Beruflich Dokumente
Kultur Dokumente
Intentional damage Computer viruses Hacking/cracking- The ability to access another information illegally and view personal or interesting information inside Tampering with files- Altering information without physically being at the computer and without others knowing Information theft Vandalism of hardware- The intentional damaging of hardware Theft of hardware Accidental damage User error Not being able to do a basic operation properly therefore, possibly losing important information Failure to follow file-management procedures People sometimes may not be able to find their files or are unable to open their files because they have: Written the long extension Not given a clear enough filename Saved in the wrong folder or drive Equipment failure/damage A piece of hardware may not work because of many reasons Fire Variation in electricity flow Smoke Water Breakage
Consequences of violating security and privacy measures Breach of privacy Loss of income Loss of intellectual property (thoughts, concepts)
Ethics
A certain way to behave which is morally acceptable Employee monitoring- Watching what the employees are really up to by seeing their computer activity secretly. Employees see this as a breach of their privacy and can sometimes slow their working capability Workplace responsibilities- The employer and employee have specific responsibilities to fulfill in the workplace An employer is expected to give employees a safe and suitable environment to work in and pay them Employees should give back in return by working or the interests of the organisation If they do not comply, the employer is within their right to sack the employee. Codes of conduct and computer use policies- How a person is meant to use the computers in an organisation or even at school
I.T Page 1
Security Measures
To protect data and information from being lost, organisations tend to have security measures.
Hardware
Biometrics (Fingerprint, voice, signature, hand recognition) Swipe cards Smart cards Power Protection (UPS, surge protector) Backup media USBs External hard drives Hard disk drives CD-ROMs/DVD-ROMs Online backups Memory cards
Software
secretly see the contents being sent across the network Desktop monitoring- Programs which allow employers to view what their employees are doing on the computer from the comfort of their own seat Log files- Keeps a record of actions employees do on the computer Keeps track of sites viewed, files accessed, edited, created etc. Closed-circuit television (CCTV) Telephones- Intercept phone calls made in the business to ensure the calls are business related.
I.T Page 2
I.T Page 3
U401
Monday, 14 September 2009 9:15 PM
On-Screen User Documentation Manuals (either electronic or hard copy) which give information and instructions
on how to use a certain product.
I.T Page 4
Restoration
Disaster Recovery strategies Every business should have a disaster recovery plan in the case of a disaster Emergency Plan: Specific steps/procedures to be taken in the case of an accident or natural disaster Backup plan: See Backups under the 'Backups and Restoration' heading Recovery Plan: Specific procedures taken to successfully recover data in the case of data loss Test Plan: Testing out, or simulating these plans to make sure they work in the case of a real disaster Evaluating the EFFECTIVENESS of data security measures Must evaluate the: Integrity of data Ease of retrieval Security Currency of files
Integrity of data If the data, after backups and possibly retrieval, is still useable Hasn't been corrupted Can test the integrity by the three elements: accuracy, timeliness and reliability Security Make sure the security is hacker proof Measure how much the security measures has decreased the amount of data loss and hardware theft Ease of retrieval How long it takes to retrieve all files File naming conventions should be easy to follow Writing an appropriate name (short, meaningful) Timestamp Appropriate extension if not provided
I.T Page 5
PERT Chart: A type of organisational chart for project management. Useful when the duration of a task is uncertain. Lag time: The amount of time before the next task has to be started before the task is delayed. Lead time: The amount of time leading up to a task
I.T Page 6
U302
Tuesday, 3 November 2009 2:51 PM
Databases
Stores information in fields on different tables Primary keys: a unique identifier which must have an entry Form: Allows users to input data through an input screen which is linked to its corresponding table Much easier to input data rather than in tables Query: Ask for specific results by filtering what you want to see Information is normally set out into a report (manipulated) to be read more easily Report: Formats the query data and allows the user to add statistics, headers and footers, colour schemes etc. This is the easiest and clearest way to read information that has been filtered and formatted Macros: Programs which automatically complete a set of tasks (e.g. print a report)
Autonumber: A number generated automatically through a sequence Text: characters alphanumeric Numeric: numbers ONLY Boolean: True/False, Yes/No Data: a variation of numeric fields Object: Any form of media Memo: unlimited text but not searchable
Relational databases: Databases that have tables with a connection between one or more other tables from a common field Types of relationships: One-to-one: When one record on one table is connected to only one record on another table. One-to-many: When one record on one table is connected to many records on another table Many-to-many: When a record on one table can be connected to many records on another table and vice versa.
By validation: Electronic validation: using software functions to check the accuracy, reasonability and suitability of the data Some forms of electronic validation are: Spell checking Range-checking Pre-defined lists (or drop down lists) Input masks (controls how data is entered specifically e.g phone numbers, post codes) Alignment (numbers and text) Databases allow validation rules to be created Similar to a formula Only obeys data to be entered if it meets the criteria
I.T Page 7
U301
Monday, 14 September 2009 9:59 PM
How data is turned into information DATA- raw unorganised facts Once inputted, maniupated into meaningful use, it is
INFORMATION
Data Suitability Reliability Accuracy Timeliness Freedom of bias Software Operating software Application software Utility software (anti-virus software etc) Hardware Input devices (keyboard, mouse, mics) Output devices (printers, projectors, speakers) System unit (CPU, RAM) Storage devices (hard drives, USBs, CD/DVDs) Communcation devices (NICs, modems) Personnel Procedures
These are the nine steps in order to make data into information Acquisiton: Acquiring data i.e. survey, interview, poll, recordings Input: Writing the data into an information system by keyboard, tape recorder, CD/DVD, mouse, scanner etc. Validation: Check the data to ensure there is no inaccuracies Manipulation: Present the data in the way the user wants to see (e.g. sorting the names of a club in alphabetical order Storage: Finding a suitable storage method to store the data for later use e.g. USB, hard drive, CDs, back-ups Retrieval: Needs to be retrieved from the storage for later use or to be transferred to the computer's main memory Output: Creating the information of either text, graphics, other media or a combination of those. This information can be outputted by printers, monitors, projectors Communication: This information is then presented or distributed to a specific audience via fax, email, mail, video conferencing Disposal: Once the information is old, the information is deleted from all the sources by either shredding
1. Analyse Define the information problem Investigate the problem Define the data required (output and input) Determine the software to be used 2. Design Plan the solution (Gantt Chart or PERT chart) Draw layout diagrams of the solutons Create formula lists or macro designs (depending on the type of solution) IPO chart/Flow chart Choosing fonts, alignment, colours, conventions Creating test data and tables Create criteria for evaluation (used in evaluation step) 3. Develop Create the solution on your desired software 4. Test Frequently test the solution to minimise errors Two types of testing (see Glossary M-Z) 5. Document Provide sufficient documentation for the intended user to use the solution Must be clear and easy to read and follow Can be either electronic or physical copies 6. Implement Make the solution ready to use for the intended customer 7. Evaluate View the criteria made in design phase to see if solution has met requirements Show how the solution has met requirements i.e. annotations
I.T Page 8
Prototype websites
I.T Page 9
Transmission Media
Can be carried in various ways Through cables Through wireless
Cables
Twisted-pair cable: when the cables are twisted in pairs and then twisted again as a group. Reason it is twisted because no interference occurs. Coaxial cable: a similar cable however uses insulation then copper, aluminum, tin or lead foil then another layer of insulation. Foil used to protect from signals from outside Fibre-optic: Uses light pulses through glass or plastic strands and can produce speeds 100Mbps.
Wireless
Radio waves Microwaves Satellite Infra-red
I.T Page 10
What is a network? Connects computers to share data, peripherals, information etc. Allows computers to communicate with each other and send messages, files, instructions etc. Types of networks Bus Network: All computers, printers and other peripherals run to a central cable also known as the backbone. Advantages: Least costly of the four types of networks Easy to add/remove a station No hubs used so less cable needed Disadvantages: Hard to extend cable as the whole network will be inoperative until the new cable is installed When there is a problem with the central cable, all devices are down Ring Network: Devices are connected in a ring and messages travel through each computer until it reaches the destination Advantages: No advantages Disadvantages: Difficult to set up as it needs to use as little cable as possible while having the ring formation Can cause lag time to receive a message as there will be network traffic Expensive with lengths of cable If one device is down, the whole network is down Star Network: All devices are connected directly to a hub Advantages: Easy to connect another device without interrupting network Can add extra cable without interrupting network Disadvantages: Hub sends message to all computers instead of the proper destination causing traffic, so lag time If hub is broken, network is down Expensive because longest amount of cabling is used in star networks. Tree Network: Number of star networks connected to a large bus network Advantages: Has the best of star and bus networks Use of fibre-optic cable for the backbone Disadvantages: Very costly and complicated to create
Network operating sotware: software that controls how specific devices can communicate with each other. Tasks that can be perfomed are: Controlling file access Managing print queues Authenticating access to network servers Maintaining a log of network usage and problems Communication software Electronic mail (email) File protocol transfer (FTP) Web browser IM Chat room Network interface card (NIC): used to link a computer or other component to the network Wireless access point: A location where wireless devices can connect to a wired or wireless network Hub: A device which can receive a signal from one device and sends it to all other devices on the hub. Are NOT used in bus or ring networks as they do NOT have a central point. Switch: Receives a signal from one device and sends it to the appropriate destination device Stores the MAC address of each device Can send many signals simultaneously Used in many client/server networks if there are more than two servers Routers: A communications device which sends information to the appropriate LAN. Modem: Used to send a computer's digital signal over the telephone line
Network Security
Networks need to be protected from information being stolen The different types of security are: Usernames and passwords Firewall: Filters information entering the network Examines the IP address of the incoming computer and blocks it from entering protected servers, files, folders etc. Can also be used to restrict employees from accessing sensitive information Malware Protection: Protects the computer or network from malicious software and viruses. These are usually virus-protection software and anti-spyware software. Encryption: Converting information into a secret code which can only be read by authorised users. Two types of encryption: Symmetric-key protection: where two computers share the same key to encrypt and decrypt a file and is only known by those two computers Asymmetric-key protection: where each computer has two keys: a public and private key. The public key is the same for all computers and is used only for encrypting a file. The way to decrypt it is by using the private key which is only kept for yourself.
I.T Page 11
I.T Page 12
Glossary A-L
Sunday, 11 October 2009 3:11 PM A Acquisition: Acquiring data i.e. survey, interview, poll, recordings Access hierarchy: Subdivided into 'main', 'secure' and 'project' depending on the level of publicity desired. G Gantt Chart: A type of organisational chart used commonly in project managent
B Backup: Incremental: Backs up files only when changes have been made. Differential: Uses two sets of backup media to backup. One is used for full backup while the other is for differential. Full: Completely backs up files every time even if there are no changes. Quickest to restore yet longest to save
H Hacking: The ability to access another information illegally and view personal or interesting information inside Hub: A device which can receive a signal from one device and sends it to all other devices on the hub.
C Conventions: A formal way of displaying information Critical Path: The longest time frame in a task Cables: Coaxial: A similar cable however uses insulation then copper, aluminum, tin or lead foil then another layer of insulation. Twisted-pair: When the cables are twisted in pairs and then twisted again as a group. Fibre-optic: Uses light pulses through glass or plastic strands and can produce speeds 100Mbps. Communication: This information is then presented or distributed to a specific audience via fax, email, mail, video conferencing Cracking: See Hacking
I Input: Writing the data into an information system by keyboard, tape recorder, CD/DVD, mouse, scanner etc.
D Databases Relational: Databases that have tables with a connection between one or more other tables from a common field Dependency: When a task that can only be commenced once the previous task is completed) Decisions: Day-to-day: Decisions at worker level such as deciding which customer to serve next etc. Operational: Decisions made by operational managers such as deciding how much stock to order, hiring workers etc. Tactical: Decisions over several weeks or months on the running of organisation Strategic: Decisions relating towards long-term goals of organisation Disposal: Once the information is old, the information is deleted from all the sources by either shredding
E Encryption: Converting information into information into a secret code which can only be read by authorised users.
F Firewall: Filters information entering the network Form: Allows users to input data through an input screen which is linked to its corresponding table
Lag time: The amount of time before the next task has to be started before the task is
Lead time: The amount of time leading up to a task Log files: Keeps a record of actions employees do on the computer
delayed.
I.T Page 13
Glossary M-Z
Sunday, 11 October 2009 4:10 PM
M Malware Protection: Protects the computer or network from malicious software and viruses. Manipulation: Present the data in the way the user wants to see (e.g. sorting the names of a club in alphabetical order Monitoring: Desktop/Employee: Programs which allow employers to view what their employees are doing on the computer from the comfort of their own seat Macros: Programs which automatically complete a set of tasks (e.g. print a report)
T Testing: Formal: A complete testing of the entire solution upon completion through comprehensive documentation (testing tables) Informal: Frequent testing of the solution through development to see if solution behaves accordingly. Tampering with files: Altering information without physically being at the computer and without others knowing Tables: Relational: A table links to another table by a common field Flat-file: All fields are in one table
N Network operating sotware: software that controls how specific devices can communicate with each other. Network interface card (NIC): used to link a computer or other component to the network
O Objectives: Small achievable tasks completed to accomplish the big goal. Output: Creating the information of either text, graphics, other media or a combination of those. This information can be outputted by printers, monitors, projectors
V Validation: Check the data to ensure there is no inaccuracies Electronic: Using software functions to check the accuracy, reasonability and suitability of the data Manual: The creator proofreads for errors Vandalism: The intentional damaging of hardware and software
Packet sniffers: Diagnostic tools used to secretly see the contents being sent
across the network PERT Chart: A type of organisational chart used for project management
W Wireless access point: A location where wireless devices can connect to a wired or wireless network
Q Query: Ask for specific results by filtering what you want to see
R Relationships: One-to-one: When one record on one table is connected to only one record on another table. One-to-many: When one record on one table is connected to many records on another table Many-to-many: When a record on one table can be connected to many
I.T Page 14
Many-to-many: When a record on one table can be connected to many records on another table and vice versa. Routers: A communications device which sends information to the appropriate LAN. Retrieval: Needs to be retrieved from the storage for later use or to be transferred to the computer's main memory Report: Formats the query data and allows the user to add statistics, headers and footers, colour schemes etc.
S Hub: A device which can receive a signal from one device and sends it to all other devices on the hub. Storage: Finding a suitable storage method to store the data for later use e.g. USB, hard drive, CDs, back-ups
I.T Page 15
Decision-making
Two factors: Level of management Type of decision Strategic decisions: Made by the Senior management relating to long term goals of an organisation. Example: releasing a new product line Tactical decisions: Made by the Middle management (or managers) relating to the running of the organisation. Operational decisions: Made by the operational management relating to tasks such as hiring, firing, new stock. Day-to-day decisions: Made by the store workers relating to immediate decisions such as serving the next customer etc.
I.T Page 16
How data is turned into information DATA- raw unorganised facts Once inputted, maniupated into meaningful use, it is
INFORMATION
Evaluating the EFFECTIVENESS of data security measures Must evaluate the: Integrity of data Ease of retrieval Security Currency of files
I.T Page 17