0% found this document useful (0 votes)
85 views22 pages

Role of IT in Modern Society

The document discusses the role of information technology in India. It covers topics like the Indian IT Act, applications of IT, IT's role in government initiatives and development, and security issues. The IT Act provides a legal framework to promote e-commerce, secure information systems, and manage cyber crimes.

Uploaded by

Shariq Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views22 pages

Role of IT in Modern Society

The document discusses the role of information technology in India. It covers topics like the Indian IT Act, applications of IT, IT's role in government initiatives and development, and security issues. The IT Act provides a legal framework to promote e-commerce, secure information systems, and manage cyber crimes.

Uploaded by

Shariq Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

e daA wn

ket dan delemuo whar ovey oí die


und
At owly. doenuot brood ont Poket a
INFORMATION TECHNOLOGY
t sas hu ND SOIETY a

OBJECTIVES
This Chapter, We Will Learn:
In
*Concept of Informmation Technology
Indian IT Act

*Application of IT
I T ' s Contributionto Indian Development
Government Particular Initiatives

Security Issues in Information Technology


Securing Information System

*Securing Information System


Firewall: Securing computer network

14.1 INTRODUCTION
from an industrial toan
rapid
to advancement in technology, our society has changed
Due as any other physical
resource
Information society. In today's life, information is as important
such as machinery, money, labour, etc.
lives. We encounter computers in
Lomputers and other forms of technology impact our daily
SLOres, restaurants, banks, schools and colleges. Computers are majorly used as intormanon
too is using this technoOg
POCesSing tool which helps in decision-making. The government
etc. This chapter or
its various recent initiatives, such as Aadhar, E-Panchayats, couy
c i b e s the role of IT in these government led initiatives for the people ofthe

[14.1
14.2 Computer Applications
14.2 INFORMATION TECHNOLOGY

What is IT? T Devices

II stands for Information Technology. It refers to application


Bluetooth
store,
Computers and telecommunication equipment to
networking,
rerieve, transmit and manipulate data such as
work witn
hardware, software the Internet, or the people that
these technologies.

14.2.1 Recent Advancements : Cloud Computing

The Cloud Computing is a comprehensive solution that


is
delivers IT as a service. It is like the way electricity
distributed on the electrical grid, on the same way computing
Cloud
solutions are provided "on demand" with the use of Internet. computing
The computers in the cloud are configured to work together
and various applications use collective computing power
as if they are running on a single system. Cloud computing
reduces operating cost because resources are acquired only
when needed and only paid when used.
The cloud computing refers to application and services offered from data centers over the
Internet.

14.2.2 Next Generation

By 2020 China will be the second-largest IT Market in the world, afier the United
States. By 2043 it will still be number 2, but India will be number 3. There will be a
single global currency, and there will have long been a single, global grid-based
computing structure -Piyush Singh, IDC AsiaPacific
"Forty years from now. people will not carry money or identification. Biometric devices will
be used to identify them and enable them to select means of payment in stores, board
airplanes, identify themselves to police (such as in traffic stops), enter countries (instead
of passport), enter entertainment events or movies (instead of ticket) and so on.
Transactional devices such as anonymous currency transfer authorization would be
used by stores, ticket takers and vendors of various kinds. The seller will not need to
know the identity of the buyer to validate the transaction. - Carl Olofson

In the next 40 years, check and cash will be eliminated from


transaction payments,
with wireless payments the dominant
payment methodology. Interactions between
customers and financial institutions will be 95% or more
through digital media, with face-to
face interaction rare. Access to information and business
processes will be via DNA
identification." - Bill Bradway, IDC Financial Insights
Information Technology & Society 14.3

14.3 WHAT IS INDIAN IT ACT?


and information system includes
The impact of cyber crimes on c-commerce operations
as well as defamation all of which can lead
loss, failure, disruption and theft ofinformation
-

it is difficult to identify the culprit,


to legal action. But due to "Wild West" nature of Internet, ficld is wide open for hackers.
can be accessed from any part of the world. Thus,
as the net
devise new ways for perpetuating crimes. Therefore,
Human mind is ingenious enough to
needs to be channelized by developing effective legal and regulatory
human ingenuity
crimes.
mechanism to control and prevent cyber
secure information
The legal infrastructure is,
thus, necessary to promote e-commerce and
framework for managing such crimes consists of the legislation
at
Svstem. The regulatory mutual cooperation between
intenational conventions; and understanding for
the national level,
is responsible for enforcement of system laws.
countries and the administrative machinery
Act 2008 can be summarized as follows:
The objectives of IT
data
for transactions carried out by means of electronic
)To grant legal recognition based method of communication.
or electronic commerce in place of paper
interchange
for authentication of any information or

(i) To give legal recognition to digital signature


authentication under any law.
matter which requires
de- partments.
(ii) To facilitate electronic filing of documents with Government
data.
(iv) To facilitate electronic storage of

To provide legal sanction to transfer fund electronically to and between banks and
(v)
financial institutions.

books of account in electronic format by


(vi) To provide legal recognition for keeping
bankers.
Indian Evidence Act, 1972, Bankers Book
(vii) In order to amend the Indian Penal Code,
Evidence Act, 1891 and RBI Act, 1934.
e-commerce and secure information system.
(viii) To provide legal infrastructure to promote
levels by enforcing laws.
(ix) To manage crimes at national and international

VARIOUS FIELDS
14.4 ROLE OF INFORMATION TECHNOLOGY IN

We see the use of IT in almost every domain, few of them are listed below:

14.4.1 Computers in Business


it used to be.
he way business is conducted now a days is completely different than what
ne collection of technologies, processes and business strategies allows the instant exchange
14.4 Computer Applications
of information/transaction within and between organizations. Because of compuier and
transfer, exchange of information
S ansaction like buying, sclling, clectronic fundE-commerce is characterized by a
STVICes ctc. can be done around the world at any time.
wide range of business
operations and
transactions,including Work
Place
Establishment of business-to-husincss Business SEducation <
relationship;
Electronic payment (using electronic While Medicine
fund transfer, credit cards, electronic ongo
cheques, electronic cash);
Communication.
Agriculture
Electronic distribution of product and
services;
Exchange of information;
Pre-and post-sales support;
Customer Relationship Management (CRM), Supply Chain Management (SCM); and
Virtual enterprises-groups ofindependent companies that pool their competencies so
that they can offer products or services that would be
of the individual
beyond the capabilities of any
companies.
14.4.2 Computers in Communication
Computer and Internet technologies have evolved many
ways of sharing information.
Teleconferencing, data
conferencing, audio conferencing, video
electronic mail, voice mail and fax are all conferencing,
office automation tools. This is
part of powerful
very effective of
communication especially when the users are way
located in
geographically spread locations and wants to work on
the same data at the
same time, for
example, students
working on the same project. Use of network
like Skype, Google talk, etc. technologies
allow users to communicate
effectively over geographic boundaries in a cost
manner. The another mode of communication effective
are mobile
P-telephony, which uses the concept of VOIP- phones, email, chatting, webcast.
allows the users to have Voice Over
telephonic communication over the Internet Protocol. The VOIP
cost-effective, economical way of Internet networks. It is the most
telephone networks. communication
for long distances. It has bypass
traditional
Information Technology & Society 14.5

144.3 Computer in Healthcare

Storage of Patient Data and Health Information:


Hospitals employ computer systems to maintain patient
medical history, a patient's family history, already
diagnoseddiseases and prescribed medicines and also
can keep track of prescriptions and billing information.
Computers in Surgical Procedures: Computer software is used for diagnosis of
diseases. Advanced computer-based systems are used to examine organs of the
body. Computer-assisted Surgery (CAS) is a fast-advancing field in medicine, which
bines medical expertise with computer intelligence to give faster and more
accurate results in_surgical procedures
Use of Computer Technology in Diagnostic Tests: Many of the modern methods
of scanning and imaging are largely based on computer technology. Magnetic
Resonance Imaging (MRI) employs computer software. Computed tomography
makes use of digital geometry processing techniques toobtain 3-D_images
Sophisticated computers and infrared cameras are used for obtaining high-resolution
images. The functioning of hospital-bed beeping systems, emergency alarm systems,
X-ray machines and several such medical appliances is based on computer logic.
Communication between Medical Practitioners and Patients, Knowledge
Sharing between Doctors : Medical professionals sitting on opposite sides of the
globe can communicate and provide online consultation within minutes with the help
of the Internet. Medical practitioners can discuss medical issues in medical forums,
they can blog, write articles, contribute to medical journals available online. Updates
in the medical field, advancements in medicine, information about new methods of
treatment, exchange of images, etc.

14.4.4 Computers in Agriculture


In the context of agriculture, the potential of Information Technology (IT) can be assessed
broadly under two head
(a) as a tool for direct contribution to agricultural productivity and

as an indirect tool for empowering farmers to take informed and quality decisions
which will have positive impact on the way agriculture activities are conducted.

XSve LseofIT in precision farming is popular in developed countries to improve agriculture


productivity. The techniques of remote sensing using satellite technologies, geographica
i o n systems, agronomy and soil sciences are used to increases the agricultural
s approach is useful where large tracts of land are involved. The indirect benefits
Cpowering Indian farmer are significant and remains to be exploited. The Indian
Computer Applications
14.6
inputs for taking decisions. At
of information slow and
uires timely and reliable sources
source which
are

on information
from conventional not
the farmer depends information merely
t, farmers makes
changingenvironmentfaced by
Indian
Ihe
useful, but necessary to remain competitive.

J4.4.5 Computers in the Home


over the last few
Home computing has increased tremendously
and Internet access have become less
years as computers

expensive.
information, exchange
Use ofthe Internet at home to look up
download music and movies,
e-manl (electronic, messages), shop,
research products, pay bills and manage bank
accounts, check
etc. has
news and weather, store and organize digital photos, play
games, plan vacations,

grown exponentially.
Home computing for work purpose is also increasing rapidly.
Checking office e-mail from
home or otherwise working at home in the evening is normal for many jobs. Working entirely
from home, such as telecommuting for a company or working from home as a consultant or
other self-employed individual, is acceptable today because of fast Internet access and the
wISe use of e-mail, telephone calls, teleconferencing and videoconferencing for business
communications.
Wireless networking connections have added dimension to the home computing, allowing the
use of computers at home. For instance e-mail can be answered from the living room,
recipes can be looked up in the kitchen, games can be played while relaxing in the backyard.
Use ofcomputing technologies have also evolved smart possible to have smart appliance
traditional appliances with some type of built-in computer or communications technology.
For instance, the smart oven both refrigerates and cooks and can be controlled by the user
via a mobilephone or the Internet.
Smart homes-in which household task such as
washing machines, turning the air conditioning
on or off, making coffee, monitoring the security of the home and grounds and managing
internet access and home entertainment devices are controlled
by a main computer in the
home are also in the coming time will be closer to reality.
14.4.6 Computers in Education

Today's youths may definitely be called the computing


brought up with computing technology. From videogenerationto many them have
been
as of
Colleges and homes, most students these days have been games to computers at schools
exposed computers and related
technologies all their lives. Now-a-days virtually all schools and colleges have some sort ot
computing facility available for student usec.
Information Technology & Society 14.7

With the increased availability of computers and Internet


access, the emphasis on computer use in K- 12 schools
has
evolved to use computers as an overall student-based
learning tool. Today, students use multimedia programs to
such as word
enhance learing; productivity software
for creating
processors and presentation sofiware-
and the Internet for
papers and electronic presentations;
[Link] alsOusecomputers in researching topics,
and submitting daily attendance reports, etc.
At colleges and universities, computers are commonly found in classrooms, computer labs
and libraries. Various college campuses have wireless hotspot
oncampus that allow students
to use their PCs to connect wirelessly to the college network and the Internet from anywhere
on campus. College
students today are typically expected to use the Internet for research, as
well as to use computers to prepare papers and classroom presentations and to access
online course materials and other library resources. In fact, some institutions have started to
use computer during admission process.

Most college teachers use computers to prepare handouts


aaoeiaueaned
Marip3 Uwesty
and exams, to prepare and deliver classroom presentation
and lecture. Many colleges universities (IIMS) also offer
distance learning a common alternative to traditional
classroom learning that allows students to participate from
home via their computers and Internet connections. Distance
learning students can do coursework and participate in class
discussions from home, work or wherever they happen to be
Figure:Distance
at that moment.
Learning
13.4.7 Computers in the Workplace

Although computers have been used in the workplace for


years, their role is continually evolving. Originally computers
were used as a research tool and then as a productivity tool
for office workers, the computer is being used today by all
types of employees.
In all types of businesses, computer technology is used not
only by CEO of a multinational corporation but also by a
clerk at the grocery store, by sales professional, by the police officer on patrol, by doctors
and nurses at the local hospital etc. In essence, the computer has become a universal tool for

on-the-job decision-making, productivity and communications.


omputers are also used extensively by military personnel for communications and navigational
Computer Applications
14.8
terrorists and other
identity
as well as to control missiles and other weapons,
poses,
potential enemies, and perform other necessary tasA
A4.8 Computers in Inventory Control
how much stock a
control, is used to show
OCk Control, otherwise known as inventory
track of it
has at any one time, and how to keep
COmpany service, from raw materials to
produce a product
or
used to
t applies to every item that is at of the production process,
from purchase and
goods. It covers stock every stage
shed
delivery to using and re-ordering the stock.
stockk in the right
the right amount of
Etficient stock control allows the personnel to have
unnecessarily, and protects
that capital is not tied up
place at the right time. It e n s u r e s
chain. Therefore, the primary objective
of
production if problems arise with the supply Minimize costs:
customer service (2)
computerization is in twofold: (1) Maximize
but are more
similar principles to manual ones,
Computerized stock control systems run on stock valuation or find out
can quickly get a
flexible and information is easier to retrieve. We
how well a particular item of stock is moving. A computerised
system is a good option for
useful features include:
businesses with many different types of stock. Other
dealing
All the
Stock and pricing dataintegrating with accounting and invoicing systems.
same set of data, so we only have to input
the data once. Sales
systems draw on the
Order Processing and Purchase Order Processing can be integrated in the system
so that stock balances and statistics are automatically updated as orders are processed.

tomatic stock monitoring, triggering orders when the re-order level is reached.

Automatic batch control ifgoods are produced in batches.


Identifying the cheapest and fastest suppliers.
Bar coding systems which speed up processing and recording. The software will print
and read bar codes from the computer.
Radio Frequency Identification (RFD) which enables individual products or
ponents to be tracked throughout the supply chain.

14.4.9 Computers in Finance

Computers have revolutionized the financial industry and the way finance works by automating
complex calculations and providing instant communication and news. Computer technology
has made an impact on our ability to make financial decisions. As
we know information
technology focuses on the development of electronic networks that exchange
Because all financial transactions involve the information.
exchange of information, the increasing popularity
of online finance coincided with advances in information
technology. According to Professor
Information Technology & Society 14.9
Jane K. Winn of the University of Washington School of Law, "Financial institutions were at
the forefront in creating the global information economy as it exists today." Finance today
relies on information technology. Information technology allows finance to function on a
the first organized, global information
global level. Financial markets can be thought of as
markets operating through networked computers.
Nowadays, the use of computers when dealing with money is no longer restricted to big
business. Many people use computers to do online banking, investing and shopping from
their own homes.

14.4.10 Computers on the Go

at home, at schools and


In addition to using computers
colleges and at workplace, we encounter [Link]
life-from depositing or withdrawing
aspects of day-to-day
money at an ATM machine, to using an ID card to gain
access to certain places by using a smart card or using
while
portable Global Positioning System (GPS) for navigation
use and well integrated into our society, for
travelling. Computers are becoming easier to
stations providing information
example, electronic kiosk -a small self-service computer-based touched with the finger to
other services to the public-usually include a screen
that is
or
select an options and request information. Kiosks are commonly placed in hotels,conference
centres, airport, railway station and other publiclocations to allow consumer to look up
common for individual to
information or purchase product. lt is also becoming increasingly
handheld computers or similarly [Link] to remain
carry Web enabled cell phones,
direction, airline
[Link] touch with others and obtain stock quotes (NSE, BSE) driving
flight updates, movie timings, etc.
14.5 IT's CONTRIBUTION TO INDIA'S DEVELOPMENT

(a) Easy and Cost Effective Telecommunication


Our society today revolves around the internet and BSNL vodafone
it is going mobile. Mobile devices are notjust limited
to voice capabilities but have expanded to games,
entertainment, media read news, stream video, take AIRCEL at&t
picture etc. The power of mobility and the way
people communicate have changed their lives. The MTNL spice
various service providers for communication are TotalTelecom Sevice Provider

given in the fig.


14.10 Computer Applications
(6) Speedy and transparent inmplementation of Government's directive and

policies

India Pos Passport


Seva
Speed Post Tracking Service Exce 1lence

-governance is the application of Information and Communication Technologies (ICT)


and efficiency oof
by the government agencies. Its use enhances the effectiveness
common services offered
government and alter its relationship with the public. Most
e-courts etc..
by government are, India Post, Passport Seva, MCD Online, e-returns,
(c) Improving transport communication
Information technoilogy (IT) has transformed many industries, from education to health
care to government, and is now in the early stages of transforming transportation
system. Improving a country's transportation system solely means building new roads
or repairing aging infrastructure. The future of transportation lies not only in concrete
and steel, but also increasingly use of IT. IT enabled elements whitin the transportation
system- vehicles, roads, traffic lights, message signs, etc., to become intelligent by
embedding them with microchips and sensor and empowering them also to communicate
with each other through wireless technologies. In the leading nations in the world, IT
has brought significant improvement in transportation system performance, including
reduced congestion and increased safety and traveler convenience. By combining
GPS with real-time traffic information, could audibly alert commuters that we are
approaching a blind curve with traffic backed up ahead and that we need to apply
brakes immediately. A mobile device can display real-time traffic information,
optimize
our route accordingly, and we can
electronically pay tolls when we are on the highway.
(d) The Development of Banking Sector in India

Information technology and liberal policy has attracted many foreign banks to India.
In the development of Indian economy,
banking sector plays a very important role.
With the use of technology, there has been an increase in new
markets, new products
and efficient delivery channel has not only increased the cost
effectiveness but also
has helped in making small value transactions viable. It also
enhances choices, creates
new markets and improves
productivity and efficiency. It has been noticed that financial
markets have turned into a buyer markets in India.

Commercial Banks in India are now becoming a one-stop for all kinds
of
Because oftechnology, the branches are running on the concept 24 x transactions.
7 working.
Information Technology & Society 14.11
ade possible by the use of Tele banking. ATMs, Internet banking, Mobile banking
and E-banking. These technology driven delivery channels are being used to reach out
to maximum number of customers at lower cost and in most efficient manner. These
banking innovations puts both banker and customer in a win-win situation. Effective
use oftechnology has a multiplier effect growth and development.
in Agriculture in India
(e) Role of IT
Regional e-governance tools like SUGAM or Integrated Community Service Centres
ICS) and Agriculture Resource Information Systems and networking (AGRISNET)
are particularly concemed with rural agriculture. SUGAM provides all important
services including agriculture commodity price at the doorstep of rural community

by bringing all citizen related services and information under a single roof. While
ARISNET Project brings farmers, researchers, scientists and administrators together
animal husbandry, horticulture and
by establishing online information for agriculture,
fisheries departments. The citizens can put their queries online along with the scanned

photographs (if any) on the web and get the advice from the experts of concerned
departments.

PARTICULARS-IT INITIATIVES
14.6 GOVERNMENT'S

Government IT Initiatives

National Knowledge
Aadhar E-Panchayat Networks

14.6.1 Aadhaar
citizen and prevention
'AADHAAR' means 'support' or foundation' : A unique identity to every
of duplication of data.

Salient features of Aadhaar


distributed by the Unique
ldentification Authority
"The Aadhaar UID card produced and world.
identification program in the
of India (UIDAI) is the largest personal
card.
Over 1.2 billion people are eligible to receive the Aadhaar
must be a
Aadhaar card is that each person
The only requirement be eligible for an
to
permanent resident of India.
of
Aadhaar is a twelve digit exclusive number
that the Unique ldentification Authority
Indian citizen.
India (UIDA) will provide for every
14.12 Computer Applications
the Central and State Govermments
ne number can be usedtoget social benefits from both
called Direct Benefit Transfer.
intends to offer an exclusive id to every India, and it is not a smart card.
adnar
Database of people's biometric and different records will be maintained by the authcrity.

and biometric
The 12 digit coupled to the essential demographics
numeral are

Knowledge-photograph,10 fingerprints, and iris of every person.


methods.
I t is
effortlessly confirmable through online, cost-efficient
The arbitrary number produced will be devoid of any categorization decpending on
cast, faith, religion and topography.
Purpose : The purpose of the UIDAI is to
issue a unique identification number (UID) to 3393 6427 3427
all India residents. Being unique it eliminates
duplicates. Also, it can be verified and ***

authenticated in an easy, cost effective way.


The Aadhaar Card can also be used as an
identification for opening bank accounts or for Yogesh Kumar
srH d 7 Year ot Birth: 1986
availing government services: TT/Male
T o ensure that the advantage of the
government schemes and program would 33936427 3427 |ll N
reach to the genuine beneficiaries.

To reducing bogus ration cards and other


documents and leave no space for ambiguity.
To beneficiaries
ensure that the benefit directly without the help of any
receive
mediators. The government will also get financial savings by
reachingbenefits to only
appropriate people of the welfare schemes.
To provide mobile connection to Aadhar card holders by telephone companies after
verifying their details online on real time basis.
To facilitate
people to recieve benefits of several Government and non- government
schemes which require age verification.
Using this is no invasion of Privacy. The personal details would be visible
card holder. only to the
Content of the Card : The
UIDAI will only collect basic information of the
Name, Date of birth, Gender, Father/Husband's name, resident-
Mother's/Wife's
Finger Prints, iris scan and photograph. Thus, card contains all the above name, Address,
with UID number. information along
Information Technology & Society 14.13
Aadhaar Enabled Services
The aadhaar enable service include
E-KYC (Know Your Customer): Which would enable individuals to authorize
service prOviders to receive electronic copy of their identity and address. E-KYC
service can also be deployed by different agencies to verify a resident's identity and
address with the help of a digital platform.
OTP (One Time Pin): The OTP service enables Aadhaar based authentication of
all resident using their telephone anytime, anywhere on a self-service mode without
having to use biometric authentication device.

Authentication and iris authentication: This service will enable residents to


authenticate identity for availing Aadhaar-enable services by providing a combination
of Aadhaar number and iris image.
Under the OTP and Iris authentication, the authority's digital platform would not share the
demographic details and respond in yes or no to authenticate the identity of the resident.

14.6.2 e-Panchayat Project

e-Panchayat means empowering and connecting with common man. e- Panchayat is a functional
and interactive digital working station designed and created for each and every Panchayat in
India by the use of technology and Internet.

The majority of India's population lives in the


DP ayal
villages. The Panchayat refers to village level
governance units also known as Panchayat
Raj Institutions (PRIs). It presents the face
of the governance from the Government for
these villagers. To improve the quality of
governance of these (PRIs) including 0.235
million Gram Panchayat, 6094 Block
Panchayats and 633 Zila Panchayats, the
Ministry of Panchayati Raj (MoPR),
nre archaya
Govermment of India (GOI) has initiated the AAinictne at Danrhavari Dai

e-governance scheme known as e-Panchyats.


e-Panchayat fits well into the information systems at gram panchayat level. The rural eitizens
are to be benefited
by e-Panchayat.
The objective of e-Panchayat is to facilitate and improve Panchayat functioning on day-to-
day basis, through two way flow of information and content. The goal is to realize various
aevelopment objectives at grassroots level using digital technology. E-Panchayat programme
14.14 Computer Applications

ational initiative of Digital Empowerment Foundation and


National Internet Exchange of
the village councilors
p t of lT, Govt. of India). Information empowerment of
outcomes of the e panchayat
Supanchas and creating web based identity are the key
project.
channel for the
potential of Institute (PRIs) asthe preferred delivery
ne Panchayat Raj has not been fully realised
of State and Centre well as for citizen services
SChemes as
and financial resources,
technical capabilities and

p r o b l e m s of inadequate physical the rural people. As


a result, while some
extremely limited access to computers by is not a significant
computerization efforts for PRIs have been
made by NIC over the years,
decided to take
Government of India
measure. Therefore the Ministry of Panchayati Raj,
mission mode basis.
up the computerization of PRIs on a
Mission Mode
has undertaken e-Panchayat
The Ministry of Panchayati Raj (MoPR)
to introduce and strengthen e-Governance in
Project(e-Panchayat MMP) with a view formulated MMP
the country. The Government
Panchayati Raj Institutions (PRIs) across more efficient
which will make this functioning
project for e-enablement of all the Panchayats
and transparent.
are
The Services offered by e-Panchayat [Link]
Codes to Panchayats. It include public
National Panchayat Directory : Unique
Transit
infrastructure and amenities, places, Neighbouringlocal bodies details, family register.
Area Profiler Socio : Demographic profile of Panchayats.
Asset Directory : Online Record of Assets of All Panchayats.
Plan Plus : Preparation of Panchayat Plans leading to preparation of Integrated
District Plan.

PRIA Soft: Panchayat Accounting.


Action Soft: Online SchemeImplementation and monitoring
Grievance Redressal Mechanism
Social Audit

Trainings Demand Management


National Panchayat Portal: GIS - integration of maps with other Panchayat

applications Website for every Panchayat


Service Plus and State specific applications: Common and generic citizen centric
services
With e-Panchayat, India's traditional rural governance system Panchayat Raj will be more
transparent.
Information Technology & Society 14.15
14.6.3 National Knowledge Network

National Knowledged Network refers to nodal agency for building up IT infrastructure.


National Knowledge Network (NKN) project is aimed at establishing a strong and robust
internal Indian network with a high speed data communication network which is capable of
providing secure and reliable connectivity, bring together all the stakeholders from sciences,
technology, higher education, healthcare, agriculture and governance to a common platform

National Knowledge Network (NKN) is


a revolutionary step
towards creating a KI National KnowledgelNétwork
knowledge society without boundaries.
The Government's decision to set up

National Knowledge Network was


announced in the Budget Speech, 2008- ABRN AAN

09. The National Knowledge Network


(NKN) is a state-of-the art multi gigabit wws

network for providing high speed Conneed ksessey

network backbone for all knowledge


related institutions in the country.

NKN network is desigmed with the aim


ofproviding:
Establishing a high-speed backbone connectivity which will enable knowledge and
information sharing.
Enabling collaborative research, development and innovation from different educational
networks like CERN, GARUDA GLORAD.

.Facilitating advanced distance education in specialized fields such as engineering


science, medicine etc.

Facilitating an ultra-highspeed backbone for e-governance infrastructure use such as


data entry at national and state levels.
Facilitating integration of different sectorial networks in the field of research, education
health, commerce and governance.
Evolving knowledge society and spur economic activities in the knowledge domain.
Effective distance education in a country-wide virtual classroom where teachers and
students can interact in real time.
Facilitating virtual library to enable sharing of journals, books and research papers
across different institutions.
Computer Applications
14.16
NKN provides the above services along with technological serving such as internet,
System, Web Hosting,
Views,
management e-mail, Domain name
CL Network also Share storage,
e-
Voice over IP Video portals, MS Gateway, Video Streaming
Session lnitiation
Authentication Service,
List Software Application (LISTERSV),
mail
Protocol (SIP) Collaboration Service, Content Delivery Service
Virtual
Service [VPN@L2]
Services such as Virtual Private Network Stitching
Special VPN@L3] etc.
Private Wire Service/Virtual LAN Service),
1500 Institutions/
connected 1001 institutions and
aims to connect over
NKN has already
throughout the country.
Organisation. Laboratories under various categories

Following is the list institutions currently connected


of few
Name of the Institutions
.No

A.N. Sinha Institute of Social Studies, Patna


1.
2. Academy of Maritime Education and Training, Chennai

3. Acharya N.G Ranga Agricultural University, Hyderabad


Advance Materials and Processes Research Institute, Bhopal
Advanced Centre for Treatment, Research and Education
in Cancer, Mumbai.
5.
b. Advanced Numerical Research and Analysis Group, Hyderabad
Aerial delivery Research and Development Establishment (ADRDE), Agra Cantt 282001

8. Aeronautical Development Establishment, Bangalore


9. Agartala Govemment Medical College, Tripura
10. Agharkar Research Institute, Pune

11. Aliah University Kolkata

12. Aligarh Muslim University, Aligarh

13. All India Institute of Hygiene and Public health, Kolkata

14. All India Institute of Medical Sciences, Delhi

15. All India Institute of Physical Medicine and Rehabilitation, Mumbai

NKN approved in March 2010 by the Cabinet with an outlay of Rs. 5990 Crores. The
was

seamless integration provided by the high capacity NKN


digital connectivity will help the
academic and research community to establish
countrywide classrooms
streaming, video and voice conferencing, grid computing, digital libraries and multicasting
collaboration
portals. A professor from any premier institution may not have the time to visit a rural
to deliver a guest lecture. Also not college
every institution may have the financial resources to
arrange for guest faculty visits from premier research
NKN, any expert professor can reach out to the desired organisations. Thus, with the use of
audiance.
Information Technology & Society
14.17
14.7 SECURITY ISSUES IN INFORMATION TECHNOLOGY

A System may get non-functional or slow down due to malicious software, malware refers
to software designed specifically to damage or disrupt a system, such as a virus or a
Trojan
horse
1. Virus: A computer virus is a program which is man-made and destructive in nature
that spread from one computer to another, leaving infections as it travels, for
example:
"1 Love you" and "Melissa". Virus programs have following characteristics:
.Viruses can also replicate themselves. It is relatively easy to produce.
Almost all viruses are attached to an executable file.
.Virus is capable of transmitting itself across networks and bypassing securty systems
I t can spread by sharing infecting files or sending emails with viruses as attachments
in the email.

Virus programs usually attach themselves to .EXE/,OVL program file, boot sector
of a disc, etc.
Computer virus can range in severity:
o Some may cause only slow down the functioning while others can damage
hardware, software or files.
o It can quickly use all available memory and bring thesystem to a halt._
2. Worm: It is similar to a virus by design and is considered to be a sub-class of a virus.
Worms spread from computer to computer, but unlike a virus, it has the capability to
travel without any human action. A worm is its capability to replicate itself and sends
itself. For example, a worm may send a copy of itself to
everyone listed in e-matt
address book. Due to the copying nature of a worm and its capability to travel across
networks the end result in most cases is that the worm consumes too
much system.
memory. But since worms are stand-alone programs, they can be detected easily in
comparision to virus and Torjan horse.
3. Trojan horse: It is the destructive program based on the tricks of the
Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be
mythological
legitimate software or files from a legitimate source, When a Trojan is activated on
the computer, the results can vary such as:

Some Trojans are more annoying


than malicious like changing desktop, adding silly
active desktopicons
They can cause serious damage by deleting files and destroying information on the
system.
Computer Applica
computer
backdoor
on
create a

14.18 also
known to confidential
or personal
password. tis allowing
steal the possibly
rojans may access to system,
malicious
users
nor do
that gives
comnpromised.
other files
information to be
not
reproduce by infecting
worms,
Trojans do
and
email. Real
vinuses
Unlike

they self-replicate. mail o runsolicited n e w s g r o u p .


junk
to be electronic mailing list
or
considered
sent to a a lot
of
m o s t often s o m e product
Spam: It is also cats up
4.
email advertising
for u n w a n t e d e-mail, spam be done
little that c a n
spam is generally time with there is
people's
to wasting Internet is public, to prevent
In addition know i n s t i t u t e d policies
as w e
But have
bandwidth. services
network
some
online
However,
spam. subscribers.
to prevent their
from spamming
spammers

and their
Impacts
Other Computer
Crimes
both for
constructive and destructive
can be used includes the
following:
Frauds: Computers reasons

1. Computer for
destructive

u s e of
computers
[Link]
Theft of data
manipulating inputs)
iInappropriate
use of data (e.g.,
time
computer
Theft of mainframe
i
and/or software
T h e f t of equipment
from viruses and similar
attacks
(vDestruction transferring, or

in handling, entering, processing,


manipulation
(vi) Deliberate
Programming data
records
(vi) Theft of money by altering computer
resources
vii)Damage to computer
frauds are very serious. They may
adversely affect
The consequences of computer existence
even affect the very
the reputation and morale of the organization. They may
of computer frauds are:
of the organization. The consequences
as embezzlement due to fraud,
Financial Loss: Financial loss may be direct such
or indirect as expenditure incurred for repairing the damaged electronic equipment.

Legal Repercussions: It is very difficult to find the evidence of computer fraud.


Even if a hacker is identified, it becomes very difficult to provide an evidence
against him in the Court.

Loss of Reputation and Competitive Edge: Most of the computer frauds are
not reported as they adversely affect the reputation of the organization. If these
frauds come to the limelight, the creditability of the organization is shattered.
Information Technology & Societ 4.12
Blackmail/ lndustrial Espionage: The fraudster may blackmail the organization
as he may possess confidential information, even though it may be obtained by
unfair means.
Disclosure of Sensitive, Confidential, or Embarrassing Information: The
disclosure ofsensitive, confidential and embarrassing information will adversely
affect the reputation of the organization.
and technical.
The skillsrequired to exploit logical exposures are more complex
Generally the logical access violations are performed by:
Hackers Competitors
Internal employees Crackers

End users
Vendors and consultants

Former employees
software developers and
Copyright Violations: Copyright law is designed protect
to
2.
steal or copy proprietary code without
programmers. from those who would seek to
programmers as no different
permission. This is because the law views computer that is unlike
from artists or musicians who ereate an individual product
anything else
on the market.
Software piracy means unauthorized duplication, distribution or use of computer
license allows,or
software, for example, making more copies of software than the
onto multiple computers or a server.
installing software licensed for one computer
and is subject to civil and criminal
Copying software is an act of copyright infringement,
the copied software yourself, give it away, or
penalties. It is illegal whether you use
unauthorized access to software or to serial
sell it. And aiding piracy by providing
numbers used to register software can also be illegal

How to Label the Copyright Notice?


written, or
Any information owned or created by the organization which may be in a printed,
intellectual property must be labeled
stored as data form, and which is considered to be its
with a copyright notice in the following format:
Reserved.
CopyrightC2011 (company's name). All Rights
COUNTER MEASURES
14.8 SECURING NFORMATION SYSTEM:
data and our computer. Thus,
we have learnt some of the threats that can affect our privacy,
we need to floow certain steps explained
our system, data and privacy
order to secure

below
14.20 Computer Applications

Securing Information
System

Taking Password Use of Digital


Other Tools
Backup Encryption
Management Signature

(aBack up: The term backup usually refers to a copy of data may be on a disk or tape.
The backup is taken as a precaution on a second medium in case the first medium
fails. One of the cardinal rules in using computers is back up of files should be
Taken regularly. As we know due to computer crimes or the impact of malware, the
most reliable computer is apt to break down. Thus, it is advisable to make two, or even
three, backups of all files. To be especially safe from man-made or natural disaster,
one should keep one backup in a different location from the others.

We can back-up files using operating system commands, or we can buy a special-
purpose backup utility. Backup programs often compress the data so that backups
require fewer disks.
Password Management: The most common approach of authenticating a user's
identity is the use of user password. When the user identifies himself by user ID or
account name, he is asked for a password. If the user-supplied password matches the
password stored in the system, the system assumes that the user is legitimate. If the
user cannot provide the correct password, the operäting system should deny access.
The following practices would help in avoiding failure of this control:
After a specified number of unsuccessful attempts, the user is locked out from
the system.

Do not leave password out in the open. Do not write your password at any place.

Choose a password with at least six letters. Special characters and numbers
should be part of password.. Choose a password that is not an actual word in the
dictionary.
Do not choose a password that is obvious. Obvious passwords could be guessed
after few tries.
Users are forced to change password on first log-on and at periodic intervals.

One user ID should not be allowed to be logged -in for two different terminals at
the same time.

Passwords are communicated to the users in secured manner.


Information Technology & Society 14.21
is
s Encryption: Coding a message into a form that is-unreadable to an interceptor is
called encryption. The original message is called plaintextand thecoded message
of data into a
called ciphertext. Cryptography can be defined as the conversion
scrambled code that can be deciphered and sent across a public or private network.
data; symmetrical and
Cryptography uses two main styles or forms of cencrypting
asymmetrical.
When both the sender and receiver use the same key, it is called symmetrical
necessitates that the recipient should
cryptography or private key encryption. This
received. While sending the message,
have the key before the encrypted (cipher) text is
data encryption devices
the message is encoded by the sender with the help special
of
to the receiver through communication
with the key. When this message is transmitted
with the help of decryption devices which
channels, the receiver decodes the message
use the same key which has
been employed by the sender. Though this technique
ensures the secrecy of a message
when the sender and the recipient have to same
is impractical in day-to-day transactions on the
key beforehand, but this approach
Internet. An intruder may discover the key and intercept the message.

The asymmetrical cryptography orpublic key


encryption approach involves use
is private. A public key is distributed widely
of two keys: one is public and the other
is secret and knownonly to the recipient
and may be known to everyone; a private key
of the message. While sending a secure message
to the recipient, the sender uses the
The recipient then uses his own private
recipient's public key to encrypt the message.
mathematical relationship exists between the public
key to decrypt the message. A
that only the public key can be used
and private keys, they are related in such a way
to encrypt messages, and only
the corresponding private key can be used to decrypt
from the public key. This
them. It is virtually impossible to detect the private key
reduces the possibility of intruder interception.
is mathematical scheme for demonstrating
(d) Digital Signature: A digital signature
a

document. A valid digital signature gives a


the authenticity of a digital message or
was created by a known sender,
such
recipient reason to believe that the message
authentication and non-repudiation
that the sender cannot deny having sent the message
transit. Digital signatures are commonly
used
and that the message was not altered in
and in other cases where it is important
for software distribution, financial transactions,
to detect forgery or tampering
measures can be taken to prevent threats:
(e) Other Measures: The follwing
address may be
User can avoid spam by having two e-mail addresses. Primary
address for all other works
given to known and trustworthy people and secondary
and may recieve spam.
Files.
Keep deleting cookies and Internet Temporary
14.22 Computer Applications
windows are advertisemens.
because majority of Pop-up nts,
p p Blocker,
many of which may carry spywarc,
to computer
via t,
internet, windows
Use fire wall to rohibit unauthorize access be activated.
can
firewall which
n g system has basic built in
P
Use antivirus software.

NETWORK
. FIREWALL: SECURING COMPUTER

organisation's networkk against external


intended to protect an
ewal is a security system
threats coming from another networks, such as Internel.

is usually a combination of hardware and software, firewall


a prevents computers in
Firewall
ne organization network from communicating directly with computers internal to the network
firewall which examines all
and vice-versa. All communication takes place through the
incoming data before allowing it to enter the local network.

LAN

WAN

Firewall

Figure: Firewall
The basic functions of firewall are
T o provide security by examining incoming data packets and allow them to enter the
network only if conditions are net.
To provide user authentication by verifying username and password.
To hide the network details such as network architecture and contents from external
user.

It keeps track of source and destination address of data.

You might also like