SlideShare a Scribd company logo
1 of 56
History of Information System
•Ancient time: Symbols and images,
•Development of written language
through Mesopotamia and Egypt was
a major milestone.
•Allowed to store & transmit info. In
organized and structured form
--- Anupam Singh
History of Information System
•15th Centaury: Invention of the
printing press. The turning point.
•Allowed for mass production of
written material
•Dissemination of knowledge on a
much larger scale.
--- Anupam Singh
History of Information System
• 19th century: Development of the
telegraph and the telephone,
•Revolutionized communication
•Allowed: rapid transmission of
information over long distances.
--- Anupam Singh
History of Information System
• 20th century: Electronic computing,
development of the first digital
information systems.
•In the 1950s and 1960s, large
mainframe computers were used by
corporations and governments to store
and process large amounts of data.
--- Anupam Singh
History of Information System
• 1970: emergence of personal
computers, made computing power
available to individuals & small
businesses.
• 1990s and 2000s: Development of the
internet, revolutionized information
systems, making it possible for people
to access and share information on a
global scale.
--- Anupam Singh
History of Information System
• Today, information systems continue
to evolve and develop at a rapid pace,
•with advances in artificial
intelligence, big data analytics, and
cloud computing changing the way we
store, process, and use information.
--- Anupam Singh
Importance of Information System
To Control The Creation and
Growth of Records
•The amount of paper in our offices
continue to escalate.
•an effective Information
System addresses both, to stabilize the
growth of records.
--- Anupam Singh
Importance of Information System
To Reduce Operating Costs
• Recordkeeping requires
administrative dollars, space in offices,
and staffing to maintain an organized
filing system.
•It costs considerably less per linear
foot to store inactive records in
an Information System.
--- Anupam Singh
Importance of Information System
To Improve Efficiency and
Productivity
•Time spent searching for missing or
misfiled records is non-productive;
•a good Information System helps any
organization upgrade its recordkeeping
systems so that information retrieval is
enhanced.
--- Anupam Singh
Importance of Information System
To Ensure Regulatory
Compliance
•Organization can be reasonably sure
that it is in full compliance with laws
and regulations is by operating a good
management Information
System which takes responsibility for
regulatory compliance.
--- Anupam Singh
Importance of Information System
To Support Better
Management Decision
Making
•A good Information System can help
ensure that managers and executives
have the information they need WHEN
they need it.
--- Anupam Singh
Changing Nature of Information Systems
From centralized to distributed
systems:
•In past: information systems were
often centralized
data stored: mainframe computers
Accessible: only to a select few.
•Today: Information systems are
typically distributed
Data stored: multiple servers
Accessible: from anywhere via the
internet.
--- Anupam Singh
Changing Nature of Information Systems
From batch processing to real-time
processing:
•In past:
Data processing was often done in
batches, with large amounts of data
processed at once.
•Today:
Data processing is often done in
real-time, with data being processed
as it is collected.
--- Anupam Singh
Changing Nature of Information Systems
From transaction processing to
business intelligence:
• In past: information systems were
often used for transaction processing,
such as recording sales or tracking
inventory.
•Today: however, information systems
are often used for business
intelligence, such as analyzing
customer data to identify trends and
opportunities.
--- Anupam Singh
Changing Nature of Information Systems
From on-premises to cloud-based
systems:
•In past: information systems were
typically hosted on-premises, with
organizations responsible for
maintaining their own hardware and
software.
•Today: Many organizations are moving
to cloud-based systems, which offer
greater flexibility and scalability.
--- Anupam Singh
Need of Distributed Information Systems
Scalability:
•Distributed information systems can
be scaled up or down to meet
Changing demands:
Processing power
Storage capacity.
•This makes it easier to handle
Large volumes of data
Accommodate growing
numbers of users.
--- Anupam Singh
Need of Distributed Information Systems
Fault tolerance:
Distributed information systems are
designed to be fault-tolerant:
They can continue to operate
even if one or more components fail.
This is achieved by
Replicating data & processing
across multiple nodes in the network.
--- Anupam Singh
Need of Distributed Information Systems
Performance:
•Distributed information systems can
provide faster processing & response
times by leveraging the processing
power of multiple computers.
•This is important for applications that
require high levels of processing
power, such as: scientific simulations
big data analytics.
--- Anupam Singh
Need of Distributed Information Systems
Security:
•Distributed information systems can
provide better security by distributing
data and processing across multiple
nodes in the network.
•This makes it more difficult for an
attacker to compromise the system by
targeting a single point of failure.
--- Anupam Singh
Need of Distributed Information Systems
Geographic distribution:
•Distributed information systems can
support geographically dispersed
users and data by replicating data
across multiple locations.
•This allows users to access data from
anywhere in the world and ensures
that data is available even if one
location experiences an outage.
--- Anupam Singh
Role of Internet and Web Services
Communication:
•The internet has made
communication faster, easier, and
more accessible.
• With web services such as email,
instant messaging, and video
conferencing, people can communicate
with others across the world in real-
time.
--- Anupam Singh
Role of Internet and Web Services
Information Access:
•The internet is a vast repository of
information on almost any subject.
•With web services such as search
engines and online databases, people
can access information quickly and
easily.
--- Anupam Singh
Role of Internet and Web Services
E-commerce:
•Web services have enabled the
growth of e-commerce, allowing
businesses to sell products and
services online.
•E-commerce has made it easier for
consumers to shop and compare
prices, and for businesses to reach a
global audience.
--- Anupam Singh
Role of Internet and Web Services
Social Networking:
•Web services such as social media
platforms have changed the way we
connect with each other
• Enabling us to share photos, videos,
and information with friends and
family around the world.
--- Anupam Singh
Role of Internet and Web Services
Cloud Computing:
Web services have enabled the growth
of cloud computing
where software and storage
resources are accessed over
the internet, rather than
being stored locally on a
computer.
--- Anupam Singh
Information System Threats and attacks
Malware:
•This is malicious software that is
designed to harm or exploit computer
systems.
•Examples: viruses, worms, Trojans,
and ransomware.
--- Anupam Singh
Information System Threats and attacks
Phishing:
•This is a technique used to obtain
sensitive information, such as login
credentials or credit card details, by
posing as a trustworthy entity in an
electronic communication.
--- Anupam Singh
Information System Threats and attacks
Social engineering:
•This is a method of manipulating
people to divulge confidential
information or perform actions that
are not in their best interest.
--- Anupam Singh
Information System Threats and attacks
Denial of service (DoS) and distributed
denial of service (DDoS) attacks:
•These attacks aim to disrupt the
availability of a network or system by
overwhelming it with traffic.
--- Anupam Singh
Information System Threats and attacks
SQL injection:
•This is a type of attack that targets
SQL databases by inserting malicious
code into user input fields to gain
unauthorized access or modify data.
--- Anupam Singh
Information System Threats and attacks
Man-in-the-middle (MITM) attacks:
This is a type of attack where an
attacker intercepts communication
between two parties to steal or modify
data.
--- Anupam Singh
Information System Threats and attacks
Physical theft or damage:
This involves physically stealing or
damaging computer systems, storage
media, or other hardware components.
--- Anupam Singh
Information System Threats and attacks
Insider threats:
These are threats that come from
within an organization, such as
disgruntled employees or contractors
who have access to sensitive
information.
--- Anupam Singh
Classification of Threats and Assessing
Damages
Physical Threats:
•These are threats that can cause
physical harm or damage to
individuals, organizations, or property.
•Examples: fire, natural disasters, theft,
and vandalism.
Assess:
•By evaluating the cost of repairs or
replacement of damaged property
•potential injuries or loss of life.
--- Anupam Singh
Classification of Threats and Assessing
Damages
Cyber Threats:
•These are threats that target
computer systems and networks
•Ex-malware, hacking, phishing, and
denial-of-service attacks.
•Assess: by evaluating the cost of lost
data, system downtime, and the
impact on the organization's
reputation.
--- Anupam Singh
Classification of Threats and Assessing
Damages
Human Threats:
•Come from people, either intentionally or
unintentionally.
•Examples: Insider threats, social
engineering, and human error.
Assess: by evaluating the cost of
remediation, such as:
retraining employees,
implementing new security measures,
conducting investigations.
--- Anupam Singh
Classification of Threats and Assessing
Damages
Environmental Threats:
These are threats that arise from the
environment, such as pollution, climate
change, and natural disasters.
Assess: by evaluating the cost of
environmental remediation and any
impact on public health and safety.
--- Anupam Singh
Security Challenges in Mobile Devices
Malware:
•Includes: viruses, Trojans, and worms,
can infect mobile devices and
compromise their security.
•Malware can steal data, spy on users,
or even take control of the device.
•Users can inadvertently download
malware by clicking on malicious links
or downloading fake apps.
--- Anupam Singh
Security Challenges in Mobile Devices
Data Leakage:
Data leakage occurs when sensitive
information is transmitted from a
mobile device without proper
authorization.
Happens:
• users connect to unsecured Wi-Fi
networks
•data is transmitted over insecure
channels.
--- Anupam Singh
Security Challenges in Mobile Devices
Phishing:
• Attacks target mobile users by tricking
them into providing sensitive
information such as usernames,
passwords, and credit card details.
•Occur through email, SMS, or social
media.
--- Anupam Singh
Security Challenges in Mobile Devices
Lost or Stolen Devices:
•Can pose a significant security risk.
• If the device is not secured with a
strong password or biometric
authentication, anyone can access the
data stored on the device.
--- Anupam Singh
Security Challenges in Mobile Devices
Outdated Software:
Outdated software can be vulnerable
to security exploits, leaving mobile
devices open to attack.
It is important to keep mobile devices
updated with the latest security
patches and software upgrades.
--- Anupam Singh
Security Challenges in Mobile Devices
Unsecured Applications:
•Users can inadvertently download
malicious apps that can compromise
their mobile device's security.
•Users should only download apps
from trusted sources, and they should
always check the permissions
requested by the app.
--- Anupam Singh
Security Challenges in Mobile Devices
Jail breaking and Rooting:
•Removing software restrictions that
are intentionally put in place by
the device manufacturer.
•Jail breaking and rooting mobile
devices can provide users with
additional functionality and
customization options.
--- Anupam Singh
Important Terms in Information Security
Authentication
A crucial aspect of information
security that ensures that the identity
of a user or system is confirmed
before granting access to sensitive
information or resources.
Implemented: username/password
combinations, biometric identification,
or digital certificates.
--- Anupam Singh
Important Terms in Information Security
Confidentiality:
Protection of sensitive information
from unauthorized disclosure.
Achieved through encryption, access
controls, and other security measures.
--- Anupam Singh
Important Terms in Information Security
Integrity:
Accuracy and consistency of
information, ensuring that it has not
been tampered with or altered in any
way.
Achieved through data validation,
checksums, and other methods.
--- Anupam Singh
Important Terms in Information Security
Availability
Accessibility of information and
resources when needed.
Achieved through redundancy,
disaster recovery planning, and other
measures to prevent downtime or
outages.
--- Anupam Singh
Important Terms in Information Security
Authorization:
Process of granting or denying
access to specific resources or
actions based on a user's
identity and permissions.
--- Anupam Singh
Important Terms in Information Security
Encryption:
Process of transforming information
into a form that cannot be read or
understood without a decryption key
or password.
--- Anupam Singh
Important Terms in Information Security
Firewall:
A network security device that
controls incoming and outgoing traffic
based on a set of predefined rules.
--- Anupam Singh
Important Terms in Information Security
Intrusion Detection System (IDS):
A software or hardware system that
monitors network traffic for signs of
suspicious activity or attacks.
--- Anupam Singh
Important Terms in Information Security
Patch:
A software update that addresses a
vulnerability or bug in a system.
--- Anupam Singh
Important Terms in Information Security
Risk:
The likelihood and potential impact of
a security threat or vulnerability.
--- Anupam Singh
Important Terms in Information Security
Vulnerability:
A weakness or gap in security that can
be exploited by attackers to gain
unauthorized access to a system or
information.
--- Anupam Singh
Thanks
All Images taken from
Google(just to make the topic
easy and simple)

More Related Content

Similar to ISCL.pptx

Unit 1.1 introduction to cloud computing
Unit 1.1   introduction to cloud computingUnit 1.1   introduction to cloud computing
Unit 1.1 introduction to cloud computingeShikshak
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Lesson 8 info systems model
Lesson 8 info systems modelLesson 8 info systems model
Lesson 8 info systems modelOneil Powers
 
Uc14 chap12
Uc14 chap12Uc14 chap12
Uc14 chap12ayahye
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit iAndreaTugwell
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit iAndreaTugwell
 
Supply chain management unit 5
Supply chain management  unit 5Supply chain management  unit 5
Supply chain management unit 5Saravanan Murugan
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
Amazon, apple, facebook and google
Amazon, apple, facebook and googleAmazon, apple, facebook and google
Amazon, apple, facebook and googleChetan Dua
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 

Similar to ISCL.pptx (20)

Computer networks
Computer networksComputer networks
Computer networks
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
Mis
MisMis
Mis
 
Unit 1.1 introduction to cloud computing
Unit 1.1   introduction to cloud computingUnit 1.1   introduction to cloud computing
Unit 1.1 introduction to cloud computing
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Lesson 8 info systems model
Lesson 8 info systems modelLesson 8 info systems model
Lesson 8 info systems model
 
Uc14 chap12
Uc14 chap12Uc14 chap12
Uc14 chap12
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
7939848.ppt
7939848.ppt7939848.ppt
7939848.ppt
 
Supply chain management unit 5
Supply chain management  unit 5Supply chain management  unit 5
Supply chain management unit 5
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
Amazon, apple, facebook and google
Amazon, apple, facebook and googleAmazon, apple, facebook and google
Amazon, apple, facebook and google
 
Information Security
Information SecurityInformation Security
Information Security
 
Uc14 chap12
Uc14 chap12Uc14 chap12
Uc14 chap12
 
Unit 1
Unit 1Unit 1
Unit 1
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Chapter 1 foundations of information systems in business
Chapter 1  foundations of information systems in businessChapter 1  foundations of information systems in business
Chapter 1 foundations of information systems in business
 

More from 109MukeshSingh

DOC-20230402-WA0023..pptx
DOC-20230402-WA0023..pptxDOC-20230402-WA0023..pptx
DOC-20230402-WA0023..pptx109MukeshSingh
 
presentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptxpresentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptx109MukeshSingh
 
presentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptxpresentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptx109MukeshSingh
 
nlp-saurabhnarhe-180402173724.pdf
nlp-saurabhnarhe-180402173724.pdfnlp-saurabhnarhe-180402173724.pdf
nlp-saurabhnarhe-180402173724.pdf109MukeshSingh
 
naturallanguageprocessing1-131229185458-phpapp01.pdf
naturallanguageprocessing1-131229185458-phpapp01.pdfnaturallanguageprocessing1-131229185458-phpapp01.pdf
naturallanguageprocessing1-131229185458-phpapp01.pdf109MukeshSingh
 
presentationnaturallanguage-181004162107.pdf
presentationnaturallanguage-181004162107.pdfpresentationnaturallanguage-181004162107.pdf
presentationnaturallanguage-181004162107.pdf109MukeshSingh
 
presentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptxpresentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptx109MukeshSingh
 

More from 109MukeshSingh (12)

ISCL.pptx
ISCL.pptxISCL.pptx
ISCL.pptx
 
DOC-20230402-WA0023..pptx
DOC-20230402-WA0023..pptxDOC-20230402-WA0023..pptx
DOC-20230402-WA0023..pptx
 
presentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptxpresentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptx
 
MIS PPT (1).pptx
MIS PPT (1).pptxMIS PPT (1).pptx
MIS PPT (1).pptx
 
MIS PPT.pptx
MIS PPT.pptxMIS PPT.pptx
MIS PPT.pptx
 
presentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptxpresentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptx
 
ecom.ppt
ecom.pptecom.ppt
ecom.ppt
 
nlp-saurabhnarhe-180402173724.pdf
nlp-saurabhnarhe-180402173724.pdfnlp-saurabhnarhe-180402173724.pdf
nlp-saurabhnarhe-180402173724.pdf
 
naturallanguageprocessing1-131229185458-phpapp01.pdf
naturallanguageprocessing1-131229185458-phpapp01.pdfnaturallanguageprocessing1-131229185458-phpapp01.pdf
naturallanguageprocessing1-131229185458-phpapp01.pdf
 
presentationnaturallanguage-181004162107.pdf
presentationnaturallanguage-181004162107.pdfpresentationnaturallanguage-181004162107.pdf
presentationnaturallanguage-181004162107.pdf
 
presentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptxpresentationnaturallanguage-181004162107.pptx
presentationnaturallanguage-181004162107.pptx
 
TA-02.pdf
TA-02.pdfTA-02.pdf
TA-02.pdf
 

Recently uploaded

CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 

Recently uploaded (20)

CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 

ISCL.pptx

  • 1. History of Information System •Ancient time: Symbols and images, •Development of written language through Mesopotamia and Egypt was a major milestone. •Allowed to store & transmit info. In organized and structured form --- Anupam Singh
  • 2. History of Information System •15th Centaury: Invention of the printing press. The turning point. •Allowed for mass production of written material •Dissemination of knowledge on a much larger scale. --- Anupam Singh
  • 3. History of Information System • 19th century: Development of the telegraph and the telephone, •Revolutionized communication •Allowed: rapid transmission of information over long distances. --- Anupam Singh
  • 4. History of Information System • 20th century: Electronic computing, development of the first digital information systems. •In the 1950s and 1960s, large mainframe computers were used by corporations and governments to store and process large amounts of data. --- Anupam Singh
  • 5. History of Information System • 1970: emergence of personal computers, made computing power available to individuals & small businesses. • 1990s and 2000s: Development of the internet, revolutionized information systems, making it possible for people to access and share information on a global scale. --- Anupam Singh
  • 6. History of Information System • Today, information systems continue to evolve and develop at a rapid pace, •with advances in artificial intelligence, big data analytics, and cloud computing changing the way we store, process, and use information. --- Anupam Singh
  • 7. Importance of Information System To Control The Creation and Growth of Records •The amount of paper in our offices continue to escalate. •an effective Information System addresses both, to stabilize the growth of records. --- Anupam Singh
  • 8. Importance of Information System To Reduce Operating Costs • Recordkeeping requires administrative dollars, space in offices, and staffing to maintain an organized filing system. •It costs considerably less per linear foot to store inactive records in an Information System. --- Anupam Singh
  • 9. Importance of Information System To Improve Efficiency and Productivity •Time spent searching for missing or misfiled records is non-productive; •a good Information System helps any organization upgrade its recordkeeping systems so that information retrieval is enhanced. --- Anupam Singh
  • 10. Importance of Information System To Ensure Regulatory Compliance •Organization can be reasonably sure that it is in full compliance with laws and regulations is by operating a good management Information System which takes responsibility for regulatory compliance. --- Anupam Singh
  • 11. Importance of Information System To Support Better Management Decision Making •A good Information System can help ensure that managers and executives have the information they need WHEN they need it. --- Anupam Singh
  • 12. Changing Nature of Information Systems From centralized to distributed systems: •In past: information systems were often centralized data stored: mainframe computers Accessible: only to a select few. •Today: Information systems are typically distributed Data stored: multiple servers Accessible: from anywhere via the internet. --- Anupam Singh
  • 13. Changing Nature of Information Systems From batch processing to real-time processing: •In past: Data processing was often done in batches, with large amounts of data processed at once. •Today: Data processing is often done in real-time, with data being processed as it is collected. --- Anupam Singh
  • 14. Changing Nature of Information Systems From transaction processing to business intelligence: • In past: information systems were often used for transaction processing, such as recording sales or tracking inventory. •Today: however, information systems are often used for business intelligence, such as analyzing customer data to identify trends and opportunities. --- Anupam Singh
  • 15. Changing Nature of Information Systems From on-premises to cloud-based systems: •In past: information systems were typically hosted on-premises, with organizations responsible for maintaining their own hardware and software. •Today: Many organizations are moving to cloud-based systems, which offer greater flexibility and scalability. --- Anupam Singh
  • 16. Need of Distributed Information Systems Scalability: •Distributed information systems can be scaled up or down to meet Changing demands: Processing power Storage capacity. •This makes it easier to handle Large volumes of data Accommodate growing numbers of users. --- Anupam Singh
  • 17. Need of Distributed Information Systems Fault tolerance: Distributed information systems are designed to be fault-tolerant: They can continue to operate even if one or more components fail. This is achieved by Replicating data & processing across multiple nodes in the network. --- Anupam Singh
  • 18. Need of Distributed Information Systems Performance: •Distributed information systems can provide faster processing & response times by leveraging the processing power of multiple computers. •This is important for applications that require high levels of processing power, such as: scientific simulations big data analytics. --- Anupam Singh
  • 19. Need of Distributed Information Systems Security: •Distributed information systems can provide better security by distributing data and processing across multiple nodes in the network. •This makes it more difficult for an attacker to compromise the system by targeting a single point of failure. --- Anupam Singh
  • 20. Need of Distributed Information Systems Geographic distribution: •Distributed information systems can support geographically dispersed users and data by replicating data across multiple locations. •This allows users to access data from anywhere in the world and ensures that data is available even if one location experiences an outage. --- Anupam Singh
  • 21. Role of Internet and Web Services Communication: •The internet has made communication faster, easier, and more accessible. • With web services such as email, instant messaging, and video conferencing, people can communicate with others across the world in real- time. --- Anupam Singh
  • 22. Role of Internet and Web Services Information Access: •The internet is a vast repository of information on almost any subject. •With web services such as search engines and online databases, people can access information quickly and easily. --- Anupam Singh
  • 23. Role of Internet and Web Services E-commerce: •Web services have enabled the growth of e-commerce, allowing businesses to sell products and services online. •E-commerce has made it easier for consumers to shop and compare prices, and for businesses to reach a global audience. --- Anupam Singh
  • 24. Role of Internet and Web Services Social Networking: •Web services such as social media platforms have changed the way we connect with each other • Enabling us to share photos, videos, and information with friends and family around the world. --- Anupam Singh
  • 25. Role of Internet and Web Services Cloud Computing: Web services have enabled the growth of cloud computing where software and storage resources are accessed over the internet, rather than being stored locally on a computer. --- Anupam Singh
  • 26. Information System Threats and attacks Malware: •This is malicious software that is designed to harm or exploit computer systems. •Examples: viruses, worms, Trojans, and ransomware. --- Anupam Singh
  • 27. Information System Threats and attacks Phishing: •This is a technique used to obtain sensitive information, such as login credentials or credit card details, by posing as a trustworthy entity in an electronic communication. --- Anupam Singh
  • 28. Information System Threats and attacks Social engineering: •This is a method of manipulating people to divulge confidential information or perform actions that are not in their best interest. --- Anupam Singh
  • 29. Information System Threats and attacks Denial of service (DoS) and distributed denial of service (DDoS) attacks: •These attacks aim to disrupt the availability of a network or system by overwhelming it with traffic. --- Anupam Singh
  • 30. Information System Threats and attacks SQL injection: •This is a type of attack that targets SQL databases by inserting malicious code into user input fields to gain unauthorized access or modify data. --- Anupam Singh
  • 31. Information System Threats and attacks Man-in-the-middle (MITM) attacks: This is a type of attack where an attacker intercepts communication between two parties to steal or modify data. --- Anupam Singh
  • 32. Information System Threats and attacks Physical theft or damage: This involves physically stealing or damaging computer systems, storage media, or other hardware components. --- Anupam Singh
  • 33. Information System Threats and attacks Insider threats: These are threats that come from within an organization, such as disgruntled employees or contractors who have access to sensitive information. --- Anupam Singh
  • 34. Classification of Threats and Assessing Damages Physical Threats: •These are threats that can cause physical harm or damage to individuals, organizations, or property. •Examples: fire, natural disasters, theft, and vandalism. Assess: •By evaluating the cost of repairs or replacement of damaged property •potential injuries or loss of life. --- Anupam Singh
  • 35. Classification of Threats and Assessing Damages Cyber Threats: •These are threats that target computer systems and networks •Ex-malware, hacking, phishing, and denial-of-service attacks. •Assess: by evaluating the cost of lost data, system downtime, and the impact on the organization's reputation. --- Anupam Singh
  • 36. Classification of Threats and Assessing Damages Human Threats: •Come from people, either intentionally or unintentionally. •Examples: Insider threats, social engineering, and human error. Assess: by evaluating the cost of remediation, such as: retraining employees, implementing new security measures, conducting investigations. --- Anupam Singh
  • 37. Classification of Threats and Assessing Damages Environmental Threats: These are threats that arise from the environment, such as pollution, climate change, and natural disasters. Assess: by evaluating the cost of environmental remediation and any impact on public health and safety. --- Anupam Singh
  • 38. Security Challenges in Mobile Devices Malware: •Includes: viruses, Trojans, and worms, can infect mobile devices and compromise their security. •Malware can steal data, spy on users, or even take control of the device. •Users can inadvertently download malware by clicking on malicious links or downloading fake apps. --- Anupam Singh
  • 39. Security Challenges in Mobile Devices Data Leakage: Data leakage occurs when sensitive information is transmitted from a mobile device without proper authorization. Happens: • users connect to unsecured Wi-Fi networks •data is transmitted over insecure channels. --- Anupam Singh
  • 40. Security Challenges in Mobile Devices Phishing: • Attacks target mobile users by tricking them into providing sensitive information such as usernames, passwords, and credit card details. •Occur through email, SMS, or social media. --- Anupam Singh
  • 41. Security Challenges in Mobile Devices Lost or Stolen Devices: •Can pose a significant security risk. • If the device is not secured with a strong password or biometric authentication, anyone can access the data stored on the device. --- Anupam Singh
  • 42. Security Challenges in Mobile Devices Outdated Software: Outdated software can be vulnerable to security exploits, leaving mobile devices open to attack. It is important to keep mobile devices updated with the latest security patches and software upgrades. --- Anupam Singh
  • 43. Security Challenges in Mobile Devices Unsecured Applications: •Users can inadvertently download malicious apps that can compromise their mobile device's security. •Users should only download apps from trusted sources, and they should always check the permissions requested by the app. --- Anupam Singh
  • 44. Security Challenges in Mobile Devices Jail breaking and Rooting: •Removing software restrictions that are intentionally put in place by the device manufacturer. •Jail breaking and rooting mobile devices can provide users with additional functionality and customization options. --- Anupam Singh
  • 45. Important Terms in Information Security Authentication A crucial aspect of information security that ensures that the identity of a user or system is confirmed before granting access to sensitive information or resources. Implemented: username/password combinations, biometric identification, or digital certificates. --- Anupam Singh
  • 46. Important Terms in Information Security Confidentiality: Protection of sensitive information from unauthorized disclosure. Achieved through encryption, access controls, and other security measures. --- Anupam Singh
  • 47. Important Terms in Information Security Integrity: Accuracy and consistency of information, ensuring that it has not been tampered with or altered in any way. Achieved through data validation, checksums, and other methods. --- Anupam Singh
  • 48. Important Terms in Information Security Availability Accessibility of information and resources when needed. Achieved through redundancy, disaster recovery planning, and other measures to prevent downtime or outages. --- Anupam Singh
  • 49. Important Terms in Information Security Authorization: Process of granting or denying access to specific resources or actions based on a user's identity and permissions. --- Anupam Singh
  • 50. Important Terms in Information Security Encryption: Process of transforming information into a form that cannot be read or understood without a decryption key or password. --- Anupam Singh
  • 51. Important Terms in Information Security Firewall: A network security device that controls incoming and outgoing traffic based on a set of predefined rules. --- Anupam Singh
  • 52. Important Terms in Information Security Intrusion Detection System (IDS): A software or hardware system that monitors network traffic for signs of suspicious activity or attacks. --- Anupam Singh
  • 53. Important Terms in Information Security Patch: A software update that addresses a vulnerability or bug in a system. --- Anupam Singh
  • 54. Important Terms in Information Security Risk: The likelihood and potential impact of a security threat or vulnerability. --- Anupam Singh
  • 55. Important Terms in Information Security Vulnerability: A weakness or gap in security that can be exploited by attackers to gain unauthorized access to a system or information. --- Anupam Singh
  • 56. Thanks All Images taken from Google(just to make the topic easy and simple)