CS-611 COMPUTER FUNDAMENTAL & PC SOFTWARE An ISO 9001:2000 Certified Organization BCA-1 IGNOU BLOCK 1 Computer Fundamentals:Hardware & Software | | <document classification> © Copyright PCTI Group 2009 Introduction Definition: An electronic, digital device that stores and processes information. Final Result (example -Display of image) Digitized Data (1010101010) | | <document classification> © Copyright PCTI Group 2009 History The tool known as ABACUS was the age-old tool used by man to count and calculate was designed and developed by Chinese some 5000 years ago. Blaise Pascal designed a working mechanical calculator in 1642. Gottfried Von Leibnitz a German, modified Pascal’s calculating machine which could multiply numbers directly. In 1833 Charles Babbage an English scientist, designed Analytical Engine using tooth wheels so that it could perform all mathematical operations in a predetermined sequence using a set of operational instructions. | | <document classification> © Copyright PCTI Group 2009 History Lady Ada Lovelace is considered as the first lady Computer Programmer as she has developed the concept of writing systematic operational instructions for the analytical engine. In 1850 George Boole an English mathematician proposed logic theory of using the binary (two) number system. This number system had (0 and 1). Bool proposed a logic popularly known as Boolean algebra. Computer processors are designed on this system of logic. A statistician Dr. Herman Hollerith, developed a punched card that would contain data coded in form of punched holes. | | <document classification> © Copyright PCTI Group 2009 Applications of Computers Computers have a very big impact on our day-to-day life. They can be used for a number of applications like: – Business – Education – Research – Office – Accounting – Military – Space – Entertainment – Medical | | <document classification> © Copyright PCTI Group 2009 Applications of Computers Following are the broad application areas where computers are used extensively •Entertainment: It can be used to make cartoon movies, animation and special effects in movies, games etc. •Day to day life: Collages, Hospitals, Railway and Airline Booking Systems, Shops, Bank, ATM centers etc. to carry out day to day work. For example: Train ticket bookings can be done with help of computer. | | <document classification> © Copyright PCTI Group 2009 Applications of Computers • Communication: Nowadays Internet is becoming integral part of life to gather information about different topics or to send and receive emails etc. • Scientist: use it for research purposes, space programs, nuclear programs etc. | | <document classification> © Copyright PCTI Group 2009 Advantages • Speed: Computers carry out the jobs in microseconds or less time. The human beings cannot think of doing the jobs in such speeds. Few lakh calculations can be done in a second • Accuracy: While doing a job human being may commit mistakes where as if the data given to the computer is correct then the computer does the job without any mistakes. • Efficiency: Unlike the human beings efficiency is very high in computers as it is a machine it does not get tired or bored of doing a job. • Storage: Computer has memory in which the data can be stored for future use. For example the details of the students, customers, suppliers etc. can be stored in the computers to be used whenever it is required. | | <document classification> © Copyright PCTI Group 2009 Limitations • Computers cannot think by themselves and they require human direction to perform specific tasks. • If the data given is wrong then it gives the wrong result. • Instructions given also should be correct that is instead of addition if you ask it to multiply it will multiply. • It will not work without electricity. • Investment and maintenance in this equipment is also required. | | <document classification> © Copyright PCTI Group 2009 Generations of Computers First Generation (1940-1956): Vacuum Tubes The computers of this generation were made of vacuum tubes for circuitry and magnetic drums for memory Second Generation (1956-1963): Transistors The computers of this generation made up of transistors replacing vacuum tubes Third Generation (1965-1971): Integrated Circuits The computers of these generations were made up of IC (Integrated Circuits) Fourth Generation (1971): Microprocessors The computers of this generation saw the advent of Large Scale Integration (LSI) and Very Large Scale Integration (VLSI) | | <document classification> © Copyright PCTI Group 2009 Classification of Computers Personal Computers: A microcomputer is the smallest general purpose processing system. Minicomputers: A minicomputer is medium sized computer that is more powerful than a microcomputer. Mainframes computers: Computers with large storage capacities and very high speed of processing. | | <document classification> © Copyright PCTI Group 2009 Classification of Computers Super computers: These have extremely large storage area and computing speeds, which are many times faster than earlier discussed machines. Laptop/Note Book Computers: These are small in size and weigh few Kgs & you can carry any place. | | <document classification> © Copyright PCTI Group 2009 Organization of a Computer Main Memory Input Unit Output Unit Control Unit ALU Secondary Memory | | <document classification> © Copyright PCTI Group 2009 Input Unit Any device designed to assist in the entry of data into a computer. Mouse Light Pen Touch Screen Joy Stick Keyboard Scanners Optical Character Readers (OCR) Magnetic Ink Character Reader (MICR) Mark Sense Reader Bar Code Reader | | <document classification> © Copyright PCTI Group 2009 Output Unit Any peripheral device that converts the stored binary coded data into convenient external forms as text, pictures & Sound 1. Visual Display Unit 2. Printer | | <document classification> 3. Speakers © Copyright PCTI Group 2009 Central Processing Unit Arithmetic-Logic Unit (ALU): The ALU is an electronic circuit used to carry out the arithmetic operations. (Addition, Subtraction, Multiplication and Division) Control Unit: The control unit coordinates the activities of all the other units in the system. Memory Unit: is used to store data temporarily. | | <document classification> © Copyright PCTI Group 2009 The storage capacity of the memory is generally measured in megabytes. 8 Bits = 1 Byte 1024 Bytes = 1 Kilobyte (KB) 1024 Kilobytes = 1 Megabyte (MB) 1024 Megabytes = 1 Gigabyte (GB) | | <document classification> © Copyright PCTI Group 2009 Memory Memory is the main part of computer where we store our data either for temporarily or permanently There are Two Types of Memory 1.Primary Memory 2.Secondary Memory | | <document classification> © Copyright PCTI Group 2009 Primary Memory We can also called internal memory. This memory consists of semiconductor memory chips and is used to store the data and programs. Two Types of Primary Memory 1. RAM (Random Access Memory) or Volatile Memory 2. ROM (Read Only Memory) or Non-Volatile Memory | | <document classification> © Copyright PCTI Group 2009 Secondary Memory This is the permanent memory. But user can delete the data whenever they want. Examples: Floppy disks Fixed (hard) disks, Pen Drive | | <document classification> Optical disks. © Copyright PCTI Group 2009 Secondary Memory This memory is external memory. This memory can store a large amount of data for permanently. Types of Secondary Memory 1. Floppy Disk:- A floppy disk is made of flexible plastic material coated with iron oxide. This is used to store data and instructions. We can move the data from one place to another. The Floppy disks are available in two sizes 5.25 inches and 3.5 inches and their capacity range from 360 KB to 1.44 MB per disk. | | <document classification> © Copyright PCTI Group 2009 2. Magnetic Disk:- A magnetic disk is circular platter of plastic which is coated with magnetized material. One of the key component of a magnetic disk is a conducting coil named as Head which performs the job of reading and writing on magnetic surface. The head remains fix while the disk rotates for reading and writing operation. | | <document classification> © Copyright PCTI Group 2009 3. Winchester Disk:- This is sealed rigid magnetic oxide medium disk, which holds 10 MB to 10 GB of data. These disks are not removable from the drive. | | <document classification> © Copyright PCTI Group 2009 4.Magnetic Tape:Magnetic tapes are mounted on reels or cassette of tape to store amount of data. These are cheaper and removable from the drive. Information retrieval from tapes is sequential and not random. It takes long time for searching. They are low cost, low speed, portable. | | <document classification> © Copyright PCTI Group 2009 5.Optical Memories This memory is used to store a very-2 large amount of data. Data is written in optical disk through laser beam. Three Optical Devices 1. CD-ROM 2. WORM 3. Erasable Optical Disk. | | <document classification> © Copyright PCTI Group 2009 High Speed Memory Cache Memory: These are small fast memories placed between the processor and the main memory. | | <document classification> © Copyright PCTI Group 2009 Two important Computer terminologies Hardware: This comprises the Electronic, Electrical and mechanical components of the machine. Software: Program means the set of meaningful instructions written in a particular order so as to carry out some task. | | <document classification> © Copyright PCTI Group 2009 Computer Language The term computer language includes a wide variety of languages used to communicate with computers. Computer language is a system of communication. The computer languages must have instructions to manipulate input/output, text etc. | | <document classification> © Copyright PCTI Group 2009 Classification of Computer Language These languages are broadly classified as : Machine level language Assembly level language High level language Fourth generation languages | | <document classification> © Copyright PCTI Group 2009 Classification of Computer Language Machine level language – A program written using binary numbers i.e. 0’s and 1’s specified for the processor’s operation and absolute binary address Assembly level language Language uses mnemonics or abbreviations to represent a particular operation. High level language In this, instructions are written in simple English. (Examples: BASIC, COBOL, FORTRAN, PASCAL, C, C++ and Java etc Fourth generation languages These are the application development tools, which improve the efficiency and productivity. Examples: DBMS, RDBMS | | <document classification> © Copyright PCTI Group 2009 Kinds of software Two kinds of software are: • System Software: software control and direct the operation of the computer. Examples - Operating System, Compiler, and Interpreter etc. • Application Software: software used for specific applications such as letter typing, accounting, billing and inventory etc. | | <document classification> © Copyright PCTI Group 2009 Introduction to Operating Systems | | <document classification> © Copyright PCTI Group 2009 Operating System Operating system is an interface between user and machine. It is an essential component of computer system. The primary objective of an OS is to make computer system convenient to use and utilize computer hardware in an efficient manner. An operating system is a large collection of software which manages resources of the computer system such as memory, processor, file system and input/output devices. | | <document classification> © Copyright PCTI Group 2009 Operating System This is the system software, which acts as an interface between the user and computer. All the computers require operating system without which one cannot work with the computer. Operating system control, coordinates, synchronizes all the operations of the computer. Examples: Microsoft Disk Operating System (MS-DOS), MicrosoftWindows 98, Microsoft-Windows XP, Microsoft-Windows 2003 Server, UNIX, LINUX etc. | | <document classification> Microsoft Disk Operating System (MS-DOS), MicrosoftWindows XP © Copyright PCTI Group 2009 Functions Operating Systems The main functions of Operating System are 1. Act as an interface between the user and the computer 2. To monitor the use of the resources of computers (Resources can be hardware or Software) 3. To control and coordinate Input and Output devices 4. It manage the program and data files i.e. to store, to retrieve, to delete files 5. Help the application programs execute commands given by the user | | <document classification> © Copyright PCTI Group 2009 Examples of OS Examples of operating systems are • Microsoft Windows 98, Microsoft Windows XP, Microsoft Windows 2000, Microsoft Windows 2003, UNIX, Linux, Novell Netware, Solaris etc. | | <document classification> © Copyright PCTI Group 2009 Evolution of Operating System 1.Serial Processing 2.Batch Processing 3.Multiprogramming | | <document classification> © Copyright PCTI Group 2009 Types of Operating System Different types of Operating Systems 1. Batch Processing System 2. Multiprogramming Operating System 1. Multitasking OS 2. Multi-User OS 3. Time Sharing System 4. Real Time System 3. Network Operating System 4. Distributed Operating System | | <document classification> © Copyright PCTI Group 2009 Multiprogramming Operating System:The interleaved execution of two or more different and independent programs by the same computer.Multiprogramming is carried by placing the two or more user programs in main memory and executed them concurrently. The CPU switches from one program to another. | | <document classification> © Copyright PCTI Group 2009 Multi-Processing:A system that makes the use of more than one CPU is called multiprocessing system. A multi-processing which describe interdependent computers with two or more independent CPU s have the ability to simultaneously execute programs. In this system, instructions from different and independent programs can be processed at the same instant of time by different CPU. | | <document classification> © Copyright PCTI Group 2009 BLOCK 2 Computer Fundamentals: Communication, Networking, Security | | <document classification> © Copyright PCTI Group 2009 BASIC TERMS • Data are entities that convey meaning. Information is obtained by processing data using desired functions. • Signals are electric or electromagnetic encoding of data,and signaling is propagation of signal along communication medium. • Transmission is communication of data achieved by the propagation and processing of signals | | <document classification> © Copyright PCTI Group 2009 DATA COMMUNICATION CODES (Data encoding) • Computer manages, store and exchange data using electronic pulses or digital signals 0 or 1 0 OFF (absence) 1 ON (presence) • Every char (letter, number, symbols) is composed of a group of bits called codes. | | <document classification> © Copyright PCTI Group 2009 Data Codes ASCII* Controlling authority ANSI Number of bits 7 Number of Character 128 EBCDIC** IBM 8 256 *American Standard code for information interchange **Extended Binary coded decimal interchange code | | <document classification> © Copyright PCTI Group 2009 Communication Speed or Rate:• The speed at which two computers exchange or transmit data is called communication rate on transmission speed. • The unit of measurement of speed is measured using bps (bits per second) or baud. | | <document classification> © Copyright PCTI Group 2009 Private Vs Switched Channels • Private leased lines are permanently connected circuits between two or more points.These lines are available for private use by the leasing party. • Switched lines or dial up lines are available to any subscriber. For e.g. Telephone connection at our home or office | | <document classification> © Copyright PCTI Group 2009 Analog and Digital Transmission • An analog signal is one that is continuous with respect to time, and may take on any value within a given range of values. – Human voice, video and music when converted to electrical signal using suitable devices produce analog signals. • A digital signal may take on only a discrete set of values within a given range. Most computers and computer-related equipment are digital. | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Parallel and Serial Transmission • Parallel Data Transmission:- Multiple parallel lines connecting the transmitting and receiving units. Each wire carries a bit of information. Usually, one character id transferred in one go. • Serial Data Transmission:- Each bit is sent sequentially one after another. It requires one pair of wire conductors receiving and transmitting units. | | <document classification> © Copyright PCTI Group 2009 Communication Protocol/Standard • Protocols are technical customs or guide lines that govern the exchange of signal transmission and reception between equipments. • Some of the functions that communication protocol regulates are: • • • • Control of information transfer Structure and formats of data Error recoveries Re-transmission control Interface managemen | | <document classification> © Copyright PCTI Group 2009 DATA COMMUNICATION MODES • Synchronous and Asynchronous Transmission • Simplex, Half Duplex and Full duplex Communication | | <document classification> © Copyright PCTI Group 2009 Synchronous and Asynchronous Transmission • Synchronous Transmission:- characters are transmitted as groups with control character in the beginning and at the end of the bit train. The transmission and receiving intervals between each bit are precisely timed. • Asynchronous Transmission:- Each Char is transmitted separately, one char at a time. Each char begin with a start bit (coding begin) and end with a stop bit (coding end). Then next character is sent, with start and stop bits. | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Simplex, Half Duplex and Full Duplex Communication • The direction in which information can flow over a transmission path is determined by the properties of both the transmitting and the receiving devices. There are three basic options: | | <document classification> © Copyright PCTI Group 2009 Communication Hardware • Sender and Receiver Hardware • Communication Devices • Communication Channel | | <document classification> © Copyright PCTI Group 2009 Sender and Receiver Hardware • • Sender and Receiver Hardware are used for handling Communication messages, data transfer etc. Nodes and Workstations Data Communication is done using various communication devices and software interconnected for information exchange. The devices used to communicate in a data communication network are called workstations. These workstations includes Computer, terminal, printer etc. | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Sender and Receiver Hardware • Multiplexer Multiplexing is a form of data transfer in which communication channels are used for several transmissions. Ex. Telephone lines. In other words multiplexing is a type of network mechanism, which allows a number of simple, low cost terminals to share each communication line, introduces almost no delay and requires no special computer software. | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Communication Devices Modem or Modulation Demodulation • Computer generates digital data which is unsuitable for long distances . Data must be converted to analog data is called modulation. • The converted data in the form of analog signals can travel without any noise over long distances. This data when reaches its destination is converted back to digital data with the help of demodulation. • Codec performs the opposite function of a modem | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Communication Channels • The most basic hardware required for communication is the media through which data is transferred . • Two wires open line • Twisted Pair Cable • Coaxial Cable • Fiber Optical Cables • Wireless | | <document classification> © Copyright PCTI Group 2009 Two wires open line • This is the simplest of all the transmission media. It consists of a simple pair of metallic wires made of copper or sometimes aluminium of between 0.4 and 1 mm diameter, and each wire is insulated from the other. • Distance: upto about 50 meters • Data transfer rate: upto 19200 bits per second. | | <document classification> © Copyright PCTI Group 2009 Twisted Pair Cable • • • A twisted pair cable consists of pairs and copper wires. They are twisted together to enable canceling out noise and external disturbance to the signal that they carry. Distance: upto1km Data Transfer rate: upto 1-2 megabytes per second | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Coaxial Cable • Distance: upto 1km • Data transfer rate: upto 100 megabytes per second • A coaxial cable is of two types - a 75-ohm cable, which is used by the cable TV operators and the 50-ohm cable which is used in high-speed broadband networks and are low loss cables. | | <document classification> © Copyright PCTI Group 2009 Fibre Optic Cables • This contains a very thin (as thin as the human hair) cable made of optical fibre. The cable transmits much more data and much faster than others. This cable carries signals in light pulses. Telephone companies and large government organization which need and can afford it, are using it. • Distance: long and medium transmission links • Data transfer rate: upto 1000 megabytes per second | | <document classification> © Copyright PCTI Group 2009 | | <document classification> © Copyright PCTI Group 2009 Wireless • There will be no wires here and data will transmitted into radio waves, microwaves and through satellite channels. | | <document classification> © Copyright PCTI Group 2009 Introduction to Networking A networking means connecting two or more computers together for sharing of information and resources. A computer network is a collection of hardware and software that enables a group of computers to communicate. It provides shared resources includes data files, applications and hardware (printer) and other related resources. | | <document classification> © Copyright PCTI Group 2009 A networking is basically a communication system of computers. Just as the telephone system allows two people to talk to one another, networks allow computers to communicate. The entire computer network can be classified into two Broad categories:1.LAN (Local Area Network) 2.WAN (Wide Area Network) | | <document classification> © Copyright PCTI Group 2009 1. LAN :- A private network with in a range of 10 kilometers which is controlled by a single organization. It permits exchange of data and information among them with in a localized area. Typically it covers a building, a cluster of buildings. | | <document classification> © Copyright PCTI Group 2009 LAN Topologies A network Topology refers to the physical layout of the network in which all the devices are connected. The point of connection to the network by the station are called nodes. There are several types of topologies 1. Star Topology 2. Bus Topology 3. Ring Topology | | <document classification> © Copyright PCTI Group 2009 1. Start Topology:In this topology a number of stations are connected directly to a central station. The central controller manages and controls all communications between stations on the network. Node Node Node Node Node | | <document classification> © Copyright PCTI Group 2009 2. Bus Topology:All the stations are connected to a single communication line. This single communication line is referred to as a bus.. On a Bus Network, all stations share the same medium. Node Node Node Node | | <document classification> © Copyright PCTI Group 2009 3. Ring Topology:- In this topology each station attached to an adjacent station using point-to-point link. Called a ring. A E B D C | | <document classification> © Copyright PCTI Group 2009 LAN Access Method Many techniques have been proposed, but two of these are commonly used (i) Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) (ii) Token passing | | <document classification> © Copyright PCTI Group 2009 Communication Architecture for Networking Instead of using entire data communication as a single module, the task is broken into various subtasks. Each subtask operates separately by different layers of the communication architecture. System that follow the OSI (Open System Interconnecting) are said to be open to one another at different layers and thus called open systems. The easiest way design network is to break processes down into layers. | | <document classification> © Copyright PCTI Group 2009 1. Physical Layer:- This layer defines the mechanical, electrical, functional and procedural standards for the physical transmission of data. 2. Data Link Layer:- It provides the functions and protocols to transfer data between network resource and to detect errors. 3. Network Layer:- This layer establishes connections between networks. It includes operational procedures for inter network communication. | | <document classification> © Copyright PCTI Group 2009 4. Transport Layer:- This layer is responsible for transparent and reliable transfer of data. 5. Session Layer:- This layer provides the mechanism for organizing and structuring interaction between applications. 6. Application Layer:- This layer supports the applications of users and enables them to connect to the network. 7. Presentation Layer:- This layer presents data to the application layer. | | <document classification> © Copyright PCTI Group 2009 LAN Hardware & Software The Basic Hardware components of LAN 1. Transmission Channel. 2. Network Interface Unit (NIU) 3. Server 4. Workstation | | <document classification> © Copyright PCTI Group 2009 Network Interface Unit This unit connects each device in the LAN network to shared transmission device. It contains the rules or logic to access the LAN. NIU is also used to implement LAN protocols and for device attachments. | | <document classification> © Copyright PCTI Group 2009 Server A server is an important component of a network. The server runs the NOS and offers network services to users at their individual workstations. These services includes file storage, security, user management etc. 1. File Server:- is used to share storage space for files. 2. Printer Server:- Printer connected to the server can be accessed directly by all the users of the network. 3. Modem Server:- is also used to share telephone lines and modem by all connected workstations in a network. | | <document classification> © Copyright PCTI Group 2009 Workstation:- When a computer is connected to a network. It becomes node on the network is called a workstation. LAN Software:- Software of LAN OS facilitates the sharing of expensive resources such as printer, storage space etc. among all LAN users provides security for data. Various types of LAN OS Ex. Novel Netware, Windows NT | | <document classification> © Copyright PCTI Group 2009 Communication Switching Techniques • In a WAN, two computing devices are not connected directly. • A network of switching nodes provides a transfer path between the two devices. • The process of transferring data blocks from one node to another is called data switching. | | <document classification> © Copyright PCTI Group 2009 • Circuit Switching In circuit switching there is a dedicated communication path between the sending and receiving devices, like telephone network where a dedicated path is set between the caller and the called party for the duration of a telephone call is an example of Circuit Switching. • Message Switching In message Switching, the message is then passed through the network from one node to another till it reaches the intended destination. Example E-Mail, Telegrams | | <document classification> © Copyright PCTI Group 2009 • Packet Switching It combines the advantages of message and circuit switching. Same like Message Switching in which data is transmitted in blocks stored by the first switching node in the network and is forward to the next until it reaches its destination. Max length of packets is between 128 bytes to 4096 bytes. • There are two approaches to packet switching * Datagram * Virtual circuit | | <document classification> © Copyright PCTI Group 2009 WAN Devices/Hardware • Bridges – Bridges are used to connect two LANs that use identical LAN protocols over a wide area. – Bridges operate at the data link layer (layer 2) of the OSI model. • Routers – Routers can be used to connect networks that may not be similar. – Routers operates at the network layer (layer 3).of the OSI model. • Gateways – Gateways are used to connect two dissimilar LANs. – gateway operates on, the application layer (layer 7) of the OSI model. | | <document classification> © Copyright PCTI Group 2009 Types of Wide Area Networks • Public Networks – Public Networks are those networks which are installed and run by the telecommunication authorities and are made available to any organisation or individual who subscribe it. – Public Switched Telephone Networks (PSTN) – Public Switched Data Networks (PSDN), – Value Added Services (VANs/VADs) and – the Integrated Services Digital Networks (ISDN). • Private Networks | | <document classification> © Copyright PCTI Group 2009 Few Applications E-Mail:E-Mail system is basically used for sending messages electronically to individuals or group of individuals in an inter or intra office environment. We can attach a file of any application software. | | <document classification> © Copyright PCTI Group 2009 EDI EDI (Electronic Data Interchange):- It means replacing paper documents with electronic documents and replacing traditional methods of transmission such as Mail, Phone, in-person delivery with electronic transmission. It can be used to electrically transmit documents such as purchase orders, invoice, shipping notice, receiving advices, transmit financial information and payments in electronic from. | | <document classification> © Copyright PCTI Group 2009 Internet Internet is the world’s largest Network. It is a global network. It is the best flower gifted by information technology. Services:1. E-Mail 2. Usenet- Views and News: Usenet is the BBS (Bulletin Board Service) of internet. The messages in this BBS are organized into thousand of News groups | | <document classification> © Copyright PCTI Group 2009 3. Telnet (Remote Login) Telnet allows an Internet user to access a remote computer (host). After properly connectivity and logging into the remote host, the user can enter data, run programs or do any other operations. 4. FTP (File Transfer Protocol):- It permits an internet user to move a file from one computer to another. The files may have data, graphics, text etc. | | <document classification> © Copyright PCTI Group 2009 5. Navigators (Information Servers) There are several powerful tools used on internet for searching information. Means to develop easy method of discovering, locating, retrieving information from Gopher, WWW. WAIS (Wide Area Information Server) | | <document classification> © Copyright PCTI Group 2009 Security:- Security means protection of data against accidental or intentional, destruction, discloser or modification. Computer data security refers to the technological safeguards and managerial procedure which can be applied to computer Hardware, Software and data. | | <document classification> © Copyright PCTI Group 2009 Privacy:Privacy applied to an individual. It is the right of an individual to decide what information he/she wishes to share with others. | | <document classification> © Copyright PCTI Group 2009 Breaches of Security 1. Theft of PC 2. Damage due to breakage:- Floppies are easily breakable when we shifted from one place to another. Damage can also occur due to natural causes such as storm or flood due to electrical or other fires. 3. Environmental Damage:- Environmental conditions like temperature and humidity ranges, voltage limits, dust etc effects to PC and get damaged. | | <document classification> © Copyright PCTI Group 2009 4. Inadvertent Corruption/loss:1. Usage of inferior media:- If sub standard media used, it would be cheaper, it may develop faults and data held.it may become unusable. 2. Erasure of files:- Files may be get erased from media due to incorrect actions by operator, wrong programming techniques, defective software. | | <document classification> © Copyright PCTI Group 2009 5. Unauthorized Access 6. Modification Erasures:-The person accessing the data files may be authorized to read the data, modify or delete the data. 7. Environmental Losses 8. Malicious damage/leakage | | <document classification> © Copyright PCTI Group 2009 9. Computer Viruses:This is the latest threat to computer users. The problems created by viruses include:1. Destruction of File Allocation Table (FAT) 2. Erasing of specific programs or data on disc. 3. Destroy parts of programs/data held on disc by created bad sectors. 4. Overwriting of entire disc directories. 5. Hang the system at periodic intervals. | | <document classification> © Copyright PCTI Group 2009 Security Measures One of the best and first steps in ensuring data security is to create an awareness and develop a culture within the organization in which information can be lost/altered. The other steps that can be taken are:1. IT Planning:- The organization must decide on a policy for introduction of IT. This must be done at highest level. 2. Selection of technology | | <document classification> © Copyright PCTI Group 2009 3. Physical protection of machine. 4. Identification of points of exposure of weak links. There are four Principles for ensuring Security and recovery in case of breaches of Security:1. Prevent 2. Detect 3. Minimize Damage 4. Recovery | | <document classification> © Copyright PCTI Group 2009 Various Security Measures 1. Physical Security 1. Physically bolt down the PC 2. Floppies, Keyboards should be lock 3. Keep a record of all floppies in use. 4. Use lockable rooms for PC specially those handling sensitive data. 5. Locate the PC in such a way that it is conveniently accessible to the user but hidden from casual passerby. | | <document classification> © Copyright PCTI Group 2009 2. Software Security 1 Use original software for operating system or software package. 2. Use Licensed software 3. Use correct procedure for shutting down the PC 4. Introduce password to access your applications. Password should not be visible on the screen 5. Keep backups of all your files. | | <document classification> © Copyright PCTI Group 2009 3. Network Security 1. Keep the servers away and limit physical access to them for direct use of server. 2. Run servers in the background mode.For direct use, a separate password would be necessary. 3.Be aware that the network cables can be tapped, so that conceal them to prevent easy access, if possible, use fibre optical wire. 4. Use codes and ciphers in data communication. 5. Prohibit the use of passwords embedded in communication access script | | <document classification> © Copyright PCTI Group 2009 4. Password Security 1. Identification:- User code indicates an object with a unique identify assigned to it. 2, Authentication:- This could be be achieved by asking some standard questions and getting answers to them. If answers match . The person is authentication. 3. Authorization:- Only a given user, terminal or other resource can access data to which permission has been granted to read, write or alter.A matrix can be created ti indicate which users have access to which file record. Otherwise he is denied. | | <document classification> © Copyright PCTI Group 2009 CRYPTOGRAPHY CRYPTOGRAPHY is the process of transforming plain text or original information into an unintelligible form (cipher) text. A data key control the transformation process.Authorized receiver is assumed to have that key. (Encryption Process) HELLO Algorithm XRVJF Plain Text Decryption process XRVJF Cipher Text Algorithm HELLO | | <document classification> Plain Text © Copyright PCTI Group 2009 Cipher Systems These includes two classes are called 1. Transposition 2. Substitution 1. Transposition Cipher:- A transposition involves rearrangement or change in the sequence of the letters of the plain text, message. 2 Substitution Cipher involves a replacement of the plain text letter by other letters without any change in their sequence. | | <document classification> © Copyright PCTI Group 2009 Code System:- A code system is a specialized form of substitution in which entire words, long phrases or even sentences of the plain text are replaced by arbitrarily selected equivalents. These may be other words, groups of letters, groups of figures or some combination of these. A code system makes use of a codebook in which the words, phrases and sentences of the vocabulary are listed in an organised manner and accompanied by their equivalent code groups. | | <document classification> © Copyright PCTI Group 2009 DES (Data Encryption Standard) IBM developed the DES algorithm. DES specifies a method for Encryption 64 bit blocks of plain text into corresponding 64 bit blocks of cipher text employing a user-specified 56-bit key. | | <document classification> © Copyright PCTI Group 2009 VIRUS Vital Information Resources Under Stress Computer Virus are computer program which are a collection of coded information. The basic difference between a normal program and a Virus is that, virus are self replicating they have the capability of executing themselves without being asked for. Viruses Corrupt the most sensitive area of the disk the File Allocation Table (FAT) | | <document classification> © Copyright PCTI Group 2009 The Process of Infection The infection may begin as soon as a computer boots from a contaminated disk or executes an infected program. Whatever viruses are present gets activated which immediately begin to spread throughout the system. | | <document classification> © Copyright PCTI Group 2009 Classification of Viruses 1. Boot Infectors: Infect the boot system 2. System Infectors:Infect the Hard disks 3. Executable Program Infectors:Infects the .EXE, .COM files. | | <document classification> © Copyright PCTI Group 2009 Some Viruses 1. Score Virus:- activates two, four and seven days after the disk has become infected. 2. Brain Virus:- Pakistani Virus 3. Lehigh Virus:-with the booting of a PC from an infected disk then virus spread all the disk. 4. Friday the 13th: attacks not only the command.com but also attack other exe files. 5. Sunnyvale Slug: This Virus displaying a message ‘Greetings form Sunnyvale. | | <document classification> © Copyright PCTI Group 2009 6. Raindrops:- This virus infects .com files. The first three bytes of the file are replaced by jumps instructions at the end of the file. 7. Happy Birthday 30th: | | <document classification> © Copyright PCTI Group 2009 Prevention 1. Use the CHKDSK 2. Don ‘t use pirated software on your system. 3. Write protect tags should be used on the original software disk. 4. Proper backup of all data and program files should be kept. 5. Copying of data files should be carefully 6. Restrict the use of outside floppies, Pen drives. | | <document classification> © Copyright PCTI Group 2009 Cure Virus can be cured by anti-virus program. | | <document classification> © Copyright PCTI Group 2009