Biometrics: A way to measure and analyse a form of human characteristic to identify and identify and individual. These include fingerprints, voice patterns, eyes, facial scanners, palm prints.
Firewalls: A piece of software or hardware that stops harmful data from entering your computer.
Encryption: Scrambling data so that only the people with the code or key to unlock it can read it.
Anti-virus: A piece of software that detects a piece of malicious software that is already on your computer. It doesn't stop the software from entering your computer, that's what a firewall does.
Anti-spyware: Basically the same thing as anti-virus but it gets rid of spyware, and stops it from entering the computer.
Access rights: Permissions that are granted to a user or program, allowing them to use an application, read, write and erase files.
User ID's passwords: A specific password for a user to identify them when they log in to the computer. This allows for the IT technicians at whatever company the user is logging into to see and to track what that certain user does on that computer.
Audit logs: A log of activities that tracks every action taken by users on a network,
Developing of codes and conducts: Takes advantage of people's good nature (hopefully) by setting up rules that people have to stick to, like closing doors and windows, logging off after they're finished etc.
Explain the harm to teenagers that could be caused by the use of the internet.
Teenagers spent the most time of all age ranges on the internet, making them more susceptible to harm on the internet. This includes cyber bullying and cyber crime of varying types.
Cyber bullying is a form of bullying that is on any electronic device, but primarily on the internet. Because of the increase of availability to social media sites more and more people are getting bullied online. This increase in cyber bullying has increased the amount of suicides, self-harm and depression in teenagers, while it is being made easier to anonymously bully people over the internet through social media sites. Due to anonymity being easier to achieve it leads to more bullying, but it could be prevented through teaching teenagers how to report cyber bullying at school. Increasing the awareness of services like Childline would also reduce the amount of harm teenagers could be caused through the internet.
Cyber crime is also a form of harm that can be caused by teenagers. Their increased availability to social media and the internet would increase their chance of downloading malware or spyware.
Thursday, 12 May 2016
Tuesday, 10 May 2016
Networking
A TWO MAN OPERATION SELLING EBAY ITEMS.- LAN
A LARGE MULTINATIONAL ORGANISATION SELLING INSURANCE. - Servers
A SMALL INDEPENDENT ONLINE GAME COMPANY. - Servers
A DOTA TOURNAMENT. - WAN
Describe three advantages to the school of networking the computers.
1) Using a client server network the school would be able to set up accounts for each pupil, allowing them to access their own files when they go on one of the computers.
2) Having a network would mean that a firewall would only be needed on the machine that data is sent and received through, making it so that no virus could get into the computers themselves.
3) Having a network would allow the IT manager to block certain inappropriate sites for the children.
A LARGE MULTINATIONAL ORGANISATION SELLING INSURANCE. - Servers
A SMALL INDEPENDENT ONLINE GAME COMPANY. - Servers
A DOTA TOURNAMENT. - WAN
Describe three advantages to the school of networking the computers.
1) Using a client server network the school would be able to set up accounts for each pupil, allowing them to access their own files when they go on one of the computers.
2) Having a network would mean that a firewall would only be needed on the machine that data is sent and received through, making it so that no virus could get into the computers themselves.
3) Having a network would allow the IT manager to block certain inappropriate sites for the children.
Tuesday, 3 May 2016
Computer Misuse
The Computer Misuse act would be almost impossible to police unless the people policing it broke it
themselves, making a redundant law. The only way to reliably police the Computer Misuse Act would be to have total surveillance over everybody in the whole country. There is also a lot of aspects of the law that are outdated or completely superfluous, such as by obtaining a piece of malware, for example opening a malicious email, meaning that thousands of innocent people would be persecuted for simply opening an email.
themselves, making a redundant law. The only way to reliably police the Computer Misuse Act would be to have total surveillance over everybody in the whole country. There is also a lot of aspects of the law that are outdated or completely superfluous, such as by obtaining a piece of malware, for example opening a malicious email, meaning that thousands of innocent people would be persecuted for simply opening an email.
Subscribe to:
Posts (Atom)