Notes

Resources

eLecture: Topic 1 Information Technology Essentials

L1 Information Technology Essentials

L1 Information Technology Essentials.pdf

AY22-T1 Information Technology Essentials

AY22-T1 Information Technology Essentials.pdf

  1. Key Features: Accessible Easy to Use Flexibility of Communication Low Cost Security
  1. Information technology (IT) infrastructure are the components required to operate and manage enterprise IT environments. IT infrastructure can be deployed within a cloud computing system, or within an organization's own facilities.
  1. Physical infrastructure includes power, backup generators, Heating Ventilating and Air Conditioning, surge control systems, connectivity (cabling), hardware, software, and people.
  1. Hacking: Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.

Phishing: Phishing is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate.

Denial of Service Attacks: A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

  1. Social Engineering: Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Digital Forensics: Digital forensics is a branch of forensic science that focuses on identifying, acquiring, processing, analysing, and reporting on data stored electronically. Electronic evidence is a component of almost all criminal activities and digital forensics support is crucial for law enforcement investigations.

  1. Link It is needed so as to tell the students what to do and not to do while on the IT resources, and warn them about all these rules, so that they do not break it.

AY22-P1 Information Technology Essentials

AY22-P1 Information Technology Essentials.pdf