Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
28 views16 pages

Unit I

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 16

23UCOAE25-3 INFORMATION AND CYBER LAWS

Unit I: Overview of Informatics- meaning, feature and importance - Computer networks


& Internet, wireless technology, cellular wireless networks, introduction to mobile phone
technology, Purchase of technology, license, guarantee, and warranty. New development in
informatics.
Definition:
Cyber law deals with the legal aspects of cyberspace, the internet, and computing. In a broader
view, cyber law handles the issues of intellectual property, contract, jurisdiction, data protection
laws, privacy, and freedom of expression in the digital space.
What is an information system?

An information system (IS) is an interconnected set of components used to collect, store, process
and transmit data and digital information. At its core, it is a collection of hardware, software,
data, people and processes that work together to transform raw data into useful information. An
IS supports a variety of business objectives such as improved customer service or increased
efficiency.

People often use the term "information system" interchangeably with "computer system," but
these systems are not the same. While computer systems are part of an IS, they do not encompass
all the components and processes that make up an IS, such as people and processes. "Information
technology" (IT) is another similar term, but IT focuses on the technical aspects of the hardware
and software that support enterprise computing. An IS, on the other hand, focuses on how people
use IT and data to manage and make decisions within an organization.

In addition to decision-making, IS supports knowledge management and communication. IT


allows data sharing to take place between different departments, providing consistent data for
analysis by a variety of teams. An IS supports various business functions such as accounting,
finance, marketing, human resources, operations and supply chain management. It can also
enable new business models and opportunities, such as e-commerce, social media and artificial
intelligence (AI).

1
The basic process an IS follows includes the following steps:

1. Input. The system collects data and information from various sources, such as sensors,
keyboards, scanners or databases.

2. Processing. The system transforms the raw data into meaningful information by applying
various operations, such as sorting, classifying, calculating, analyzing or synthesizing.

3. Storage. The system stores the processed information in a structured and secure way, such as
in a database, a file system or in cloud storage.

4. Output. The system presents the information to the users in a usable format, such as reports,
graphs, charts or dashboards.

5. Feedback. The system collects feedback from users and other stakeholders to evaluate its
performance and improve its design and functionality.

Cybersecurity is the practice of protecting systems, networks, and data from unauthorized access,
use, disclosure, disruption, modification, or destruction. It is a critical part of any organization's
risk management strategy.

The features of cybersecurity include:

 Confidentiality: This ensures that only authorized users can access sensitive data.
 Integrity: This ensures that data is not modified without authorization.
 Availability: This ensures that data is accessible when needed.
 Authentication: This verifies the identity of users and devices.
 Authorization: This determines what users and devices are allowed to do.
 Accountability: This tracks who has accessed data and what they have done with it.
 Threat Detection: This identifies potential threats and vulnerabilities.
 Threat Prevention: This blocks threats before they can cause damage.
 Threat Response: This takes action to mitigate the impact of a threat.

 In today’s digital age, the importance of cybersecurity for businesses cannot be


overstated. With the increasing reliance on technology and the internet, cyber threats are

2
becoming more sophisticated and frequent, posing a significant risk to businesses of all
sizes. Here are some key reasons why cybersecurity is crucial for businesses:
 Protecting Sensitive Data

 One of the primary reasons businesses need to invest in cybersecurity is to protect their
sensitive data. This includes customer information, financial records, and proprietary
intellectual property. A cyberattack that leads to a data breach can have severe
consequences, including financial losses and reputational damage.
 Maintaining Business Operations

 A cyberattack can disrupt your business operations, causing downtime and loss of
productivity. Ensuring that your company has a robust cybersecurity strategy in place
helps maintain the continuity of your operations and minimizes the potential for costly
interruptions.
 Regulatory Compliance

 Businesses are subject to a variety of regulations that require them to maintain specific
security standards to protect their customers’ data. Non-compliance with these
regulations can lead to hefty fines and penalties. Investing in cybersecurity helps
businesses stay compliant with these regulations, avoiding potential legal issues.
 Building Trust with Customers

 Customers are becoming increasingly aware of the importance of protecting their data.
By demonstrating a strong commitment to cybersecurity, businesses can build trust with
their customers, leading to increased loyalty and long-term relationships.
 Staying Ahead of the Competition

 Companies that prioritize cybersecurity are better positioned to stay ahead of their
competitors in the market. By implementing robust security measures, businesses can
minimize the risk of cyber threats and focus on their core competencies, leading to a
competitive advantage.

3
Computer Network:

o Computer Network is a group of computers connected with each other through wires,
optical fibres or optical links so that various devices can interact with each other through
a network.
o The aim of the computer network is the sharing of resources among various devices.

o In the case of computer network technology, there are several types of networks that vary
from simple to complex level.

Components Of Computer Network:

 A computer network is a set of devices connected through links. A node can be computer,
printer, or any other device capable of sending or receiving the data. The links connecting
the nodes are known as communication channels.
 Computer Network uses distributed processing in which task is divided among several
computers. Instead, a single computer handles an entire task, each separate computer
handles a subset.

4
Major components of a computer network are:

NIC(National interface card)

NIC is a device that helps the computer to communicate with another device. The network
interface card contains the hardware addresses, the data-link layer protocol use this address to
identify the system on the network so that it transfers the data to the correct destination.

There are two types of NIC: wireless NIC and wired NIC.

o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.

Hub

Hub is a central device that splits the network connection into multiple devices. When computer
requests for information from a computer, it sends the request to the Hub. Hub distributes this
request to all the interconnected computers.

Switches

Switch is a networking device that groups all the devices over the network to transfer the data to
another device. A switch is better than Hub as it does not broadcast the message over the
network, i.e., it sends the message to the device for which it belongs to. Therefore, we can say
that switch sends the message directly from source to the destination.

5
Cables and connectors

Cable is a transmission media that transmits the communication signals. There are three types
of cables:

o Twisted pair cable: It is a high-speed cable that transmits the data over 1Gbps or more.

o Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial cable is
more expensive than twisted pair cable, but it provides the high data transmission speed.
o Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the data using
light beams. It provides high data transmission speed as compared to other cables. It is
more expensive as compared to other cables, so it is installed at the government level.

Router

Router is a device that connects the LAN to the internet. The router is mainly used to connect the
distinct networks or connect the internet to multiple computers.

Modem

Modem connects the computer to the internet over the existing telephone line. A modem is not
integrated with the computer motherboard. A modem is a separate part on the PC slot found on
the motherboard.

INTERNET

Internet is a global network that connects billions of computers across the world with each other
and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions
of computer users worldwide. It is set up by using cables such as optical fibers and other wireless
and networking technologies. At present, internet is the fastest mean of sending or exchanging
information and data between computers across the world.

6
It is believed that the internet was developed by "Defense Advanced Projects Agency" (DARPA)
department of the United States. And, it was first connected in 1969.

How does internet work?

When you turn on your computer and type a domain name in the browser search bar, your

7
browser sends a request to the DNS server to get the corresponding IP address. After getting the
IP address, the browser forwards the request to the respective server.

Once the server gets the request to provide information about a particular website, the data starts
flowing. The data is transferred through the optical fiber cables in digital format or in the form of
light pulses. As the servers are placed at distant places, the data may have to travel thousands of
miles through optical fiber cable to reach your computer.

The optical fiber is connected to a router, which converts the light signals into electrical signals.
These electrical signals are transmitted to your laptop using an Ethernet cable. Thus, you receive
the desired information through the internet, which is actually a cable that connects you with the
server.

Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the
optical cable are first sent to a cell tower and from where it reaches to your cell phone in the
form of electromagnetic waves.

The internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers)
located in the USA. It manages IP addresses assignment, domain name registration, etc.

The data transfer is very fast on the internet. The moment you press enter you get the information
from a server located thousands of miles away from you. The reason for this speed is that the
data is sent in the binary form (0, 1), and these zeros and ones are divided into small pieces
called packets, which can be sent at high speed.

WIRELESS TECHNOLOGY
Wireless technological systems have been one of the vital parts of various types of
wireless communication devices. This permits users to communicate even from any remote
operated areas. There are various devices used for wireless communication from which some are
to be mentioned like mobiles, GPS, Cordless telephones, Zigbee wireless technology, Wi-Fi,
satellite television and other wireless computer parts. Current wireless phones include 3G and 4G
networks, Bluetooth and Wi-Fi technologies which is an additional advancement.

8
Types of Wireless Technology

The different types of wireless technology mainly include satellite communication, IR wireless
communication, broadcast radio,Bluetooth, Microwave radio,Zigbee etc.

1. Satellite Communication

Satellite communication is spread all over the world widely to allow users to stay connected
almost anywhere on the universe. When the signal is sent near the satellite then, the satellite
amplifies the signal and sends it back to the antenna receiver which is located on the surface of
the earth. Satellite communication contains a couple of main components like the 1.space
segment and 2.the ground segment.The ground segment consists of fixed or mobile
transmission,reception and ancillary equipment and the space segment, which mainly is the
satellite itself.

2. Infrared Communication

Infrared wireless technological communication information in a device or systems through


infrared radiation. Infrared radiation is an electromagnetic energy at a wavelength that is longer
than that of red light(which has high wavelength). It is used for TV remote control, security
control, and a communication which stays within a short range. In the electromagnetic spectrum,
infrared radiation (IR) lies between microwaves and visible light. So, they can be used as a source
of communication at the end of the day.

For successful infrared communication, a photo LED transmitter and a photodiode receptor are
very much required. So the information between the source and the target is transferred through
this way. The source and destination can be TVs,mobile phones, security systems,computers,
laptops and etc.

3. Broadcast Radio

The first wireless technological communications is the open radio communication to seek
out widespread use, and it still serves a purpose in recent years. Handy multi channel radios

9
permit a user to speak over short distances, whereas citizen’s bands offer communication services
for sailors.

4. Wi-Fi

Wi-Fi is a wireless communication used by various electronic devices like smartphones,laptops,


Ipads etc.In this particular setup, a router works as a communication hub wirelessly. These
networks allow users to be connected only within close proximity to a router. WiFi is very
common in networking applications which affords portability without a wire. These networks
require to be protected with passwords for the purpose of its security, otherwise it will be accessed
by other people.

5. Microwave Communication

Microwave wireless communication is an effective communication that mainly uses radio waves.
The wavelengths of radio waves are measured in centimeters(cm). In this communication, the
information can be transferred using two methods. One is the terrestrial method and the other one
is the satellite method .

Satellite method, the data can be transmitted through a satellite that orbits 22,300 miles above this
earth. Stations on the earth receive and send data signals from the satellite. It has a frequency
ranging from 11GHz-14GHz and with a transmission speed of 1Mbps to 10Mbps.The main
disadvantage of microwave signals is, they can be sometimes highly affected by bad weather,
especially when the weather is rainy.

6. Bluetooth Technology

The Bluetooth technology is used for exchanging data between mobile and other devices
wirelessly to a system for the transferring of data.Cell phones are connected to hands free
earphones,mouse,wireless keyboard. By using a Bluetooth device the information from one
device to another device. This technology has various functions.

CELLULAR WIRELESS NETWORKS

10
Cellular network is an underlying technology for mobile phones, personal communication
systems, wireless networking etc. The technology is developed for mobile radio telephone to
replace high power transmitter/receiver systems. Cellular networks use lower power, shorter
range and more transmitters for data transmission.

Features of Cellular Systems

Wireless Cellular Systems solves the problem of spectral congestion and increases user capacity.
The features of cellular systems are as follows −

 Offer very high capacity in a limited spectrum.


 Reuse of radio channel in different cells.
 Enable a fixed number of channels to serve an arbitrarily large number of users by
reusing the channel throughout the coverage region.
 Communication is always between mobile and base station (not directly between
mobiles).
 Each cellular base station is allocated a group of radio channels within a small geographic
area called a cell.
 Neighboring cells are assigned different channel groups.
 By limiting the coverage area to within the boundary of the cell, the channel groups may
be reused to cover different cells.
 Keep interference levels within tolerable limits.
 Frequency reuse or frequency planning.
 Organization of Wireless Cellular Network.

Cellular network is organized into multiple low power transmitters each 100w or less.

INTRODUCTION TO MOBILE PHONE TECHNOLOGY


Mobile technology is a type of technology in which a user utilizes a mobile phone to perform
communications-related tasks, such as communicating with friends, relatives, and others. It is
used to send data from one system to another. Portable two-way communications systems,
computing devices, and accompanying networking equipment make up mobile technology.

11
Types of Mobile Technologies

Followings are the few famous mobile technologies:

 SMS
 MMS
 4G
 3G
 GSM
 CDMA
 Wi-Fi
Let discuss them one by one in detail:

1. SMS: “SMS” stands for “Short Message Service.” It is now the most widely used and oldest
text messaging service. SMS are also sent over cellular networks, therefore you’ll need a
wireless plan and a wireless carrier. SMS is fast gaining popularity in the world as a low-cost
messaging medium. Every text message delivered to a cell phone has become known as SMS.
Messages can usually be up to 140 characters long. SMS was originally developed for GSM
phones, although it is now supported by all major cellular phone networks.
Although SMS is most commonly used for text messaging between friends or coworkers, it
also has a variety of additional uses. For example, SMS subscription services can send
weather, news, sports updates, and financial quotes to consumers’ phones. Employees may also
be notified of sales requests, service stops, and other business-related information via SMS.

2. MMS: MMS (Multimedia Messaging Service) messaging is a standard method of delivering


multimedia material, including messages. MMS, as opposed to SMS, can send up to forty
seconds of video, one picture, a multi-image slideshow, or audio. MMS texting will be
supported by the majority of contemporary devices. MMS capability is typically embedded
within the text message interface and is turned on automatically when needed. If you enter in a
text-only message, for example, it will be transmitted by SMS. If you include a graphic or
video, the multimedia part will be sent via MMS. Similarly, if someone sends you a
multimedia message, your phone will automatically receive the file via MMS.

12
3. 3G: The third letter in the designation 3G stands for third-generation access technology,
which allows mobile phones to connect to the internet. Every new technology introduces new
frequency bands and data transmission rates.
The first generation emerged in the 1980s. First-generation uses large phones that had to be
mounted on top of cars because they were too heavy to hold. Text messaging was made
possible by the second-generation network, which became available in the 1990s. This huge
and game-changing advancement also provided a more secure network and laid the path for
today’s ubiquitous 3G and 4G technology.

Upload speeds of up to 3 Mbps are possible on 3G networks. For example, about 15 seconds
for uploading a 3-minute MP3 song. The fastest 2G phones, on the other hand, may get up to
144Kbps For example, about 8 minutes to download a 3-minute song. 3G systems are intended
for digital phones with a full-screen display and better connectivity.

4. 4G: The fourth generation of mobile networking technology is known as 4G, which comes
after the 2G and 3G networks. Although it’s commonly referred to as 4G LTE, this isn’t
exactly right because LTE is just one sort of 4G. Most mobile network service providers use it
now since it is the most developed technology.
However, as you may have heard, 5G is becoming operational alongside current 3G and 4G
mobile networks. When it initially came out, 4G revolutionized how we use the mobile
internet. Despite the fact that 3G networks were relatively limited, 4G network connectivity
allowed consumers to browse the internet and watch HD films on their mobile devices, thereby
turning smartphones into laptops.

Premium 4G offers download speeds of around 14 Mbps, which is over five times quicker than
the 3G network’s predecessor. 4G networks can currently attain speeds of up to 150 Mbps,
allowing users to download gigabytes of data in minutes, if not seconds, rather than hours as
with 3G networks. Uploading data is also significantly faster with 4G – normal upload speeds
are over 8 Mbps, with theoretical rates of up to 50 Mbps, whereas 3G upload speeds are under
0.5 Mbps.

5. Global System for Mobile technology: The (GSM) is an acronym for Global System for
Mobile Communication. GSM is a cellular technology that is open and digital and is used for

13
mobile communication. It operates on the 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz
frequency ranges. It employs a hybrid of FDMA and TDMA.
6. Code Division Multiple Access: (CDMA) is an acronym for code division multiple access.
It is a channel access mechanism that also serves as an example of multiple access. Multiple
access simply means that data from multiple transmitters can be delivered onto a single
communication channel at the same time.
7. Wi-Fi (Wireless Fidelity): Wi-Fi is a wireless networking technology that allows us to
connect to a network or to other computers or mobile devices across a wireless channel. Data is
delivered in a circular region over radio frequencies in Wi-Fi. Wi-Fi (Wireless Fidelity) is a
generic acronym for a communication standard for a wireless network that functions as a Local
Area Network without the use of cables or other types of cabling.

New development in informatics

Informatica can handle a large volume of data. The Informatica tool provides a complete data
integration solution and data management system.

Informatica is introduced as a software development company in the market. It provides a


complete data integration solution and data management system. It launched multiple products
that mainly focused on data integration.

Informatica is used to extracting required data form operation all systems and transforms the
same data on its server and load it to the data warehouse.

Informatica Key Metrics

Some main points that reflect the growth in demand for the Informatica certification, such as:

o 2015 income was $1.06 billion, more than the combined income of Abinitio, DataStage,
SSIS, and other ETL tools.

14
o 7-year Annual CAGR is 30 percent.

o Partners are above 450.

o Major SI, ISV, OEM, and on-demand leaders.

o Customers are above 5,000.

o Customers in 82 countries and a direct presence in 28 countries.

o Number 1 in customer loyalty rankings from 7 years.

According to all the above facts, it confirms that Informatica is in the huge demand in the world.
9.6.0 is the latest version of Informatica PowerCenter, which is available in the market. Below
are the following different editions for the PowerCenter:

o Standard Edition

o Advanced Edition

o Premium Edition

The Allianz, Fannie Mae, Samsung, ING, and U.S Air Force are the popular clients using the
Informatica PowerCenter as the data integration tool.

IBM DataStage, Oracle OWB, Microsoft SSIS, and Ab Initio are the competition tool for the
Informatica.

Here are some options for the Informatica, such as:

o An organization is migrating from an existing legacy system such as mainframe to a new


database system.
o It can be used as a data cleansing tool.

o Integration of data from various heterogeneous system

Why We Need Informatica?


o To perform some operations on the data at the backend in a data system, then we need the
Informatica.

15
o To modify, cleaning up the data based on some set of rules, we need the Informatica.

o By using the Informatica, it is accessible to the loading of bulk data from one system to
another.
o It provides a broad set of features such as integration of the data from multiple
unstructured, semi-structured or structured systems, operations at row level on data, and
scheduling operation of the data operation.
o It also supports the features of metadata, so it keeps preserved the information of the
process and data operations.

16

You might also like