- •It (Information Technology)
- •Ict (Information and Communication Technology)
- •Input Devices
- •Input Devices
- •Impact Printers
- •Graphical user interface
- •Post-wimp interfaces
- •Operating system command-line interfaces
- •Application command-line interfaces
- •Cli software
- •Hybrid software
- •World Wide Web
- •Architecture
- •Web Server
- •Web Server Working
- •Instant Messaging (im)
- •Internet Relay Chat (irc)
- •Usenet (usEr neTwork)
- •Mailing list vs. Newsgroup
- •Online Education
- •Online Training
- •Online certification
- •Available Social networking Services
- •Internet Security
- •Threats
- •5 Conclusions
Available Social networking Services
The following table describes some of the famous social networking services provided over web and mobile:
S.N. |
Service Description |
1. |
Facebook Allows to share text, photos, video etc. It also offers interesting online games. |
2. |
Google+ It is pronounced as Google Plus. It is owned and operated by Google. |
3. |
Twitter Twitter allows the user to send and reply messages in form of tweets. These tweets are the small messages, generally include 140+ characters. |
4. |
Faceparty Faceparty is a UK based social networking site. It allows the users to create profiles and interact with each other using forums messages. |
5. |
Linkedin Linkedin is a business and professional networking site. |
6. |
Flickr Flickr offers image hosting and video hosting. |
7. |
Ibibo Ibibo is a talent based social networking site. It allows the users to promote one’s self and also discover new talent. |
8. |
Whatsapp It is a mobile based messaging app. It allows to send text, video, and audio messages |
9. |
Line It is same as whatsapp. Allows to make free calls and messages. |
10. |
Hike It is also mobile based messager allows to send messages and exciting emoticons. |
Internet Security
Internet security refers to securing communication over the internet. It includes specific security protocols such as:
Internet Security Protocol (IPSec)
Secure Socket Layer (SSL)
Threats
Internet security threats impact the network, data security and other internet connected systems. Cyber criminals have evolved several techniques to threat privacy and integrity of bank accounts, businesses, and organizations.
Following are some of the internet security threats:
Mobile worms
Malware
PC and Mobile ransomware
Large scale attacks like Stuxnet that attempts to destroy infrastructure.
Hacking as a Service
Spam
Phishing
Email Phishing
Email phishing is an activity of sending emails to a user claiming to be a legitimate enterprise. Its main purpose is to steal sensitive information such as usernames, passwords, and credit card details.
Such emails contains link to websites that are infected with malware and direct the user to enter details at a fake website whose look and feels are same to legitimate one.
What a phishing email may contain?
Following are the symptoms of a phishing email:
Spelling and bad grammar
Most often such emails contain grammatically incorrect text. Ignore such emails, since it can be a spam.
Beware of links in email
Don’t click on any links in suspicious emails.
Threats
Such emails contain threat like “your account will be closed if you didn’t respond to an email message”.
Spoofing popular websites or companies
These emails contain graphics that appear to be connected to legitimate website but they actually are connected to fake websites.
Digital Signature
Digital signatures allow us to verify the author, date and time of signatures, authenticate the message contents. It also includes authentication function for additional capabilities.
A digital signature should not only be tied to the signing user, but also to the message.
Applications
There are several reasons to implement digital signatures to communications:
Authentication
Digital signatures help to authenticate the sources of messages. For example, if a bank’s branch office sends a message to central office, requesting for change in balance of an account. If the central office could not authenticate that message is sent from an authorized source, acting of such request could be a grave mistake.
Integrity
Once the message is signed, any change in the message would invalidate the signature.
Non-repudiation
By this property, any entity that has signed some information cannot at a later time deny having signed it.
Firewall Security
Firewall is a barrier between Local Area Network (LAN) and the Internet. It allows keeping private resources confidential and minimizes the security risks. It controls network traffic, in both directions.
The following diagram depicts a sample firewall between LAN and the internet. The connection between the two is the point of vulnerability. Both hardware and the software can be used at this point to filter network traffic.
There are two types of Firewall system: One works by using filters at the network layer and the other works by using proxy servers at the user, application, or network layer.
Quessions:
1.How does mailing list work?
2. What is Social Networking?
3.What a phishing email may contain?
4. What is Internet Collaboration?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer science”, Shimkent 2008, 84 pages.
Lecture №10 . Cloud and mobile technologies
Plan:Date centres. Tendencies of development of the modern infrastructure decisions. Principles of cloud computing. Technologies of virtualization. Web service in the Cloud. Main terms and concepts of mobile technologies. Mobile services. Standards of mobile technologies.
Nowadays, the IT industry is revolving around the build-out and adoption of a new platform, characterized by mobility, cloud-based application and service delivery, and value-generating overlays of social business and pervasive analytics. The paper explores the convergence of mobile, cloud, and social, as well as the effects for the enterprise and the emergence of the new enterprise application platforms. In the beginning we set the stage, while showing the ex-pansion of the mobile, cloud, and social in the business information system, as they were found in the literature. We then look over the IT trends, especially the consumerization of IT, as reasons and basis for the information systems embracing of mobile. Afterwards, we present a mobility roadmap for the enterprise and illustrate the reconfiguration of the enterprise ap-plication platform.
There are seven phases in a mobile IT pro-ject:
Alignment of the project with the enter-prise mobility strategy. An enterprise must have a long term mobility strategic vision, coupled with a short to mid-term tactical approach meant to link the rapid technology changes with the business goals and the users’ requirements.
User workflow analysis. Like any other application development, a good process analysis is placed in the beginning and it targets the identification of requirements. Users play an important role, as in every requirements specification phase of a pro-ject.
Mobile platform selection. There are two types of platforms to be selected: Mobile Enterprise Application Platform (MEAP) and Mobile Device Management Plat-form (MDMP). They must provide tools for managing the applications, users and devices, on one side and instruments for building integrated mobile applications with the operational workflows across the enterprise, on the other side. It is a difficult phase because there are many available products, offering different ca-pabilities. Many of them are offering an integrated development studio which ac-celerates the mobile application devel-opment (used effectively in phase 6). Even if at the moment only the MDM platform is necessary, it is recommenda-ble to select the MEAP, as they should match.
Device and operating system selection. This is another problematical phase, due to the diversity of options and the em-ployees’ pressure to use their own mobile devices. From the technical point of view, the first choice seems to be the most popular devices and OSs but this is more appropriate when developing for individual consumers. For enterprise ap-plications, technical criteria should be analyzed, as well as users’ related issues.
The purpose is to ensure a proper man-agement of the devices (staging, monitor-ing, malfunctioning, etc.) in correlation with their lifecycle. The ideal would be to have a device-agnostic mobile applica-tion, which is compatible with most oper-ating systems and may also work on dif-ferent types of devices, including note-books, tablet PCs or smartphones .
Back-end integration. It is an essential phase in the economy of the project. A project might fail if the back-end integra-tion doesn’t work. The most common used platform is EAI (Enterprise Applica-tion Integration) which is a middleware layer in the enterprise information archi-tecture. This middleware layer aggregates data from the back-end (ERP) system and intelligently distributes in the appropriate format to the mobile devices. Having the greater than before number of mobile ap-plications, a new middleware layer is re-sponsible for back-end integration: the MEAP.
Mobile application development. Lots of mobile apps are developed, but so many of them are poorly designed and fail to deliver functionality. A good mobile ap-plication is highly usable, has a proper and accepted way to access information, has a well-designed user interface, and is responsive. The three basic requirements are: user-friendliness, response time and switch between applications, look and feel. Ideally, whether the mobile devices are company-owned or employee-owned, mobile applications should be written once and deployed to many devices via a mobile cloud model (BaaS).
Mobile application deployment. If the development phase produced a user-friendly and usable application, the de-ployment will succeed. This phase also includes a change management process. The accomplishment of this phase is sub-stantially dependable on the end-users,
which should be involved from the early phases because they may contribute to the development process and the training programs.
Table 1. The main aspects
M
obile
MEAP and MDMP choice
Match the MEAP with the BaaS system
Ensure privacy and protect personal information
Generate appropriate data to deliver business value (context of location, be-haviour, activity)
Social Social training and education in order to drive social integration
Reconsider the business goals
Take data from the social interaction into the enterprise database
Tie the social platform into a cloud based system
Cloud Choose a service model (IaaS, PaaS, SaaS)
Define specific needs (speed of development, test, deployment etc.)
Choose a deployment model (private, public hybrid)
Deal with the security issues
Analyze the vendor dependency
We believe that the proliferation of smart de-vices and mobile cloud apps in the enterprise is driving the constant reconsideration of the enterprise mobility strategy. Based on the strategy, evaluation is performed and then the solution turns out, following the well-known sequence “develop – integrate – deploy – manage” (presented earlier with the seven phases) in a cloud-based environment
As many reports indicate, mobile develop-ment faces many challenges:
connectivity to back-end systems and da-ta;
device diversity and multiple platforms;
high users’ expectations;
integration with existing development processes.
A reliable mobile enterprise applications pro-ject has in our opinion two weak spots: inte-gration and security. The first because there’s more than just one type of integration in-volved: one is the connection of new mobile app with the existing systems (integration capabilities between various mobile technol-ogies) and the other concerns the correlation with the existing business processes that it will replace, impact, or improve. Security is perhaps the Achilles’ heel, mainly because mobile devices are more exposed to malware and they enable new forms of attack. Ongo-ing efforts in achieving security are reported.
