Unit I
Unit I
Unit I
An information system (IS) is an interconnected set of components used to collect, store, process
and transmit data and digital information. At its core, it is a collection of hardware, software,
data, people and processes that work together to transform raw data into useful information. An
IS supports a variety of business objectives such as improved customer service or increased
efficiency.
People often use the term "information system" interchangeably with "computer system," but
these systems are not the same. While computer systems are part of an IS, they do not encompass
all the components and processes that make up an IS, such as people and processes. "Information
technology" (IT) is another similar term, but IT focuses on the technical aspects of the hardware
and software that support enterprise computing. An IS, on the other hand, focuses on how people
use IT and data to manage and make decisions within an organization.
1
The basic process an IS follows includes the following steps:
1. Input. The system collects data and information from various sources, such as sensors,
keyboards, scanners or databases.
2. Processing. The system transforms the raw data into meaningful information by applying
various operations, such as sorting, classifying, calculating, analyzing or synthesizing.
3. Storage. The system stores the processed information in a structured and secure way, such as
in a database, a file system or in cloud storage.
4. Output. The system presents the information to the users in a usable format, such as reports,
graphs, charts or dashboards.
5. Feedback. The system collects feedback from users and other stakeholders to evaluate its
performance and improve its design and functionality.
Cybersecurity is the practice of protecting systems, networks, and data from unauthorized access,
use, disclosure, disruption, modification, or destruction. It is a critical part of any organization's
risk management strategy.
Confidentiality: This ensures that only authorized users can access sensitive data.
Integrity: This ensures that data is not modified without authorization.
Availability: This ensures that data is accessible when needed.
Authentication: This verifies the identity of users and devices.
Authorization: This determines what users and devices are allowed to do.
Accountability: This tracks who has accessed data and what they have done with it.
Threat Detection: This identifies potential threats and vulnerabilities.
Threat Prevention: This blocks threats before they can cause damage.
Threat Response: This takes action to mitigate the impact of a threat.
2
becoming more sophisticated and frequent, posing a significant risk to businesses of all
sizes. Here are some key reasons why cybersecurity is crucial for businesses:
Protecting Sensitive Data
One of the primary reasons businesses need to invest in cybersecurity is to protect their
sensitive data. This includes customer information, financial records, and proprietary
intellectual property. A cyberattack that leads to a data breach can have severe
consequences, including financial losses and reputational damage.
Maintaining Business Operations
A cyberattack can disrupt your business operations, causing downtime and loss of
productivity. Ensuring that your company has a robust cybersecurity strategy in place
helps maintain the continuity of your operations and minimizes the potential for costly
interruptions.
Regulatory Compliance
Businesses are subject to a variety of regulations that require them to maintain specific
security standards to protect their customers’ data. Non-compliance with these
regulations can lead to hefty fines and penalties. Investing in cybersecurity helps
businesses stay compliant with these regulations, avoiding potential legal issues.
Building Trust with Customers
Customers are becoming increasingly aware of the importance of protecting their data.
By demonstrating a strong commitment to cybersecurity, businesses can build trust with
their customers, leading to increased loyalty and long-term relationships.
Staying Ahead of the Competition
Companies that prioritize cybersecurity are better positioned to stay ahead of their
competitors in the market. By implementing robust security measures, businesses can
minimize the risk of cyber threats and focus on their core competencies, leading to a
competitive advantage.
3
Computer Network:
o Computer Network is a group of computers connected with each other through wires,
optical fibres or optical links so that various devices can interact with each other through
a network.
o The aim of the computer network is the sharing of resources among various devices.
o In the case of computer network technology, there are several types of networks that vary
from simple to complex level.
A computer network is a set of devices connected through links. A node can be computer,
printer, or any other device capable of sending or receiving the data. The links connecting
the nodes are known as communication channels.
Computer Network uses distributed processing in which task is divided among several
computers. Instead, a single computer handles an entire task, each separate computer
handles a subset.
4
Major components of a computer network are:
NIC is a device that helps the computer to communicate with another device. The network
interface card contains the hardware addresses, the data-link layer protocol use this address to
identify the system on the network so that it transfers the data to the correct destination.
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub
Hub is a central device that splits the network connection into multiple devices. When computer
requests for information from a computer, it sends the request to the Hub. Hub distributes this
request to all the interconnected computers.
Switches
Switch is a networking device that groups all the devices over the network to transfer the data to
another device. A switch is better than Hub as it does not broadcast the message over the
network, i.e., it sends the message to the device for which it belongs to. Therefore, we can say
that switch sends the message directly from source to the destination.
5
Cables and connectors
Cable is a transmission media that transmits the communication signals. There are three types
of cables:
o Twisted pair cable: It is a high-speed cable that transmits the data over 1Gbps or more.
o Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial cable is
more expensive than twisted pair cable, but it provides the high data transmission speed.
o Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the data using
light beams. It provides high data transmission speed as compared to other cables. It is
more expensive as compared to other cables, so it is installed at the government level.
Router
Router is a device that connects the LAN to the internet. The router is mainly used to connect the
distinct networks or connect the internet to multiple computers.
Modem
Modem connects the computer to the internet over the existing telephone line. A modem is not
integrated with the computer motherboard. A modem is a separate part on the PC slot found on
the motherboard.
INTERNET
Internet is a global network that connects billions of computers across the world with each other
and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions
of computer users worldwide. It is set up by using cables such as optical fibers and other wireless
and networking technologies. At present, internet is the fastest mean of sending or exchanging
information and data between computers across the world.
6
It is believed that the internet was developed by "Defense Advanced Projects Agency" (DARPA)
department of the United States. And, it was first connected in 1969.
When you turn on your computer and type a domain name in the browser search bar, your
7
browser sends a request to the DNS server to get the corresponding IP address. After getting the
IP address, the browser forwards the request to the respective server.
Once the server gets the request to provide information about a particular website, the data starts
flowing. The data is transferred through the optical fiber cables in digital format or in the form of
light pulses. As the servers are placed at distant places, the data may have to travel thousands of
miles through optical fiber cable to reach your computer.
The optical fiber is connected to a router, which converts the light signals into electrical signals.
These electrical signals are transmitted to your laptop using an Ethernet cable. Thus, you receive
the desired information through the internet, which is actually a cable that connects you with the
server.
Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the
optical cable are first sent to a cell tower and from where it reaches to your cell phone in the
form of electromagnetic waves.
The internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers)
located in the USA. It manages IP addresses assignment, domain name registration, etc.
The data transfer is very fast on the internet. The moment you press enter you get the information
from a server located thousands of miles away from you. The reason for this speed is that the
data is sent in the binary form (0, 1), and these zeros and ones are divided into small pieces
called packets, which can be sent at high speed.
WIRELESS TECHNOLOGY
Wireless technological systems have been one of the vital parts of various types of
wireless communication devices. This permits users to communicate even from any remote
operated areas. There are various devices used for wireless communication from which some are
to be mentioned like mobiles, GPS, Cordless telephones, Zigbee wireless technology, Wi-Fi,
satellite television and other wireless computer parts. Current wireless phones include 3G and 4G
networks, Bluetooth and Wi-Fi technologies which is an additional advancement.
8
Types of Wireless Technology
The different types of wireless technology mainly include satellite communication, IR wireless
communication, broadcast radio,Bluetooth, Microwave radio,Zigbee etc.
1. Satellite Communication
Satellite communication is spread all over the world widely to allow users to stay connected
almost anywhere on the universe. When the signal is sent near the satellite then, the satellite
amplifies the signal and sends it back to the antenna receiver which is located on the surface of
the earth. Satellite communication contains a couple of main components like the 1.space
segment and 2.the ground segment.The ground segment consists of fixed or mobile
transmission,reception and ancillary equipment and the space segment, which mainly is the
satellite itself.
2. Infrared Communication
For successful infrared communication, a photo LED transmitter and a photodiode receptor are
very much required. So the information between the source and the target is transferred through
this way. The source and destination can be TVs,mobile phones, security systems,computers,
laptops and etc.
3. Broadcast Radio
The first wireless technological communications is the open radio communication to seek
out widespread use, and it still serves a purpose in recent years. Handy multi channel radios
9
permit a user to speak over short distances, whereas citizen’s bands offer communication services
for sailors.
4. Wi-Fi
5. Microwave Communication
Microwave wireless communication is an effective communication that mainly uses radio waves.
The wavelengths of radio waves are measured in centimeters(cm). In this communication, the
information can be transferred using two methods. One is the terrestrial method and the other one
is the satellite method .
Satellite method, the data can be transmitted through a satellite that orbits 22,300 miles above this
earth. Stations on the earth receive and send data signals from the satellite. It has a frequency
ranging from 11GHz-14GHz and with a transmission speed of 1Mbps to 10Mbps.The main
disadvantage of microwave signals is, they can be sometimes highly affected by bad weather,
especially when the weather is rainy.
6. Bluetooth Technology
The Bluetooth technology is used for exchanging data between mobile and other devices
wirelessly to a system for the transferring of data.Cell phones are connected to hands free
earphones,mouse,wireless keyboard. By using a Bluetooth device the information from one
device to another device. This technology has various functions.
10
Cellular network is an underlying technology for mobile phones, personal communication
systems, wireless networking etc. The technology is developed for mobile radio telephone to
replace high power transmitter/receiver systems. Cellular networks use lower power, shorter
range and more transmitters for data transmission.
Wireless Cellular Systems solves the problem of spectral congestion and increases user capacity.
The features of cellular systems are as follows −
Cellular network is organized into multiple low power transmitters each 100w or less.
11
Types of Mobile Technologies
SMS
MMS
4G
3G
GSM
CDMA
Wi-Fi
Let discuss them one by one in detail:
1. SMS: “SMS” stands for “Short Message Service.” It is now the most widely used and oldest
text messaging service. SMS are also sent over cellular networks, therefore you’ll need a
wireless plan and a wireless carrier. SMS is fast gaining popularity in the world as a low-cost
messaging medium. Every text message delivered to a cell phone has become known as SMS.
Messages can usually be up to 140 characters long. SMS was originally developed for GSM
phones, although it is now supported by all major cellular phone networks.
Although SMS is most commonly used for text messaging between friends or coworkers, it
also has a variety of additional uses. For example, SMS subscription services can send
weather, news, sports updates, and financial quotes to consumers’ phones. Employees may also
be notified of sales requests, service stops, and other business-related information via SMS.
12
3. 3G: The third letter in the designation 3G stands for third-generation access technology,
which allows mobile phones to connect to the internet. Every new technology introduces new
frequency bands and data transmission rates.
The first generation emerged in the 1980s. First-generation uses large phones that had to be
mounted on top of cars because they were too heavy to hold. Text messaging was made
possible by the second-generation network, which became available in the 1990s. This huge
and game-changing advancement also provided a more secure network and laid the path for
today’s ubiquitous 3G and 4G technology.
Upload speeds of up to 3 Mbps are possible on 3G networks. For example, about 15 seconds
for uploading a 3-minute MP3 song. The fastest 2G phones, on the other hand, may get up to
144Kbps For example, about 8 minutes to download a 3-minute song. 3G systems are intended
for digital phones with a full-screen display and better connectivity.
4. 4G: The fourth generation of mobile networking technology is known as 4G, which comes
after the 2G and 3G networks. Although it’s commonly referred to as 4G LTE, this isn’t
exactly right because LTE is just one sort of 4G. Most mobile network service providers use it
now since it is the most developed technology.
However, as you may have heard, 5G is becoming operational alongside current 3G and 4G
mobile networks. When it initially came out, 4G revolutionized how we use the mobile
internet. Despite the fact that 3G networks were relatively limited, 4G network connectivity
allowed consumers to browse the internet and watch HD films on their mobile devices, thereby
turning smartphones into laptops.
Premium 4G offers download speeds of around 14 Mbps, which is over five times quicker than
the 3G network’s predecessor. 4G networks can currently attain speeds of up to 150 Mbps,
allowing users to download gigabytes of data in minutes, if not seconds, rather than hours as
with 3G networks. Uploading data is also significantly faster with 4G – normal upload speeds
are over 8 Mbps, with theoretical rates of up to 50 Mbps, whereas 3G upload speeds are under
0.5 Mbps.
5. Global System for Mobile technology: The (GSM) is an acronym for Global System for
Mobile Communication. GSM is a cellular technology that is open and digital and is used for
13
mobile communication. It operates on the 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz
frequency ranges. It employs a hybrid of FDMA and TDMA.
6. Code Division Multiple Access: (CDMA) is an acronym for code division multiple access.
It is a channel access mechanism that also serves as an example of multiple access. Multiple
access simply means that data from multiple transmitters can be delivered onto a single
communication channel at the same time.
7. Wi-Fi (Wireless Fidelity): Wi-Fi is a wireless networking technology that allows us to
connect to a network or to other computers or mobile devices across a wireless channel. Data is
delivered in a circular region over radio frequencies in Wi-Fi. Wi-Fi (Wireless Fidelity) is a
generic acronym for a communication standard for a wireless network that functions as a Local
Area Network without the use of cables or other types of cabling.
Informatica can handle a large volume of data. The Informatica tool provides a complete data
integration solution and data management system.
Informatica is used to extracting required data form operation all systems and transforms the
same data on its server and load it to the data warehouse.
Some main points that reflect the growth in demand for the Informatica certification, such as:
o 2015 income was $1.06 billion, more than the combined income of Abinitio, DataStage,
SSIS, and other ETL tools.
14
o 7-year Annual CAGR is 30 percent.
According to all the above facts, it confirms that Informatica is in the huge demand in the world.
9.6.0 is the latest version of Informatica PowerCenter, which is available in the market. Below
are the following different editions for the PowerCenter:
o Standard Edition
o Advanced Edition
o Premium Edition
The Allianz, Fannie Mae, Samsung, ING, and U.S Air Force are the popular clients using the
Informatica PowerCenter as the data integration tool.
IBM DataStage, Oracle OWB, Microsoft SSIS, and Ab Initio are the competition tool for the
Informatica.
15
o To modify, cleaning up the data based on some set of rules, we need the Informatica.
o By using the Informatica, it is accessible to the loading of bulk data from one system to
another.
o It provides a broad set of features such as integration of the data from multiple
unstructured, semi-structured or structured systems, operations at row level on data, and
scheduling operation of the data operation.
o It also supports the features of metadata, so it keeps preserved the information of the
process and data operations.
16