Chapter 7

Description

ICT Mind Map on Chapter 7, created by smita089 on 11/04/2013.
smita089
Mind Map by smita089, updated more than 1 year ago
smita089
Created by smita089 about 11 years ago
80
0

Resource summary

Chapter 7
  1. ICT Crime
    1. Physical Methods
      1. Physical methods - prevent a person from gaining access to a computer in person, walking in and sitting at the computer itself.
        1. Examples
          1. Security guards.
            1. Each employee having a pass which is checked or used with automated doors.
              1. Computers in locked room with limited access.
                1. Screen away from public in reception areas.
              2. Logical Methods
                1. Logical methods - computer-based methods that can be applied to the computer by a system administrator.
                  1. Examples
                    1. Usernames
                      1. Unique identifier. Can be allocated to groups. Restrictions to only logging onto certain machines. Used to log what each user is doing.
                      2. Passwords
                        1. Method of restricting access. Not shared with anyone.
                        2. Auditing - overlooking logs. Software can be used to look at when users start logging on/off and the data they access.
                          1. Firewalls - A hardware and/or software barrier between two networks. Used when connecting to the internet to prevent unauthorised access.
                            1. Encryption - aims to prevent anyone who has the data from being able to understand it without the appropriate key.
                        3. Networking
                          1. Peer to Peer
                            1. All of the computers connected to it are of equal status.
                              1. Any of the computers connected can provide printer or file-sharing resources.
                                1. Evaluation
                                  1. Advantages
                                    1. There is no need to purchase an expensive server. Normal computers can be used.
                                      1. Each user manages their own computer. This means that a network manager is not required.
                                        1. Set up is done using wizards. No technical knowledge is required.
                                          1. There is no reliance on a central server, so the network remains robust if it fails.
                                          2. Disadvanatges
                                            1. Each computer is fulfilling more than one role – it may be printing or file sharing. This increases the load on the systems.
                                              1. The data can be stored on any computer, so there is no organisation to data storage.
                                                1. Security, anti-virus protection and back-ups are the responsibility of individual users.
                                            2. Client-Server
                                              1. Powerful controlling computer: the server.
                                                1. Computer controls the peripherals (printers, back-up, etc.) and the network security.
                                                  1. Evaluation
                                                    1. Advantages
                                                      1. Back-up, security and anti-virus protection are centralised.
                                                        1. Shared data is centralised and organised.
                                                          1. The user does not do any of the management of the computers.
                                                            1. Network processing is done centrally, not at individual computers, freeing them to do what the user wants.
                                                            2. Disadvantages
                                                              1. The server and network operating system cost money.
                                                                1. A network manager is required.
                                                                  1. There is a reliance on the central server. If it fails, no work can be done.
                                                              2. Stand-Alone
                                                                1. Not connected to any other computer (i.e. it is not networked), is said to be stand-alone.
                                                                2. Evaluation
                                                                  1. Advantages
                                                                    1. Peripherals such as printers and scanners can be shared by several workstations reducing the cost.
                                                                      1. Data can be shared. Can allow a team to work on the same document.
                                                                        1. Access to data is controlled by usernames, passwords and associated access rights.
                                                                          1. Back-ups and virus checking can be controlled from a central location.
                                                                            1. Users can communicate with email systems and an intranet can disseminate useful information.
                                                                            2. Disadvantages
                                                                              1. All the services a network provides become unavailable if the network fails without adequate contingency in place.
                                                                                1. Devices that are required to build the network depend on the different topologies.
                                                                                  1. If a virus is introduced into a single workstation, then it can use the network to spread to the rest.
                                                                                    1. If the network is particularly busy, it may have a detrimental effect on the work that the user can do.
                                                                                Show full summary Hide full summary

                                                                                Similar

                                                                                Types and Components of Computer Systems
                                                                                Jess Peason
                                                                                Input Devices
                                                                                Jess Peason
                                                                                Output Devices
                                                                                Jess Peason
                                                                                Networks
                                                                                Will8324
                                                                                General ICT Quiz
                                                                                leahshaw
                                                                                ICT Revison Flash Cards
                                                                                Arun Johal
                                                                                FLAT FILE VS RELATIONAL DATABASE
                                                                                rosiejones
                                                                                Online World - Learning Aim A
                                                                                andysedge
                                                                                Business Aims and ICT Strategies
                                                                                scrt
                                                                                User Interfaces
                                                                                Skeletor
                                                                                General ICT Quiz
                                                                                Jade Fantom