MIS 4477
Network and Security Infrastructure
JAKE MESSINGER (jake@uh.edu)

INTRODUCTION TO COURSE (class 1)


HELPFUL LINKS:



Suggestions on how to use the notes:

Each class will have a link to my notes referencing external sources, as well as links to figures in the book and the textbook's PowerPoint presentations pertaining to each chapter. We will follow the notes in class. If I announce that class is optional on a specific day, or if you miss a particular class, read and study the notes for that day's class.

Read the notes before class. The notes may also contain announcements and changes. Check the syllabus (from my class page, not the UH Course Search page) before each class. Make sure you hit the "RELOAD" button in your browser to bring up the latest information. Some students find it helpful to print my notes out and bring them to class in order to ask questions. You should also bring your laptop and/or book to class. If the classroom has individual workstations, you may log in and follow along.



Why Study Computer Networks?

During the past 30 years computer networks have moved from being a specialized technical area to being commonplace in the corporation and the home.

Why are Networks so important?

Information systems have evolved from:

==> The network IS the system. Individual workstations or servers are nothing.

Why are we focusing so much on the Internet?

The Internet Explosion!!!!!!!!!!!!!!!!!

 

Why should business use the internet?

 

How will business get users to exclusively use their websites?

What issues do these incentives have?

What problems do corporations face with respect to IT Infrastructure?

What can we do about it?

The road from an entry level network administrator to the CIO goes through ever-broadening knowledge in the ability to implement the business AND the technical solution.

 

Why Study Security?

 

That should be pretty obvious. With the greater penetration and use of the Internet, especially into and out of global markets, security becomes a much greater issue:

 

MIS managers MUST take into consideration Network Security at every level of design, testing, implementation and update of a system.

End of Lecture 1


© 2014 Jake Messinger (all rights reserved)
Dept of Decision and Information Sciences (MIS)
Bauer College of Business
University Of Houston