Pofessional Practice Notes
Pofessional Practice Notes
Pofessional Practice Notes
• Computer crime:
is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses
or steals a company's or individual's private information.
In some cases, this person or group of individuals may be
malicious and destroy or otherwise corrupt the computer
or data files.
• Types of Attacks
• Military and Intelligence attacks
• Business Attacks
• Financial Attacks
• Terrorist Attacks
• Grudge Attacks
• Fun Attacks
Prevention of Computer Crime:
There are many approaches to protect computer system
from attack.
Identifying Risks
Physical Security
Personal Security
Communication Security
Operations Security
Computing:
• Computing is any Problem-oriented activity requiring,
benefiting from, or creating algorithmic processes - e.g.
through computers.
• Thus, computing includes
• designing and building hardware and software
• processing, structuring, and managing various kinds
of information
• doing scientific studies using computers
• making computer systems behave intelligently
• creating and using communications and
• entertainment media
• finding and gathering information relevant to any
particular purpose, and so on.
• Five sub-disciplines of the computing field:
• Computer Science, Currently the most popular of the
computing disciplines; tends to be relatively broad and
with an emphasis on the underlying science aspects.
• Computer Engineering, Typically involves software
and hardware and the development of systems that
involve software, hardware, and communications
• Information Systems, Essentially, this is computing in
an organizational context, typically in businesses.
• Information Technology, Focuses on computing
infrastructure and needs of individual users; tends to
involve a study of systems (perhaps just software
systems, but perhaps also systems in support of learning,
of information dissemination, etc.).
• Software Engineering. Focuses on large-scale software
systems; employs certain ideas from the world of
engineering in building reliable software systems.
Sub-disciplines of computing
Computer Engineering:
• Computer engineering is a discipline that integrates
several fields of electrical engineering and computer
science required to develop computer hardware and
software.
• Computer engineers usually have training in electronic
engineering (or electrical engineering), software design,
and hardware-software integration instead of only
software engineering or electronic engineering.
• Computer engineers are involved in many hardware and
software aspects of computing, from the design of
individual microprocessors, personal computers,
and supercomputers, to circuit design.
• An important area within computing engineering is the
development of embedded systems. Devices such as cell
phones, digital audio players, digital video recorders,
alarm systems, x-ray machines, and laser surgical
tools all require integration of hardware and embedded
software, and are all the result of computer engineering.
• Computer engineering majors are offered by a fairly
large number of universities, almost always within
engineering. This major requires significant study of
mathematics.
Sub-disciplines of computing
Software Engineering (SE):
• Software engineering (SE) is the application of a
systematic, disciplined, measurable approach to the
design, development, operation, and maintenance
of software,
• Software engineering (SE) is concerned with developing
and maintaining software systems that behave reliably
and efficiently, are affordable to develop and maintain,
• and satisfy all the requirements that customers have
defined for them.
• It is important because of the impact of large, expensive
software systems and the role of software in safety-
critical applications.
• Students can find software engineering in two contexts:
computer science programs offering one or more
software engineering courses as elements of the CS
curriculum, and in separate software engineering
programs.
• Degree programs in computer science and in software
engineering tend to have many courses in common;
however, as of Spring 2006 there are few SE programs at
the bachelor’s level.
• Software engineering focuses on software development
and goes beyond programming to include such things as
eliciting customers’ requirements, and designing and
testing software.
• SE students learn how to assess customer needs and
develop usable software that meets those needs.
• Both computer science and software engineering
curricula typically require a foundation in programming
fundamentals and basic computer science theory.
Sub-disciplines of computing
Computer Science (CS):
• Computer science (CS) spans the range from theory
through programming to cutting-edge development of
computing solutions.
• A computer scientist specializes in the theory of
computation and the design of computational systems.
• Computer science offers a foundation that permits
graduates to adapt to new technologies and new ideas.
• The work of computer scientists falls into three
categories:
• a) designing and building software;
• b) developing effective ways to solve computing
problems, such as storing information in databases,
sending data over networks or providing new
approaches to security problems;
• and c) devising new and better ways of using computers
and addressing particular challenges in areas such as
robotics, computer vision, or digital forensics (although
these specializations are not available in all computer
science programs). Most computer science programs
require some mathematical background.
Sub-disciplines of computing
Information System (IS):
• "Information systems (IS) is concerned with the
information that computer systems can provide to
aid a company, non-profit or governmental
organization in defining and achieving its goals.
• It is also concerned with the processes that an
enterprise can implement and improve using
information technology.
• IS professionals must understand both technical
and organizational factors, and must be able to help
an organization determine how information and
technology-enabled business processes can provide
a foundation for superior organizational
performance.
• They serve as a bridge between the technical and
management communities within an organization.
• What information does the enterprise need? How is
that information generated? Is it delivered to the
people who need it? Is it presented to them in ways
that permit them to use it readily? Is the
organization structured to be able to use technology
effectively? Are the business processes of the
organization well designed? Do they use the
opportunities created by information technology
fully? Does the organization use the
communication and collaboration capabilities of
information technologies appropriately? Is the
organization capable of adapting quickly enough to
changing external circumstances?
• These are the important issues that businesses rely
on IS people to address.
• A majority of IS programs are located in business
schools; however, they may have different names
such as management information systems,
computer information systems, or business
information systems.
• All IS degrees combine business and computing
topics,
Sub-disciplines of computing
Information Technology (IT):
• Information technology (IT) is a label that has two
meanings. In common usage, the term “information
technology” is often
• used to refer to all of computing. As a name of an
undergraduate degree program, it refers to the
preparation of students to
• meet the computer technology needs of business,
government, healthcare, schools, and other kinds of
organizations.
• IT professionals possess the right combination of
knowledge and practical, hands-on expertise to take
care of both an
• organization’s information technology
infrastructure and the people who use it. They
assume responsibility for selecting
• hardware and software products appropriate for an
organization.
• hey integrate those products with organizational
needs
• and infrastructure, and install, customize and
maintain those applications, thereby providing a
secure and effective
• environment that supports the activities of the
organization’s computer users.
• in the IT discipline require special skills – in
• understanding, for example, how networked
systems are composed and structured, and what
their strengths and
• weaknesses are. There are important software
systems concerns such as reliability, security,
usability, and effectiveness and
• efficiency for their intended purpose; all of these
concerns are vital. These topics are difficult and
intellectually demanding.
Sub-disciplines of computing
System Administrator:
• Systems administrator, is a person employed to
maintain and operate a computer system and/or
network.
• The duties of a system administrator are wide-
ranging, and vary widely from one organization to
another.
• System administrators are usually charged with
installing, supporting and maintaining servers or
other computer systems, and planning for and
responding to service outages and other problems.
• Other duties may include scripting or
light programming, project management for
systems-related projects, supervising or training
computer operators, and being the consultant for
computer problems beyond the knowledge
of technical support staff.
INTRODUCTION TO PROFESSIONAL BODIES
AND SOCIETIES.
• Professional bodies are organization whose
members are individual professional
• Group of professionals, working towards the
progress of a specific professional domain and its
stakeholders.
• Such bodies look after the interest of practitioners,
keep an oversight of the activities, establish
cooperation and coordination between organization
, individuals and policy makers.
Why these bodies:
• What are they doing why should we study them.
1. Recognition : eligibility criteria and membership
process, events and awards.
2. Professional Development : lectures , courses,
workshop and conferences. Discounts and
exclusive Access.
3. Professional Networking :local Branches, like
minded people magazines and news items.
4. Leadership Developments : Host, executive
positions ,policy making
5. Trends and Opportunities: industry practices,
internships, jobs and careers developments and
conferences.
6. Funds and support: financial support for research
and projects,
Professionals bodies for It professionals in societies:
• Network Engineers proession :ACM(association
for computing Machinery 1947).
• ACM focuses more on hardware and
standardization issues than theoretical computer
science
• . Professional Bodies For IT Professionals)
• 5. Project Managers Profession : PMI (Project
Management Institute – 1969) The PMI provides
services including the development of standards,
research, education, publication, networking-
opportunities in local chapters, hosting conferences
and training seminars, and providing accreditation
in project management.
• Professional Bodies For IT Professionals 21PST
32220 - Current Topics In Computer Technology
(Lecturer : Mr. Rohana K Amarakoon) 5. Project
Managers Profession : PMI (Project Management
Institute – 1969) Membership Categories 1.
Certified Associate in Project Management
(CAPM) 2. Project Management Professional
(PMP) 3. Program Management Professional
(PgMP) 4. Portfolio Management Professional
(PfMP) 5. PMI Agile Certified Practitioner (PMI-
ACP)
• Professional Bodies For IT Professionals
• 6. Software Architects Profession : IASA (IASA-
International Association of Software Architects -
2002).
• Benefits Of Become A Member Of Professional
Body • Career development with Continuous
Professional Development Programs • Being
formally recognized as a professional in your field
• Information and advice for particular new
knowledge areas • Networking opportunities with
other professionals in same field • Conferences and
seminars to showcase your talents • Broaden your
knowledge with knowledge sharing sessions •
Gaining professional status often helps get a more
senior and higher paid job • Being able to promote
your field in society •
Drawbacks Of Become A Member Of Professional
Body:
• • Most professional organizations require the
payment of annual fees is very expensive
• • In addition to the applications and membership
fees, you'll also be spending money on association
breakfasts, lunches and dinners as well as
transportation costs or gas expenses • profession
includes people with a wide variety of political
alignments, religious beliefs and personal values.
Sometimes an association forgets that create
stressful situations • You normally need at least a
degree or an equivalent to qualify •
What is a professional ethics?
• A professional ethics is a set of principles designed
to help a business govern its decision-making and
distinguish right from wrong.
• Often referred to as an ethical code, these
principles outline the mission and values of an
organization, how the professionals within the
organization are supposed to approach problems
and the standards to which employees are held.
• In some industries, such as finance or public health,
specific laws dictate professional conduct. In other
industries, a code of ethics may be voluntarily
adopted.
Why is a code of ethics important?
• A professional code of ethics is designed to ensure
employees are behaving in a manner that is socially
acceptable and respectful of one another.
• .It also provides the groundwork for a preemptive
warning if employees break the code. A code of
ethics can be valuable not just internally as a
professional guide but also externally as a
statement of a company’s values and commitments.
Examples of a professional code of ethics
Lawyers
• Lawyers are bound to a professional code of ethics
that exists independently of their employment.
• For example, Rule 1.1 in the American Bar
Association Model Rules of professional
Conduct reads, “A lawyer shall provide competent
representation to a client. Competent representation
requires the legal knowledge, skill, thoroughness
and preparation reasonably necessary for the
representation.”
Physicians
• Like lawyers, physicians are held to a universal
code of conduct because of their chosen
profession.
• A physician should addresses everything from
patient care to relationships with other staff
members. For example:
• 1 A physician shall provide competent medical
care, with compassion and respect for human
dignity and rights.
Teachers
• Professional educators are typically held to a
universal code of ethics that is designed to protect
the rights of all students.
• The code of ethics can vary from school to school
or differ slightly in each state, but the basic
principles always remain the same: Teachers are
required to show impartiality, integrity and ethical
behavior in the classroom and in their conduct with
parents and colleagues.
•
Businesses:
• Businesses often establish a professional code of
ethics to help employees decide if certain behaviors
are acceptable. Some examples of this are:
• Confidentiality and privacy policies: Companies
may require employees to maintain confidentiality
when handling clients’ private information or when
dealing with the company’s own proprietary data.
• Obeying the law: Companies may specify
guidelines that require employees to abide by the
law. For example, they may discuss profiting from
—or enabling others to profit from—inside
information regarding a company’s financial
stability, performance or internal problems.
• Introduction of CPD (Continuing Professional
Development:
• Requires all professionals to take personal
responsibility for the process of updating their own
ability to understand the range of topics relevant to
their area of competence “ Continuing Professional
Development (CPD) is the systematic maintenance,
improvement and broadening of relevant
knowledge and skills, and the development of these
qualities necessary for the successful carrying out
of professional duties throughout a software
engineer or information technology professional's
career. In this it is aimed at enhancing individual
worth and thus corporate performance."
• Continuing Professional Development is an
ongoing necessity in the ever changing
technological world in which we live. The
practicing professional software engineers and
information technology professionals should aim to
remain competent throughout their working careers
so that they can properly carry out their various
duties. To this end software engineers and
information technology professionals need to take
opportunities to update their depth and breadth of
knowledge and expertise and to develop those
personal qualities required to fulfil their roles in
industry and in society.
• CPD covers matters of direct technical relevance as
well as broader studies also of importance to the
professionals in the furtherance of their careers
such as communication, environmental matters,
financial management, leadership skills, legal
aspects, marketing, occupational safety and health
and professional ethics.
Software Contracts:
• Contracts set out the agreement between the parties
• Contracts Provide Legal Securities to Project and
Parties, i.e. Customer or Software Developers.
• There are gaps in the agreement because the parties
have failed to contemplate a particular issue.
• There are almost never disputes over contracts
which run perfectly But, if things go wrong?? For
Example Marriage.
Structure of the Contract: The introductory Section:
• The first part of the contract is brief; it states that it
is an agreement
between the parties whose names and registered
addresses are given.
• It often begins with a set of definitions of terms
used in the course of the agreement.
• For example, the definitions section will tell us that
Company X Ltd, the software house, is to be
referred to throughout the contract as “The
Company”, and Company Y Ltd, which has
commissioned the work, is to be known throughout
as “ The Client” .
Computer Security:
• Computer security or Cyber security is the
protection of computer system from theft and
damage to its hardware, software and information.
Cyber security includes controlling physical access
to the hardware and software, as well as protecting
against harm that may come via network, data, and
code injection or by malpractice by operators of the
system. A system is considered to be secure if we
can depend upon it and it behaves as we expect.
• Internet Privacy
• Internet privacy, also known as online privacy is
the privacy and security level of personal data
published via the internet. It is a broad term that
refers to a verity of factors, techniques and
technologies used to protect sensitive and private
data, communication and preferences. Internet
privacy and anonymity is very important to users,
especially as ecommerce continues to grow.
Privacy violation and threat risks are standard
consideration for any website under development.
On the internet many users give away a lot of
information about themselves. Unencrypted emails
can read by the administration of the email server
• Computer Security:
• Computer security or Cyber security is the
protection of computer system from theft and
damage to its hardware, software and information.
Cyber security includes controlling physical access
to the hardware and software, as well as protecting
against harm that may come via network, data, and
code injection or by malpractice by operators of the
system. A system is considered to be secure if we
can depend upon it and it behaves as we expect.
Internet Privacy:
• Internet privacy, also known as online privacy is
the privacy and security level of personal data
published via the internet. It is a broad term that
refers to a verity of factors, techniques and
technologies used to protect sensitive and private
data, communication and preferences. Internet
privacy and anonymity is very important to users,
especially as ecommerce continues to grow.
Privacy violation and threat risks are standard
consideration for any website under development.
On the internet many users give away a lot of
information about themselves. Unencrypted emails
can read by the administration of the email server,
internet services providers and other parties can
reach the contents that sniffing the network traffic
if the connection in not secure.