Info systems design and development
Upcoming SlideShare
Loading in...5
×
 

Info systems design and development

on

  • 179 views

 

Statistics

Views

Total Views
179
Views on SlideShare
135
Embed Views
44

Actions

Likes
0
Downloads
1
Comments
0

2 Embeds 44

http://standardgradecomputing.blogspot.co.uk 34
http://standardgradecomputing.blogspot.com 10

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Info systems design and development Info systems design and development Presentation Transcript

  • Faculty of ICT
  •  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act
  • Computer Misuse Act  This law was created to make it illegal to:  Hack ◦ Gain unauthorised access into a computer system  Spread Viruses ◦ Send harmful code to other computers  Phish ◦ Pretend to be a company to steal to password information
  •      Copyright Designs and Patents Act This law was created to make it illegal to: Make unauthorised copies of music, movies or software Use multiple copies of software when you only have 1 license Steal someone’s idea, work etc when it is under copyright
  • Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act   Today’s Lesson Computing Laws ◦ Data Protection Act
  •  Data Protection Act ◦ This law was created to control the storage of personal information ◦ Data Controller  The company or person storing the information on the person ◦ The Data must be:  Accurate and kept up to date  Protected properly with a password  Relevant and only stored for the period it is required  Not sell the data on to other companies
  •  The Data User: ◦ The person who makes use of the personal information, for example, the secretary in a doctor’s surgery  The Data Subject ◦ The person that the information is about, for example, the patient in a doctor’s surgery ◦ The Data Subject can:  See the information held on them  Change any inaccurate information  Know why the data is being stored about them ◦
  • Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act   Today’s Lesson Health and Safety Regulations
  •  Main Health Problems ◦ Back problems ◦ RSI = repetitive strain injury ◦ Eye strain  The law states that an employer must: ◦ Provide adjustable screens, chairs and provide foot support ◦ Make sure lighting is suitable and provide antiglare filters for monitors ◦ Give employees adequate breaks ◦ Pay for eye tests ◦ Avoid trailing wires ◦ Have suitable heating ◦
  • Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act ◦ Health and Safety Regulations   Today’s Lesson Environmental Impact ◦ Carbon footprint
  •  Carbon Footprint = the amount of C02 you generate ◦ When using a computer system you are adding to carbon emissions ◦ Desktop = 110 watts ◦ LCD Monitor = 35 watts ◦ You are using electricity generated by fossil fuels  Minimising Carbon Footprint ◦ ◦ ◦ ◦ PCs on the markets that use 25 watts Low energy processor chips Automated power shutdown systems for out of hours Laptop usage rather than desktop  15-60 watt rather than 145 watt
  • Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act ◦ Health and Safety Regulations  Environmental Impact ◦ Carbon footprint   Today’s Lesson Security Risks ◦ Virus ◦ Worm ◦ Trojan Horse
  •  Viruses ◦ A piece of code that attaches itself to programs, makes copies of itself and destroys your system ◦ Ways of spreading  Downloaded from a website  Opened up from an email attachment  Infected backing storage device ◦ Symptoms of a virus     Data loss Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason
  •  Worms ◦ A program that finds gaps in your security, creates copies of itself and floods your system with unwanted data  Trojans ◦ A program that appears as if it is carrying out a task, for example, defragmenting your hard disk ◦ You download it thinking it is carrying out a harmless task and it causing hard, for example, deleting files or adding unwanted toolbars
  • Last Lesson  Security Risks ◦ Virus ◦ Worm ◦ Trojan Horse   Today’s Lesson Security Risks ◦ Keylogging Software ◦ Spyware ◦ DOS attacks
  •  Keylogging software ◦ A program that monitors user’s keystrokes and is often used to steal passwords, credit card numbers etc  Spyware ◦ Spyware programs gather information about you from your computer, for example which websites you visit. ◦ This data can be used to target you with specific marketing
  •  Denial of Service attacks ◦ A DOS attack is designed to cause problems on a network so that legitimate users cannot access resources, for example their online bank account ◦ Resource Starvation = using up network resources, for example processors or disk space on servers so that legitimate users can’t access resources ◦ Bandwidth Consumption = flooding the network with useless traffic, for example flooding an email server with useless data, making it crash ◦ Attacking Routers = corrupt PING attacks that stop Routers from working properly
  • Last Lesson  Security Risks ◦ ◦ ◦ ◦ ◦ ◦ Virus Worm Trojan Horse Keylogging Software Spyware DOS attacks   Today’s Lesson Securing Computers ◦ ◦ ◦ ◦ ◦ Passwords Encryption Biometrics Firewalls Anti virus software
  •  Passwords ◦ A list of characters that stops people accessing you data ◦ Disadvantage  You can forget them  Programs have been created that can test billions of different passwords each second, eventually guessing yours!!  Encryption  Biometrics ◦ Putting data into a code before transfer ◦ The hacker cant understand the data without having the key to decipher the code ◦ Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition
  •  Firewalls ◦ A program that checks all data coming in and out of a network ◦ The firewall decides which packets of data are allowed through to the destination address  Anti-virus software ◦ A program that has a database of known viruses ◦ The anti virus software compares sections of code to this database to identify and destroy viruses
  • Last Lesson ◦ Securing Computers      Passwords Encryption Biometrics Firewalls Anti virus software  Today’s Lesson ◦ Securing Computers  Security Protocols  Security Suites
  •  Security Protocols  Security suites ◦ A rule or agreement set up between the sender and receiver of data ◦ Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are 2 examples ◦ SSL and TLS both use encryption ◦ Groups of programs used to block threat to your computer      Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters
  • Last Lesson ◦ Securing Computers        Passwords Encryption Biometrics Firewalls Anti virus software Security Protocols Security Suites  Today’s Lesson ◦ Databases  Manual V Electronic storage  What is a Database?
  •  Electronic databases have a number of advantages over a manual database  You can have a backup copy  They take up less room  Faster to search for records  Email information to others = =
  •   A database is a program used to store data in a structured way Examples ◦ The Police National Database ◦ DVLA ◦ Inland Revenue ◦ Esporta Health Club
  • Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Today’s Lesson ◦ Databases  Files, Records and Fields  Data Types
  • FIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE FIRSTNAME RECORD = INFORMATION ON ONE PERSON OR ITEM DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE
  •   When creating a database you have to choose the data/field type depending on the data that is going to be stored Examples ◦ ◦ ◦ ◦ ◦ ◦ Text Number Date/Time Currency Yes/No OLE object
  • Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Today’s Lesson ◦ Databases  Simple/Complex searching
  •  I want to carry out a simple search on the field Favourite Hobby with the criteria Football
  •  I want to carry out a complex search on the field Surname with the criteria “Forbes” and on the field Fav Hobby with the criteria “Football”
  • Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Simple/Complex searching  Today’s Lesson ◦ Primary Key ◦ Index key
  •  Primary Key ◦ A primary keys allows you to make each record unique in a database ◦ Example  ID number or Account number  You may have 2 John Smith records but they would have different ID numbers  Foreign Key ◦ Foreign keys allow you to set up a relationship or link between 2 tables in a database ◦ Example  ID may be the primary key in the customer table and a foreign key in the book ordered table
  • Last Lesson ◦ Primary Key ◦ Index key  Today’s Lesson ◦ Computed Fields ◦ Validation
  •  A computed field will carry out a calculation on another field or fields and give you an answer
  •   Validation is checking that the correct information has been entered into the database Presence Check ◦ This checks that data has been entered and the field has not been left blank  Restricted Choice ◦ This presents the user with a choice they pick from  Field Length Check ◦ The specifies the number of characters that should be in each field  Field Range Check ◦ This specifies that range of numbers that can be stored e.g. > 0 and < 100
  •   I want to carry out a Simple Sort on Surname Ascending I want to carry out a Complex Sort on Surname Ascending following by Firstname Ascending