Professional Documents
Culture Documents
Process Planning,
Security and Ethical
Challenges,
Improving business
Quality
CAPP(Computer Aided Process Planning)
Process Plan
As new age manufacturing processes are evolving,
Computer Aided Process Planning (CAPP) helps in
simplifying and efficiently carrying out the
conventional process planning and optimizing use of
resources.
Detailed set of instructions, engineering drawings,
specifications, parts and materials lists etc.
Process Planning
Basic Process in developing a
process plan
Process Planning
Approaches
Manual Systems
Computer Aids
Variant System
Experimental Generative System
Manually Prepared Process
Plans
Computer Aids
Variant (Retrieval) CAPP
Methodology
Security challenges
Computer crimes that exist in the
present society are:-
Hacking
Cyber Theft
Unauthorized use at work
Software Piracy
Piracy of intellectual property
Computer viruses and worms
Hacking
Hacking is the obsessive use of computers,
or the unauthorized access and use of
networked computer systems. Hackers
usually
Steal or damage data
Get unauthorized access to computer files
Monitor e-mails or web server access
May use remote services that allow one
computer to execute programs on another
Plant data that will cause system to
welcome intruders
Cyber Theft
Medical diagnosis
Crime control
Environmental monitoring
Urban planning
Computer based training
Distance learning
Security management of IT
Encryption Security codes
Firewalls Backup files
Denial of service Security monitors
attacks Biometric security
Computer failure
E-mail monitoring
controls
Virus defense Fault tolerant systems
Disaster recovery
System controls and
audits
Encryption
The concept of private key and public
key can be extended to
authentication protocols. There are
three types of authentication
protocols followed by organizations.
1. Password Authentication protocol
2. Challenge Handshake authentication
Protocol
3. Extensible Authentication Protocol
Firewall
Firewalls are used to restrict access to
one network from another network.
Different types of firewalls exist.
1. Packet Filtering
2. Stateful firewalls
3. Proxy Firewalls
4. Kernel Proxy firewalls
Ethical responsibility of Business
Professionals