Ict Project: by Hareth Hameed of VIII-C
Ict Project: by Hareth Hameed of VIII-C
Ict Project: by Hareth Hameed of VIII-C
CD/DVD disks
Optical discs that use the same
technology as music CDs. They store up
to 700MB of data. CDs can be used for
multimedia applications such as
encyclopedias and can store pictures,
sounds and video clips or anything else
that will fit.
DVDs are the same physical size as CDs
but hold much more data - a single
sided disc can hold up to 4.7 GB. DVDs
are commonly used for storing video so
you will often see them measured in
minutes, eg 4.7 GB = 120 minutes.
Optical Storage Media
Blu-ray discs
Blu-ray discs are another example
of optical storage media. However,
they are fundamentally different
to DVDs in their construction and in
the way they carry out read-write
operations.
NETWORK SECURITY
WHAT IS NETWORK SECURITY?
Computer networks have many benefits but they also create security risks. By
connecting computers it is possible to share personal data easily. However, it
makes computers more vulnerable to interference from other people.
Anyone sharing personal information, eg bank details, wants to be sure that
they are safe and secure. Most businesses and organisations employ network
managers or administrators to manage the security of their networks.
There are many potential threats to a network and various ways to protect
them:
Anti-virus software
Firewalls
Secure passwords
Access levels
Encryption
NETWORK SECURITY METHODS
Access control: You should be able to block unauthorized users and devices from accessing
your network. Users that are permitted network access should only be able to work with the
limited set of resources for which they've been authorized.
Anti-malware: Viruses, worms, and trojans by definition attempt to spread across a
network, and can lurk dormant on infected machines for days or weeks. Your security effort
should do its best to prevent initial infection and also root out malware that does make its
way onto your network.
Application security: Insecure applications are often the vectors by which attackers get
access to your network. You need to employ hardware, software, and security processes to
lock those apps down.
Behavioral analytics: You should know what normal network behavior looks like so that
you can spot anomalies or breaches as they happen.
Data loss prevention: Human beings are inevitably the weakest security link. You need to
implement technologies and processes to ensure that staffers don't deliberately or
inadvertently send sensitive data outside the network.
Email security: Phishing is one of the most common ways attackers gain access to a
network. Email security tools can block both incoming attacks and outbound messages with
sensitive data.
NETWORK SECURITY METHODS
Firewalls: Perhaps the granddaddy of the network security world, they follow the rules
you define to permit or deny traffic at the border between your network and the internet,
establishing a barrier between your trusted zone and the wild west outside. They don't
preclude the need for a defense-in-depth strategy, but they're still a must-have.
Intrusion detection and prevention: These systems scan network traffic to identify and
block attacks, often by correlating network activity signatures with databases of known
attack techniques.
Mobile device and wireless security: Wireless devices have all the potential security
flaws of any other networked gadget — but also can connect to just about any wireless
network anywhere, requiring extra scrutiny.
Network segmentation: Software-defined segmentation puts network traffic into
different classifications and makes enforcing security policies easier.
VPN: A tool (typically based on IPsec or SSL) that authenticates the communication
between a device and a secure network, creating a secure, encrypted "tunnel" across the
open internet.
Web security: You need to be able to control internal staff's web use in order to block
web-based threats from using browsers as a vector to infect your network.
WHAT IS DATA PROTECTION ACT?
The Data Protection Act (DPA) is a United Kingdom Act of Parliament which
was passed in 1988. It was developed to control how personal or customer
information is used by organisations or government bodies. It protects people
and lays down rules about how data about people can be used.
During the second half of the 20th Databases are easily accessed,
century, businesses, organisations and searched and edited. It’s also far
the government began using computers easier to cross reference information
to store information about their stored in two or more databases than
customers, clients and staff in if the records were paper-based. The
databases. For example: computers on which databases
names resided were often networked. This
addresses allowed for organisation-wide access
to databases and offered an easy way
contact information
to share information with other
employment history organisations.
medical conditions The data, information and databases
convictions section has more on searching
credit history databases.
SOURCES
https://www.bbc.co.uk/bitesize/guides
https://en.wikipedia.org/
https://www.csoonline.com/
https://www.experian.co.uk/business
https://searchstorage.techtarget.com/
Cambridge IGCSE ICT 2nd Edition (ICT textbook)
THANK YOU