Information Technology

Read Complete Research Material

INFORMATION TECHNOLOGY

Information Technology

Information Technology

Introduction

In the past century various ground breaking inventions and technologies have evolved. Scientists and critiques have entered in a hot debate to identify which of the technologies has impacted the world most influentially. According to some nuclear science is the biggest achievement of mankind while some argue that the landing on moon is till now the biggest achievement of mankind, however, there is no denial that the most dramatic and influential impact upon mankind has been from the Information Technology. Information Technology is the moist vital tool of globalization which has not only aided the industry of computers but also the cellular mobile industry and the broadcasting industry.

Information Technology is not a one hit wonder technology which developed through an incident but it is a technology which improved day by day through sheer dedication from scientists and engineers. Information Technology is a collective representation of various tools out of which the building block of information technology has been networks and its security since decades (Kaufman and Mike, 2002).

Discussion

Information Technology is the system in which data is transferred in packets and travels through routers from the source device to the destination device. The transfer of data can be internal ion a private network or an external data transfer from one network to another, the linking network between the two networks is a public network which has established on the backbone of Public Switch Telephone Network (PSTN). The transfer of data is very rapid and in the modern era every organization or company has a personnel network which is connected to the rest of the world through public network. The connectivity to the public network is provided by an Intern Service Provider known as ISP.

The facility of Information Technology has eased the functions of airports, hospitals, and banks as they can connect nationwide and internationally to share data and research through the network system. The transfer of data is instantaneous i.e. real time as the human eye cannot identify the shortest span in which data is transferred. However, with such great ease over the internet a major dilemma arises which is illegal access and theft of data. Networks which are either connected internally or to a public network are prone to data thefts and viruses which can harm the computers connected and the entire data can be accessed or stolen by an unauthorized person (William, 2006).

It is the responsibility of the network administrator to ensure that none of the data is accessed or stolen by a un - accessed user, to prevent these aspects of data theft and increasing network security multiple measures are ensured by the network administrator and the level of security is maintained upon the basis of value of data. As home computer have not extremely confidential data the basic security measures is to keep them safe from unauthorized access and virus attacks on the computer. Medium level organizations have small networks which are called Local area Networks and posses vital information of the company ...
Related Ads