Igcse Ict Chapter 4 To 7 Notes
Igcse Ict Chapter 4 To 7 Notes
Igcse Ict Chapter 4 To 7 Notes
Dina El-Akkad 42
ICT I.G.C.S.E.
A network is a series of computer systems that are linked together so that they are able to share
computing power or storage facilities. The link may be between computers in the same building or
between computers in different parts of the country or even in different parts of the world.
4.1 Networks:
4.1.1 Network devices:
Modems
A modem (modulator demodulator) is a device that converts a computer’s digital signal into an
analogue signal for transmission over an existing telephone line and back again.
Dial-up modems operate at transmission speeds of about 60 kilobits per second, which is extremely
slow.
Modem broadband or ADSL (asymmetric digital subscriber line) modems operate at up to 100
Mbits/second when using fibre-optic cables and 20 Mbits/second when using copper cables.
ADSL modems allow telephone conversations and internet traffic to occur at the same time because
of the of the wide bandwidth signal used.
Cable modems allow cable television providers to offer internet access as well as receiving
television signals.
Hubs:
A hub is a device that can have a number of other devices or computers connected to it
to form a LAN. It does not read any of the data in the packets which arrive from a computer, but
just sends them on to all the computers on the network, including the one that sent it. Using a hub
is not a very secure or efficient method of data distribution.
Switches:
Switches connect a number of devices together to form a LAN. Switches are
able to look at a data packet, target the computer for which it is intended, and send it. This helps to
speed up data transmission in a network. Each device has a media access control (MAC) address
which identifies it uniquely. Data packets sent to switches will have a MAC address identifying the
source of the data and additional address identifying each device that should receive the data.
Bridges:
Bridges are devices that connect one LAN to another LAN that uses the same protocol. A large
network can get very busy. A bridge allows a large network to be segmented and stops unnecessary
traffic being passed around the network.
Dina El-Akkad 43
ICT I.G.C.S.E.
Routers:
Routers enable data packets to be routed between the different networks to join a LAN to a WAN.
Broadband routers sit behind a firewall.
The router’s main function is to transmit internet and transmission protocols between two networks
and allow private networks to be connected together.
Packets of data contain the following information:
header to identify the data packet
the sender’s IP address
the receiver’s IP address
how many data packets make up the whole ‘message’
the identity number of each packet
When a router receives a packet of data, it checks the destination IP address against the stored
routing table. The routing table stores the MAC address of the device, the assigned IP address and
the lease time the IP address is assigned for. The bits forming the destination IP address in the data
packet are used to point to the correct route. The packet is sent to a number of routers until it
reaches its final destination.
Other hardware
Gateways:
A gateway is a network point (or node) that acts as an entrance to another network. If a network
node needs to communicate outside its network, it needs to use a gateway.
Network cables
Network cables have the following advantages over Wi-Fi:
faster data transfer rates
can be more secure than wireless networks.
Dina El-Akkad 44
ICT I.G.C.S.E.
4.1.2 Internet Protocol (IP) and Media Access Control (MAC) addresses:
Each device on the internet is assigned for each internet session by the ISP a unique address known
as IP address.
The IP address gives the location of a device on the internet whereas the MAC address identifies the
device connected to the internet.
Bluetooth:
Bluetooth sends and receives radio waves in band of 79 different frequencies (known as channels).
Devices using Bluetooth automatically detect and connect to each other. Each communicating pair
uses different channel.
Bluetooth creates a secure Wireless Personal Area Network (WPAN) based on key encryption.
Uses of Bluetooth:
when transferring data between two or more devices that are very close together (<30 meters
distance)
When the speed of data transmission is not critical
For low-bandwidth applications (for example, when sending music files from a mobile phone to
a headset).
Dina El-Akkad 45
ICT I.G.C.S.E.
4.1.4 How to set up and configure a small network:
Purchase of software and hardware (switches, network cables, a router, a firewall, servers, etc)
Set up an IP account if internet access is required
Set up the system to allow wireless connectivity
Configure all the hardware and software
Ensure a high-speed broadband connection exists
Put the common software onto a server and ensure that the network licence allows network users
to use the software
Set up privileges so that each user can only access their own area or common shared area
Set up a network-manager-level of privilege to monitor network usage, change passwords, etc.
Each webpage has a unique address that helps web browsers to find them. The address is known as
the Uniform Resource Locator (URL).
There are three common ways of accessing the internet offered by service providers:
dial-up access
cable internet access
digital subscriber line (DSL) (broadband) internet access.
Dina El-Akkad 46
ICT I.G.C.S.E.
Intranet:
Many companies use an Intranet as well as the Internet. An Intranet is ‘a computer network based
on internet technology that is designed to meet the internal needs for sharing information within a
single organisation.
There are a number of reasons for adopting Intranets rather than using the Internet:
It is safer since there is less chance of external hacking or viruses.
It is possible to prevent employees from accessing unwanted websites
Companies can ensure that the information available is specific to their needs.
It is possible to create extranets that allow intranets to be extended outside the organisation but
with the same advantages as an intranet.
Dina El-Akkad 47
ICT I.G.C.S.E.
4.1.6 LANs and WANs:
Local Area Networks (LANs):
These systems are usually within one building. Computers and devices are connected to hubs or
switches.
Advantages:
1. Sharing of resources (such as expensive peripherals and applications software).
2. Ease of communication between users.
3. A network administrator to control and monitor the network (e.g. change passwords, monitor
internet use, etc.).
Disadvantages:
1. Easier spread of viruses.
2. Printer queues can be frustrating.
3. Slower access to the internet.
4. Increased security risks when compared to stand-alone computers.
5. If the main server breaks down, the network will no longer function.
Disadvantages:
1. Security can be a big issue since the signal can be picked up.
2. There may be problems of interference, which can affect the signal.
3. The data transfer rate is slower than in wired LAN.
Dina El-Akkad 48
ICT I.G.C.S.E.
Wide Area Network s (WANs):
The computers and terminals forming part of the network can be spread around the world. External
communication links such as satellites, microwaves or telecommunication links are used to connect
the network. The connection must normally be paid for because the links are external.
Dina El-Akkad 49
ICT I.G.C.S.E.
4.2 Network issues and communication:
4.2.1 Network Security:
Should the internet be policed?
Arguments is favour of some form of control
It would help to prevent illegal material being posted on websites.
Most of the information can be found in books but it is much easier to find the information using
a search engine.
It would prevent children being subjected to undesirable websites.
It would help to stop incorrect information being published on websites.
Dina El-Akkad 50
ICT I.G.C.S.E.
Security issues:
Ways of protecting passwords:
Run anti-spyware software
Change passwords regularly
Passwords should not be easy to guess. Strong passwords should contain:
o at least one capital letter
o at least one numerical value
o at least one other keyboard character (such as @, &)
4.2.2 Authentication:
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Some forms of authentication include:
user IDs and passwords
digital certificates
A digital certificate is a pair of files stored on a user’s computer – these are used in the security
of data sent over the internet. Each pair of files is divided into a public key and a private key.
biometrics
Biometrics relies on certain unique characteristics of human beings; examples include:
fingerprint scans, signature recognition, retina scans, iris recognition, face recognition, voice
recognition.
4.2.3 Viruses:
A virus is a self-replicate program that corrupts a computer system. A virus attaches itself to files,
leading to:
computer crashes
loss of files - system files when lost computer malfunctions.
corruption of the data stored on files.
Dina El-Akkad 51
ICT I.G.C.S.E.
Antivirus software:
they check software or files before they are run or loaded on a computer.
antivirus software compares a possible virus against a database of known viruses.
they check software for types of behaviour that could indicate a possible virus (heuristic
checking)
any possible files or programs that are infected are put into quarantine.
antivirus software needs to be kept up to date.
Full systems checks need to be carried out regularly.
Dina El-Akkad 52
ICT I.G.C.S.E.
4.2.5 Network Communication:
Emails and Faxes:
Electronic mail is a method of sending messages from one terminal to another via a
communication link.
Advantages of using e-mail:
1. Message sent instantaneously.
2. The same message can be sent to many recipients at the same time.
3. No need to leave house to send e-mail.
4. E-mails can be read from any location.
5. Replies to e-mails are quick.
6. Can send file attachments.
7. Low cost, since stamps, paper and envelopes are not needed.
Faxes (Facsimile):
i) Physical fax:
A fax machine is like a long distance photocopier. The document is put into the fax machine at one
end and a copy comes out of a fax machine at the other end. The original is first scanned with a
beam of light and then converted into electronic signals that can be passed along telephone lines.
Dina El-Akkad 53
ICT I.G.C.S.E.
Emails:
More secure than faxes because password protected.
No need to print the document so saving cost and environmentally friendly.
The document is usually of a better quality
Documents received in emails can be modified
It is much easier to send to multiple recipients at the same time
People are more likely to have access to email accounts than a fax machine
Video conferencing is a communication method that uses both video and sound. It is carried out in
real time and makes use of some form of network. The basic hardware includes:
Hardware needed:
Microphones
Web Cams
Speakers
Large monitors/television screens
Software needed:
Webcam and microphone software drivers
CODEC: coder–decoder or compression-decompression
echo cancellation software.
Advantages of Video conferencing:
1. Conferences can be called at short notice.
2. Cost is reduced:
Reduced travelling costs
No need to pay for hotel accommodation
3. Don’t have to carry documents to conference.
4. Employees will not travel to unsafe places around the world.
Voice over Internet protocol (VOIP) is a method used to talk to people using the Internet. One of
the big advantages is that it is either free or at a local rate to anywhere in the world. The main
problems are usually sound quality (echo and ‘weird sounds’ are both common faults).
The security issues over VOIP are:
identity theft
viruses and malware (malicious software)
spamming (sending junk mail)
phishing attacks (the act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private information
that will be used for identity theft).
Web conferencing:
Web conferencing (webinar) uses the internet to permit conferencing to take place. Multiple
computers are connected to the internet. As with video conferencing it is carried out in real time
and allows the following type of meetings to take place:
business meetings to discuss new ideas
presentation
online education or training
Web conferencing links into video conferencing and audio conferencing through the use of
webcams and built in microphones and speakers.
Dina El-Akkad 55
ICT I.G.C.S.E.
Dina El-Akkad 56
ICT I.G.C.S.E.
A systems analysis team is brought in to review an existing system and suggest a number of
improvements.
Dina El-Akkad 57
ICT I.G.C.S.E.
5.1 Analysis:
The analysis stage involves examining the existing system in detail. The basic steps can be
summarised as follows:
1. Research or collect data from the current system
2. Describe of the current system – establishing the inputs, outputs and processing being
done
Feasibility study
2. Interview: Involves a one-to-one question-and-answer session between the analyst and the
employee/customer.
Advantage: The questions do not have to be fixed in advance; the analyst can change them
according to the answers the interviewees give.
Disadvantages:
i. Interviewing takes a lot of time.
ii. It is relatively expensive, due to the use of the analyst’s time.
iii. The interviewee cannot remain anonymous.
Dina El-Akkad 58
ICT I.G.C.S.E.
3. Workers and/or customers filling questionnaires to gather facts in a fast way.
Advantages:
i. These are much less time-consuming than interviews.
ii. Individuals can remain anonymous if they want.
iii. It is relatively inexpensive method.
Disadvantages:
i. Often the number of returned questionnaires is low.
ii. Analyst can’t change questions halfway through.
iii. There is no immediate way to clarify a vague or incomplete answer to a question.
4. Looking at existing paperwork: All documents that are used within a system need to be
examined. The documents may be, for example, bills, invoices, letters, order forms, payslips,
etc. The analyst will be looking for answers to questions such as: How is the data collected?
What data is collected? What happens to this data after it has been collected?
Advantages:
i. The analyst can see for themselves how the paper system operates.
ii. A lot can be discovered about an organisation by examining the documents that it uses.
Disadvantages:
i. It can be very time consuming.
ii. Because of the analyst's time, it is a relatively expensive method.
iii. The documentation is often difficult to understand, so it may be necessary to ask someone to
explain it. This means that we are back to the interview again.
5.2 Design:
Having analysed the existing system, the next stage is to design the key parts of the recommended
system. A list of tasks is summarized here:
Design the data capture forms / input forms
Design screen layouts
Design the outputs in the form of screen displays and printed reports
Producing system flowcharts and/or pseudo code
Select/design validation rules that need to be used
Design the file structures and tables (field names, field types, field lengths, field
description, selection of key field, how the data files will be linked, etc)
Produce any algorithms or program flowcharts
designing a testing strategy plan
Dina El-Akkad 59
ICT I.G.C.S.E.
5.2.1 Data capture forms:
These forms allow the data to be input into the system.
Navigation aids:
Back/previous record button
Forward/next record button
New record button
Submit/save button
First record button
Last record button
Exit button/return to homepage button
Move to top of page if long form
Search facility
Dina El-Akkad 60
ICT I.G.C.S.E.
5.2.2 Screen displays and printed reports:
Screen outputs should be designed:
to make sure the size of all the output fields is correct
so that any instructions/descriptions are clear
so that the full screen is utilised
so that colours and fonts make the output clear.
Dina El-Akkad 61
ICT I.G.C.S.E.
Example: If a field needs six digits then inputting a five- or seven-digit number, should cause an
error message,
(f) Presence Check: checks that the data has been entered.
(g) Consistency Check: checks to see that fields match each other.
Example:
If 'Mr' has been typed into a field called title then the gender field must contain either 'M' or 'Male'
Dina El-Akkad 62
ICT I.G.C.S.E.
Field name Field length Field type Suitable validation
check
product_code 8 Alphanumeric length check
manufacturer_year 4 Numeric range check
product_name 20 Alphanumeric None
colour 2 Alphanumeric look-up check
5.3.1 Development:
After the data structures have been designed, they will need to be created using the software or
programming language recommended by the systems analyst. The programmer will produce the
program code needed to solve the problem.
5.3.3Testing strategies:
After testing each module the whole system is tested. Even though each individual module may
work satisfactory, when they are all put together there may be data clashes, etc.
A system is tested by using both test data and live data.
As a result of testing, data/file structures, validation routines, input methods, output formats may
need to be amended/improved.
Dina El-Akkad 63
ICT I.G.C.S.E.
5.4 Implementation:
After the system is fully tested, the systems analyst will want to get the system up and running. His
next steps will be
to train staff on the new system,
transfer paper files or electronic files to the new system and
choose a method of changeover to the new system.
Methods of changeover:
1. Direct changeover:
New system replaces the existing system immediately. This method can only be used when the new
system has been thoroughly tested. Once the old system is closed down it cannot be reintroduced.
Advantages:
i. The benefits are immediate.
ii. Costs are reduced – since only one system is used there is no need to pay for two sets of staff.
iii. There is less likelihood of malfunction since the new system will have been fully tested.
Disadvantages:
i. If there are problems, there is no backup system.
ii. It can be difficult to make improvements to the new system and keep it working.
2. Parallel running:
The old and new systems are run side by side for a time before the new system takes over
altogether.
Advantages:
i. If the new system fails, the old system is still available as a backup.
ii. Staff can be trained to use the new system gradually.
Disadvantages:
i. Two sets of workers have to be paid to keep both system running.
ii. It takes a lot longer to fully implement than direct changeover.
3. Pilot running:
Pilot running is the method adopted by large organisations. The new system is implemented in one
branch of the organisation whilst the other branches continue with their existing system. Workers
from other branches can be taught on the new system before it is introduced to their branch.
Dina El-Akkad 64
ICT I.G.C.S.E.
Advantages:
i. If the system does not work properly, not all branches are affected.
ii. The later branches benefit by learning from the mistakes made in earlier branches.
iii. The costs are less than parallel running.
Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. It is more expensive than direct changeover, since each pilot scheme needs to be evaluated before
the next stage is introduced.
4. Phased implementation:
Phased Implementation involves the introduction of the new system one part at a time. When the
system is working perfectly another aspect can be moved onto the new system until all aspects have
been transferred to the new system.
Advantages:
i. If the latest part fails, it is only necessary to go back in the system to the point of failure.
ii. Workers have time to get used to the new system.
iii. Don’t have to pay two sets of staff.
Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. If the new system doesn’t work properly, it is not possible to fall back on the old system.
iii. It is more expensive than direct changeover, since it is necessary to evaluate each phase before
moving to the next stage.
5.5 Documentation:
5.5.1 User Documentation:
It is provided to help users operate the new system. It is written in non technical terms. It includes:
Purpose of the system
Limitations of the system
Hardware and software requirements
Input and output formats
How to save files, do a search, sort data, etc
Sample runs
Error messages
Trouble-shooting guide
Dina El-Akkad 65
ICT I.G.C.S.E.
Frequently Asked Questions
Tutorials
5.6 Evaluation:
After the system has been developed, tested and implemented, it must be evaluated. There are a
number of stages in the evaluation process.
A system is usually evaluated against a set of criteria:
Is the system reliable?
Does the system do what it was intended to do?
Is the system easy to use?
Is the new system efficient?
Is the solution appropriate?
Dina El-Akkad 67
ICT I.G.C.S.E.
Dina El-Akkad 68
ICT I.G.C.S.E.
The four main areas where ICT has had an effect on employment include:
Shop work – online shopping has reduced the need for high street shops
Banking – the introduction of ATMs and online banking has led to the closure of many branches
Office work – spreadsheets, word processors and databases have taken over many of the tasks
carried out by office staff.
6.1 The effects of ICT on employment:
6.1.1 Negative effects – job losses:
The introduction of ICT systems – whether to improve efficiency, reduce costs or improve safety –
has led to redundancies in many areas of industry and commerce.
Office work:
By introducing computer system and new software, the work could be done by fewer staff and in a
much shorter time scale. This could lead to many redundancies and the need for the remaining staff
to retrain.
Manufacturing:
Car manufacturing makes use of robotics. Robots are capable of carrying out the following tasks:
spraying the bodies with paint
assembling all the body parts
assembly of the engine and transmission
fitting the windscreens.
Fitting seats, dashboards and interior trim are usually carried out by a skilled worker.
Factory workers have had to retrain to gain the following new skills:
maintenance of the robots
quality control
design and development
marketing
training other workers.
Dina El-Akkad 69
ICT I.G.C.S.E.
Advantages of robots over humans:
Higher productivity.
More consistent results.
They work non-stop without breaks.
They don’t get bored by repetitive tasks.
They don’t go on strike.
There has been a large increase in job opportunities in some areas, for example:
network managers and computer technicians
website designers
programmers to write operating systems, application software and computer games.
computer engineers (who build and maintain computer systems)
delivery drivers to deliver goods to customers.
Job sharing:
With job sharing, a full time job is divided between two part-time workers. Both workers are
doing the same job; one picks up the work where the other left off.
Compressed hours:
In compressed hours, an employee works their full hours for the week but works fewer days.
Dina El-Akkad 71
ICT I.G.C.S.E.
Advantages of microprocessor-controlled labour-saving devices:
People no longer have to do manual tasks at home.
There is no longer a need to stay home while food is cooking or clothes are being washed.
They give people more time for leisure activities, hobbies, shopping and socialising.
It is possible to control ovens and central heating systems using smart phones while the owner is
out.
Automated burglar alarms give people a sense of security as they give a very sophisticated level
of intruder warning at all times.
Smart fridges and freezers can lead to more healthy lifestyles (they can automatically order fresh
food from supermarkets using their internet connection) as well as prevent food waste.
Dina El-Akkad 72
ICT I.G.C.S.E.
Dina El-Akkad 73
ICT I.G.C.S.E.
7.1 Physical security:
7.1.1 Health aspects:
Dina El-Akkad 74
ICT I.G.C.S.E.
7.1.2 Safety aspects:
Electrocution:
use an RCB (residual current breaker)
check insulation on wires regularly
don’t allow drinks near computers
check equipment on a regular basis
Fire risk:
ensure good ventilation in the room
have a fully tested Co2/dry fine fire extinguisher nearby
fire exits must be kept clear at all times and not blocked by equipment
electrical sockets should not be overloaded
reduce voltage requirements - LCD screens instead of CRT monitors
cables are not to be coiled – the heat generated may be sufficient to start a fire
Dina El-Akkad 75
ICT I.G.C.S.E.
7.2 E-safety:
E-safety refers to safety when using the internet, i.e. keeping personal data safe and applies to any
of the following devices:
mobile phones
computer or tablet
game console
wireless technology
Dina El-Akkad 76
ICT I.G.C.S.E.
Some e-safety issues:
don’t give out any personal information to people who are unknown to you especially online.
don’t sent people photos of yourself – either online or via a mobile phone - unless a person is
known to you.
always maintain your privacy settings on whatever device is being used online or during
communications.
when accessing the internet make sure the websites being visited can be trusted by looking for
https or the padlock sign. When using search engines, always make sure the device settings are
set to ‘safe search’.
only use websites recommended by teachers and only use a learner-friendly search engine.
only open emails from known sources.
only email people you know.
it is extremely important to be vigilant when using social networking sites, instant messaging or
chat rooms:
o block or report anybody who acts suspiciously or who uses inappropriate language
o be very careful with the language used in chat rooms
o always use nickname and never use real name
o keep private and personal data secret
o don’t enter private chat rooms – stay public
o never arrange to meet anyone for the first time on your own
o always tell an adult first and meet in a public place
o avoid misuse of images
o always use appropriate language
o always respect people’s confidentiality
It is also important to be careful when using online gaming since it carries its own risks. Some of
the known risks reported over years include:
violence in the game itself, which can lead to violent behaviour in reality
predators
cyber bullying
use of webcams
voice-masking technology
viruses, phishing or spyware are examples of problems associated with certain online gaming.
Dina El-Akkad 77
ICT I.G.C.S.E.
7.3 Security of data:
7.3.1 Hacking
Hacking is the act of gaining unauthorised access to a computer system.
Effects of hacking:
identity theft or misuse of personal information
data can be deleted, changed or corrupted on a user’s computer
To protect against hacking:
use of firewalls
use of strong passwords and user IDs
use of intrusion detection software
use of user IDs and passwords
Encryption makes files unreadable if accessed illegally but it does not prevent hacking.
7.3.2 Phishing
The creator sends out legitimate-looking emails to target users. As soon as the recipient clicks on a
link in the email or attachment, they are sent to a fake website or they are fooled into giving
personal data in replying to the email. The email often appears to come from a trusted source, such
as a bank.
Effects of phishing:
The creator of the email can gain personal data, such as bank account data or credit card
numbers, from the user.
This can lead to fraud or identity theft.
Smishing uses the SMS system of mobile phones to send out fake text messages.
Vishing uses a voice mail message to trick the user into calling the telephone number contained in
the message.
Dina El-Akkad 78
ICT I.G.C.S.E.
7.3.3 Pharming
This is malicious code installed on a user’s computer or on a web server. The code will redirect the
user to a fake website without their knowledge.
Effects of pharming:
The creator of the malicious code can gain personal data, such as bank account data or credit
card numbers, from users when they visit the fake website.
Pharming can lead to fraud or identity theft.
7.3.5 Spam
Spam, often referred to as junk email, is usually sent out to a recipient who is on a mailing list or
mailing group. While spam is rarely a security risk, it can lead to denial of services. Denial of
services is an attack on a network that is designed to slow the network down by flooding it with
useless traffic. Spam can be linked to phishing attacks or even the spread of computer viruses.
Spam can also affect mobile phones through text messaging and sometimes referred to as ‘spasms’.
7.3.7 Cookies
Cookies are small amounts of text that are sent and received through the web browser as we search
or visit internet sites. Cookies track the pages you have visited and save these on your computer
with information about you.
Cookies can be useful if you visit a website frequently and do not wish to enter your login details
each time, but they allow websites you have not visited to know which webpages you have viewed.
7.4.3 Encryption
Encryption is the name given to the converting of data (plain text) into a code (cypher script) by
scrambling it. Even if a hacker gains access to the data he will not be able to understand it. The
key used to encrypt (or encode) the message is known as the encryption key; the key used to
decrypt (or decipher) the message is known as the decryption key.
7.4.4 Authentication
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Digital certificates
A digital certificate is a pair of files stored on a user’s computer. Each pair of files is divided into:
a public key
a private key
When sending an email, the message is more secure by attaching a digital certificate made up of six
parts:
the sender’s email address
the name of the digital certificate owner
a serial number
expiry date
public key
digital signature of certificate authority (CA)
Operating systems and web browsers maintain lists of trusted CAs.
Passwords
Biometrics
Dina El-Akkad 81
ICT I.G.C.S.E.
Online credit fraud
Online credit card fraud happens for the following reasons:
hackers gaining access to a user’s computer through the use of spyware, phishing or pharming.
the breaking of passwords
sometimes the URL is altered very slightly in the email and the user ends up visiting a fake
website so it is better to type in the URL.
it is relatively easy to tap in to wireless networks without password protection
Wi-Fi hotspots in public places are not secure
cloud and some retail companies are targets for hackers
Cloud security
Several computer manufacturers encourage customers to store or backup their files on a medium
known as the cloud. Users purchase cloud storage and can then access all their files from any
device anywhere in the world.
Advantages:
no need to carry memory sticks
no need to pay for large storage capacity on your computer
cloud companies ensure that your files are backed up
the ability to synchronise (sync) files ensures they are automatically updated across all devices
allows several users to edit and collaborate on a single file
Data security:
Companies that transfer vast amount of confidential data from their own systems to a cloud service
provider are relinquishing control of their own data security.
Data loss:
There is a risk that important and irreplaceable data could be lost from cloud storage facilities.
Dina El-Akkad 82