expense to
implement.
• Whereas, Wi-Fi provides support
for huge number of users.
• Bluetooth requires low bandwidth
• Comparatively higher cost than
Bluetooth.
• Wi-Fi requires high bandwidth
rather than Bluetooth.
 A comparison table of Flaming and Spamming
Flaming
Spamming
Flaming is an antagonistic online
communication that includes offending
messages, or flames, between clients.
Spamming is the utilization of
electronic informing systems like mails
and other advanced conveyance
systems and broadcast in media to send
undesirable mass messages unusually
Flaming is kind of those type of
massages that tend to attack an
individual personally that regards to
Internet gatherings, chat rooms,
interpersonal organizations, and game
entryways.
Spam messages are a type of
commercial publicizing intended to
flood the mail inbox of clients.
Flaming is just planned to assault
others using foul language.
While Spamming promotes such things
that might be helpful to the recipient of
the email.
A flame war is a trade of flames
intentionally between two or more
members.
Spam is an unprompted email from
hidden sources.
A flamer has sole thought process to
warm up the discussions.
Whereas spam is sent to get responses
because it can make a profit.
Indiscriminate sending of unsolicited
mail messages to numerous Web users
Sending incredibly crucial, harsh, and
frequently indecent email (Receiving
sexually expressed) messages or
newsgroup presenting on different
users on the web.
Trump blames Pope Francis for being
'disgraceful' in this flaming reaction to
the Pope's remarks on his immigration
proposals.
A spammer imitates PayPal and
notifies you that you won a lottery and
If you go to the link which included
underneath the message, it will seize
your PayPal account that format by the
spammer to take your password and
withdraw all assets from your account.
 A comparison table of Handshaking and Roaming
Handshaking
A phase in a protocol where certain
data are shared Within computer
processor systems; sometimes as part
of communications initiation process.
Roaming
Roaming leads to a cellular consumer's
ability to instantly make and receive
phone calls, send and receive
information, or activate other Facilities,
including mobile data services, while
moving beyond the home network's
geographic transmission range, through
the use of the network accessed.
Handshaking occurs when cells (radio
tower) interchanged throughout an
ongoing call.
Roaming usually occurs when a
location is changing, or Mobile is
Switching Centre.
Smartphone will change the channels;
it sends and receives during
handshaking, but this happens too
quickly for customers to notice
Roaming focuses on a company and
administrative concern to produce
higher profits and can be considered a
technical problem
Following are the main two ways of
handshaking: • Source Initiated
Handshaking • Destination Initiated
Handshaking
Details of roaming method vary between
aspects of cellular networks, but the
process of roaming approaches; Regional
or internal, Inter-standards, Inadvertent,
Permanent roaming.
I decided to wait for the handsets to
finish handshaking so That I could
proceed the file transfer.
If you have a T - mobile telephone and
in Australia, trying to make a regular
call in Australia by using cell phone
will result for both roaming and longdistance rates.
 A comparison table of Internet, Intranet and Extranet
SL Basis of
no. comparison
Internet
Intranet
Extranet
1. Definition
The Web is the
worldwide framework
of interconnected
computer systems that
utilize the Web
convention suite
(TCP/IP) to connect
devices around the
world.
2. Users
As internet connects
globally so it can have
numerous more users
as a contrast with the
number of clients on
Intranet.
Internet remain less
secure since it has zero
security level within
the firewall.
An intranet is a
private system that is
contained inside a
venture. It might
comprise of the
much-interlinked area
locally and
furthermore utilize
rented lines in the
wide-region network.
Intranet has restricted
network area, so users
of Intranet are
moreover
constrained.
An Extranet is really an
Intranet that is halfway
open to approved
outcasts. It is a site
permitting outsiders,
merchants, providers,
and comparable
subjects to get to
specific resources of an
association.
An extranet serves to
give resources that are
made accessible to the
approved clients,
however not to general
society.
Though in this, security
is actualized through a
firewall to separates
internet and extranet.
3. Security
4. Size
Internet can connect
with a huge number of
devices.
5. Accessibility
Anyone can access
anonymously with the
internet.
6. Information
Internet network
contains a diverse
source of data and is
accessible for all.
Internet is not
regulated by authority.
As it is a global
network area, it
remains uncensored.
7. Regulation
8. Policy
Intranet is a restricted
network which is
more secure than
internet as it is
protected by firewall.
Intranet is a small
network system that
can connect with a
few numbers of
devices.
An intranet is secured
by encryption and
accessible for
authorized users.
Intranet contains only
a group of data.
Intranet is regulated
by a organization.
Intranet is controlled
by organization’s
policies.
Extranet connects with
predetermined number
of devices.
Extranet is accessible
for authorized clients.
Extranet contains just
an explicit group of
information.
It is regulated by
numerous associations.
Extranet is also
governed by
companies’ contractual
agreements.
9. System failure
10. Example
System failure is
unpredictable for
internet.
An instance of internet
is the System where
people use to search
words.
The efficiency of the
system is high
because system is
overseen by
authority.
An intranet is perhaps
an organization such
as Nokia which uses
an internal system for
its operation.
There are multiple
Ethernets to monitor
the system.
An extranet when
corporations such as
Dell, IBM, and ASUS
plan to use the similar
network for different
business purposes.
 A comparison table of Computer Libel and Censorship
Computer
Libel
Computer libel is a phrase used to refer defamation that arises in
cyberspace, implying through the Internet.
This contains false and misleading statements posted by e-mail, message
boards, blogs, chat rooms, on websites, or any other Internet-based
contact platform about another person.
Libel happens if one makes a false statement to another individual or
entity that is causing damage to the integrity of that person or entity.
Computer libel is a sticky problem, as internet is an unregulated breeding
ground for malicious activity to spread.
Perhaps libel retains one's freedom of speech, and one may speak about
controversial issues by using libel.
By acting ethically, and by speaking the truth, we can reduce cyber libel.
If someone wrote a blog that Mr. Smith hit his wife, three weeks ago. If
this is not valid, then it is false and misleading.
Censorship
Censorship (using the Internet) is the regulation or restriction of what is
available, written, or visible on the Internet.
It can be carried out at the behest of states, private companies,
regulators or according to their own initiative.
Through censorship, national security can be protected by enforcing
legislation against hacking and imposing harsh penalties on violators.
Whereas censorship helps to prevent malicious activity.
In contrast, by enforcing an Internet censorship rule, authoritarian
government officials can get rid of their wrong activities.
Overall censorship may not be the solution, Illegal censorship should
perhaps be legislated in such a way as to provide consistency.
China initiated censorship of online usernames. Like, usernames with
"Obama" is now being blocked in china.
 A comparison table of Software security and Data security
 Different Parameters of Business Ethics
Business ethics is perhaps the published and unpublished ethical principles and shared
values which govern corporate decisions and behavior.
Ethics concerns administrators confront as part of their day-to-day business decisions.
There are four parameters of business ethics include:
 A comparison table of Computer Crime, Hacking and Cyber Theft
SL Computer crime
no.
1. Computer crime involves
Unauthorized use, access,
alteration or degradation
of hardware, software,
data, or network
resources
2. Computer Crime refers to
illegal activities
committed by using a
computer.
3.
Computer crime involves
unauthorized disclosure
also copying of software.
4.
Using or conspire to
unlawfully manipulate
computer or network
resources to access
knowledge or tangible
property. Most of the
time it considers under
cybercrime in
Bangladesh.
Tampering with access or
use to someone else's
computer is a computer
crime.
5.
Hacking
Cyber theft
Hacking is such attempt to
hack a computer device
within a machine, or a
private network.
When many computer
crimes include money
laundering, is called a
cyber-theft.
Hacking includes activities
that attempt to hack digital
devices, including
computers, smartphones,
tablets, and even whole
networks
Hacking into a computer
network and reading files,
but doing nothing to steal
or damage
Cyber-crime is
typically requiring by
using of a computer
and internet network
or cyber space.
Anyone who attempts
hacking shall be punished
either with imprisonment
for a period of three years
or with fine in Bangladesh.
In 2008, Project
Chanology; pseudonymous
attacks worldwide
repositories of Scientology
sites. Scientology
computers steal private
documents and spread
them over the Internet.
Most are "inside jobs"
involving in cyber
theft. Unauthorized
network entry and
computer database
switching to cover the
tracks of the
employees involved
Most corporations do
not publicize that they
were targets or
victims of cybercrime
The biggest ever
distributed loss of
service (DDoS) attack
did take place in 2016,
using more than 1
million connected
computers throughout
the internet, which
were hacked by
criminals due to
network weakness.
References:
1.
2.
3.
4.
https://www.insightsassociation.org
https://www.floridatechonline.com
https://softwarelab.org
https://www.roccoresearch.com
Download