INTRODUCTION
Welcome to Information Communication Technology. This course is a one-semester,
two-credit, undergraduate-level course for learners seeking a Diploma in Information
Technology. This book will help you master the topics for a period of one semester.
COURSE AIMS
Information Communication Technology is geared towards students who wish to acquire
a solid background in the concepts and applications of Information Communication in
organisations. In particular the course first of all exposes the learners to the prerequisite
knowledge of business Information, such as the nature of information in business
organisation, quality of information, strategic use of information, information security ,
etc. The development of Information Technology, Information System and the possible
methodologies to be used for management of information are also described in this
course.
COURSE OBJECTIVES
By the end of this course, you should be able to:
1. Describe the importance of information in business organisation, such as its purpose,
business functions etc;
2. Explain the concept of Information Communication Technology ;
3. Describe the strategic use of information technology;
4. Describe the nature of Information security.
5. Describe the concept and the development of information communication technology.
6. Understand different types of computer networks.
Page 1 of 65
,TABLE OF CONTENT
INTRODUCTION .................................................................................................................... 1
Unit 1: Information Systems ..................................................................................................... 7
ICT - What is good information? .......................................................................................... 7
Introduction to Information System Security ........................................................................... 9
What is Information Security? .............................................................................................. 9
What can go wrong? ............................................................................................................. 9
How Can Information Systems be Made More Secure? ..................................................... 10
Business benefits of good information security .................................................................. 10
integrity of data and information systems ........................................................................... 11
Physical Access Controls ................................................................................................ 11
How Can Information Systems be Made More Secure? ..Error! Bookmark not defined.
controls over access to information systems ................................................................... 12
ICT - types of information system ...................................................................................... 13
ICT - What is it? ................................................................................................................... 13
Traditional Computer Based Technologies ........................................................................ 14
Traditional Computer Based Technologies ........................................................................ 15
Page 2 of 65
, Internal networks ................................................................................................................ 16
External networks ............................................................................................................... 16
ICT in a Broader Context .................................................................................................... 16
ICT - types of information system ...................................................................................... 17
ICT - Methods of data collection ........................................................................................ 20
ICT - Data and Information ................................................................................................ 24
Uses of Information in a Business ...................................................................................... 25
Summary ............................................................................................................................. 27
ICT - Sources of information .................................................................................................. 27
External Information ........................................................................................................... 28
information system security - risk analysis ........................................................................ 29
physical security in information systems ............................................................................ 30
Controlling Physical Access ............................................................................................... 31
information systems - controls over people ........................................................................ 32
methods of data storage ...................................................................................................... 32
Unit 2: Network Architecture ................................................................................................. 34
By the end of this topic, you should be able to: ...................................................................... 34
Describe three basic types of topologies, ................................................................................ 34
Page 3 of 65
, Describe the features of different network devices................................................................. 34
SIMPLE LAN TOPOLOGIES .......................................................................................... 34
Bus .................................................................................................................................. 35
Ring ................................................................................................................................. 35
Star .................................................................................................................................. 36
Switching ........................................................................................................................ 36
NETWORKING HARDWARE ......................................................................................... 37
Network Interface Cards ................................................................................................. 37
Hubs and Repeaters......................................................................................................... 38
Bridges ............................................................................................................................ 38
Switches .......................................................................................................................... 39
Routers ............................................................................................................................ 39
Bridges versus Routers ................................................................................................... 40
Why networking? ................................................................................................................ 41
Types of networks ............................................................................................................... 42
Point to point ................................................................................................................... 42
Local Area Network (LAN) ............................................................................................ 43
Metropolitan Area Network (MAN) ............................................................................... 45
Page 4 of 65
Welcome to Information Communication Technology. This course is a one-semester,
two-credit, undergraduate-level course for learners seeking a Diploma in Information
Technology. This book will help you master the topics for a period of one semester.
COURSE AIMS
Information Communication Technology is geared towards students who wish to acquire
a solid background in the concepts and applications of Information Communication in
organisations. In particular the course first of all exposes the learners to the prerequisite
knowledge of business Information, such as the nature of information in business
organisation, quality of information, strategic use of information, information security ,
etc. The development of Information Technology, Information System and the possible
methodologies to be used for management of information are also described in this
course.
COURSE OBJECTIVES
By the end of this course, you should be able to:
1. Describe the importance of information in business organisation, such as its purpose,
business functions etc;
2. Explain the concept of Information Communication Technology ;
3. Describe the strategic use of information technology;
4. Describe the nature of Information security.
5. Describe the concept and the development of information communication technology.
6. Understand different types of computer networks.
Page 1 of 65
,TABLE OF CONTENT
INTRODUCTION .................................................................................................................... 1
Unit 1: Information Systems ..................................................................................................... 7
ICT - What is good information? .......................................................................................... 7
Introduction to Information System Security ........................................................................... 9
What is Information Security? .............................................................................................. 9
What can go wrong? ............................................................................................................. 9
How Can Information Systems be Made More Secure? ..................................................... 10
Business benefits of good information security .................................................................. 10
integrity of data and information systems ........................................................................... 11
Physical Access Controls ................................................................................................ 11
How Can Information Systems be Made More Secure? ..Error! Bookmark not defined.
controls over access to information systems ................................................................... 12
ICT - types of information system ...................................................................................... 13
ICT - What is it? ................................................................................................................... 13
Traditional Computer Based Technologies ........................................................................ 14
Traditional Computer Based Technologies ........................................................................ 15
Page 2 of 65
, Internal networks ................................................................................................................ 16
External networks ............................................................................................................... 16
ICT in a Broader Context .................................................................................................... 16
ICT - types of information system ...................................................................................... 17
ICT - Methods of data collection ........................................................................................ 20
ICT - Data and Information ................................................................................................ 24
Uses of Information in a Business ...................................................................................... 25
Summary ............................................................................................................................. 27
ICT - Sources of information .................................................................................................. 27
External Information ........................................................................................................... 28
information system security - risk analysis ........................................................................ 29
physical security in information systems ............................................................................ 30
Controlling Physical Access ............................................................................................... 31
information systems - controls over people ........................................................................ 32
methods of data storage ...................................................................................................... 32
Unit 2: Network Architecture ................................................................................................. 34
By the end of this topic, you should be able to: ...................................................................... 34
Describe three basic types of topologies, ................................................................................ 34
Page 3 of 65
, Describe the features of different network devices................................................................. 34
SIMPLE LAN TOPOLOGIES .......................................................................................... 34
Bus .................................................................................................................................. 35
Ring ................................................................................................................................. 35
Star .................................................................................................................................. 36
Switching ........................................................................................................................ 36
NETWORKING HARDWARE ......................................................................................... 37
Network Interface Cards ................................................................................................. 37
Hubs and Repeaters......................................................................................................... 38
Bridges ............................................................................................................................ 38
Switches .......................................................................................................................... 39
Routers ............................................................................................................................ 39
Bridges versus Routers ................................................................................................... 40
Why networking? ................................................................................................................ 41
Types of networks ............................................................................................................... 42
Point to point ................................................................................................................... 42
Local Area Network (LAN) ............................................................................................ 43
Metropolitan Area Network (MAN) ............................................................................... 45
Page 4 of 65