Individual and Group Presentations
The formal presentation of information is divided into two broad categories: Presentation Skills and Personal Presentation. These two aspects are interwoven and can be described …
Read MBA, BBA, B.COM Notes
The formal presentation of information is divided into two broad categories: Presentation Skills and Personal Presentation. These two aspects are interwoven and can be described …
Information Society An information society is a society where the creation, distribution, use, integration and manipulation of information is a significant economic, political, and cultural …
Cyber Space Two decades ago, the term cyberspace seemed right out of a science fiction movie. In the second decade of the twenty-first century, cyberspace …
Critical infrastructure (or critical national infrastructure (CNI) in the UK) is a term used by governments to describe assets that are essential for the functioning …
The global information infrastructure (GII) is the developing communications framework intended to eventually connect all telecommunications and computer networks world-wide. Sometimes called a network of …
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool …
Hacking Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to …
Internet homicide refers to killing in which victim and perpetrator met online, in some cases having known each other previously only through the Internet. Also …
Malware If you’ve ever seen an antivirus alert pop up on your screen, or if you’ve mistakenly clicked a malicious email attachment, then you’ve had …
(a) False data input: The falsification of the data input is a major threat to IT infrastructure. This threat may arise from: (i) Unreasonable or …