Information Technology For Education Resources

Monday, September 21, 2009

Selamat Idul Fitri 1430 H




SELAMAT IDUL FITRI 1430 H

MOHON MAAF LAHIR DAN BATHIN

Wednesday, May 6, 2009

Computer virus

Computer virus

A computer virus is a computer program which can copy itself and infect a computer without the owner's permission or knowledge. The term "virus" is also common, but there used to refer to a type of malware, adware, spyware and programs that do not have the ability to reproduce. A true virus can spread only from one computer to another (in some form of executable code) if the host is taken to the target computer, for example, because the user that sent through the network or the Internet, or taken as a removable media such as floppy disk, CD, DVD, or USB drive. The virus can be spread to improve the opportunity by infecting other computers on the network file system file or a file system that is accessed by another computer.

The term "computer virus" is sometimes used as a place for all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious software and is not desired), including true viruses. Sometimes with computer viruses and worms Trojan horses, which is technically different. A worm can exploit security vulnerabilities to spread itself to other computers without the need to transfer as part of a host, and Trojan horses are programs that appear harmless but have a hidden agenda. Trojans and worms, such as viruses, can cause damage to both the host computer system from the data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have any symptoms to a user's computer, but many are reticent.

Most personal computers are now connected to the Internet and to local area network, facilitating the spread of malicious code. Currently, the virus can also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging, and file sharing systems to spread.


Tuesday, May 5, 2009

Information technology governance

Information Technology Governance, IT Governance or ICT (Information & Communications Technology) Governance, is a subset discipline of Corporate Governance focuses on information technology (IT) systems and their performance and risk management. The increasing interest in IT governance is partly due to appropriate initiatives, such as Sarbanes-Oxley in the U.S. and Basel II in Europe, and the recognition that IT projects can easily get out of control and profoundly affect the performance of an organization.

A characteristic theme of IT governance discussions is that the IT capability can not be a black box. The involvement of traditional board-level executive in the case of IT is to honor all the important decisions for the company's IT professional. IT shows the system of government in which all parties, including the board, internal customers, and especially such as finance departments, have the necessary input in the decision making process. This prevents IT from independently created and then be fully responsible for poor decisions. This will also prevent users from critical and find that the system does not behave or perform as expected, as described in the Harvard Business Review article by R. Nolan:
Definition

There are narrow and broader definitions of IT governance. Weill and Ross focus on "Setting the decision rights and accountability framework to encourage behavior that is expected in the use of IT." [2]

Conversely, IT Governance Institute to expand the definition to include the basic mechanisms: "... with the leadership and organizational structures and processes that ensure that the organization's IT sustains and extends the organization's strategy and goals." [3]

Meanwhile, AS8015, Australian Standard for Corporate Governance of ICT, defines Corporate Governance of ICT as a "system at this time and the future use of ICT is directed and controlled. Evaluating It involves planning and directing the use of ICT to support the organization and monitoring is used to realize the plan. Termasuk strategies and policies for using ICT in an organization. "
Problems with IT governance

IT governance is different from IT management and control IT? The problem with government IT is that often with good management practices and IT control framework. ISO 38500 has helped the IT by the government as a management system used by the directors. In other words, IT governance is about the work of IT resources in the name of the expected return from their investments. Director is responsible for this job will be to see that management is required to implement the IT and control system. While managing risk and ensuring compliance is an important component of good governance, is more important to be focused on giving value and measure performance.

Nicholas Carr has emerged as a prominent critic of the idea that information technology provides a strategic advantage. [5] this line may imply criticism that significant attention to IT governance that is not useful for chasing the leaders of the company. However, Carr also show counterbalancing concern for effective IT risk management.

Manifestation in the IT governance goals through a detailed process control (for example, in the context of project management) is often controversial in large scale IT management. See agile methods. The difficulty in achieving a balance between financial transparency and cost-effective data capture in the IT financial management (for example, to enable chargeback) is the continued discussion topic in the professional literature [6] [7] and can be seen as a practical limitation to IT governance

Reference:

* Lutchen, M. (2004). Managing IT as a business: a guide to life CEOs. Hoboken, N.J., J. Wiley., ISBN 0-471-47104-6
* Mar J., Simon H., Organizations, Blackwell Publishers, 1993 (First ed. Wiley, 1958), ISBN 0-631-18631-X

Secure operating systems

Secure operating systems

One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever. Though still valid, the technology is in limited use today, primarily because it imposes some changes to system management and also because it is not widely understood. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment. An example of such a Computer security policy is the Bell-La Padula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel. This forms the foundation for a secure operating system which, if certain critical parts are designed and implemented correctly, can ensure the absolute impossibility of penetration by hostile elements. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Ordinary operating systems, on the other hand, lack the features that assure this maximal level of security. The design methodology to produce such secure systems is precise, deterministic and logical.

Systems designed with such methodology represent the state of the art[clarification needed] of computer security although products using such security are not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information, military secrets, and the data of international financial institutions. These are very powerful security tools and very few secure operating systems have been certified at the highest level (Orange Book A-1) to operate over the range of "Top Secret" to "unclassified" (including Honeywell SCOMP, USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation, and therefore there are degrees of security strength defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (such as EAL levels), and these are specified in a Protection Profile for requirements and a Security Target for product descriptions. None of these ultra-high assurance secure general purpose operating systems have been produced for decades or certified under the Common Criteria.

In USA parlance, the term High Assurance usually suggests the system has the right security functions that are implemented robustly enough to protect DoD and DoE classified information. Medium assurance suggests it can protect less valuable information, such as income tax information. Secure operating systems designed to meet medium robustness levels of security functionality and assurance have seen wider use within both government and commercial markets. Medium robust systems may provide the same security functions as high assurance secure operating systems but do so at a lower assurance level (such as Common Criteria levels EAL4 or EAL5). Lower levels mean we can be less certain that the security functions are implemented flawlessly, and therefore less dependable. These systems are found in use on web servers, guards, database servers, and management hosts and are used not only to protect the data stored on these systems but also to provide a high level of protection for network connections and routing services.

Morrie Gasser: Building a secure computer system ISBN 0-442-23022-2 1988

Monday, May 4, 2009

Information Technology

Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.

Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems.

When computer and communications technologies are combined, the result is information technology, or "infotech". Information technology is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. Presumably, when speaking of Information Technology (IT) as a whole, it is noted that the use of computers and information are associated.

The term information technology is sometimes said to have been coined by Jim Domsic of Michigan in November 1981.[citation needed] Domsic, who worked as a computer manager for an automotive related industry, is supposed to have created the term to modernize the outdated phrase "data processing". The Oxford English Dictionary, however, in defining information technology as "the branch of technology concerned with the dissemination, processing, and storage of information, esp. by means of computers" provides an illustrative quote from the year 1958 (Leavitt & Whisler in Harvard Business Rev. XXXVI. 41/1 "The new technology does not yet have a single established name. We shall call it information technology.") that predates the so-far unsubstantiated Domsic coinage.

In recent years ABET and the ACM have collaborated to form accreditation and curriculum standards for degrees in Information Technology as a distinct field of study separate from both Computer Science and Information Systems. SIGITE is the ACM working group for defining these standards.

Wednesday, April 15, 2009

Google AdWords is a great method if you are interested in increasing your affiliate income. However it is not a marketing method that you need to jump into without any knowledge, because you can lose a lot of money this way! I personally think that affiliate marketing is the easiest and best way to make money on the internet, and PPC can really help you increase your earnings. Here are three tips on how to use Google AdWords affiliate marketing to increase your earnings.

1. First off you need to have your budget set so that you do not lose money. Find out what you can afford to spend each day, and set that as your budget within Google AdWords. This is where many affiliates go wrong, they do not set a budget!

2. You need to be very careful with your keyword selection. I think the best method it to use only exact keyword phrases for each campaign. This means that you should put every phrase you want to target in quotes before adding it to your keyword list. In addition this, make sure to exclude any keywords that include the word "free" because you want to only pay for clicks from people who are willing to spend money.

3. Make your ads laser targeted to each product. This works because while you may get less total clicks, your expenses will be less and conversions higher, which leads to more total profit. One thing I like to do is include the price of my product in the ad itself. This will reduce the chance that "freebie seekers" will click your ad.

Google AdWords affiliate marketing can be a very good way to boost your affiliate commissions, but just make sure that you know what you are doing.

Sunday, April 5, 2009

Database

The database can be thought of as a filing cabinet. if we have a file cabinet and have the authority to manage it, then most likely we will do things such as: providing cover to the collection of archives which are stored, specify the archive, with the numbering system to provide a certain unique value in each envelope, and put the archive -archive with a specific sequence in the cupboard.
jal-even if it is not all we do, most do not all apply a file cabinet or a specific rule on how the entire archive is placed or arranged earlier.
we almost never see the file cabinet that does not have rules or the way in the preparation or placement of archives in it.

this is material complete http://budipriatna.wordpress.com/pbd/

Thursday, April 2, 2009

HTML

HTML, an acronym for HyperText Markup Language, is the predominant markup language for web pages. It provides a means to describe the structure of text-based information in a document—by denoting certain text as links, headings, paragraphs, lists, etc.—and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of "tags" that are surrounded by angle brackets. HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code (such as JavaScript) that can affect the behavior of Web browsers and other HTML processors.

SBDL

*Database Management System (DBMS)

o DBMS contains information about a particular enterprise
- Collection of interrelated data and a set of programs to access the data
- Primary goal of a DBMS: to provide a way to store and retrieve data that is both convenient and
efficient to use
o Database Applications:
- Banking: all transactions
- Airlines: reservations, schedules
- Sales: customers, products, purchases
- Online retailers: order tracking, customized recommendations
- Manufacturing: production, inventory, orders, supply chain
- Human resources: employee records, salaries, tax deductions

;;