Info systems design and development

664 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
664
On SlideShare
0
From Embeds
0
Number of Embeds
125
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Info systems design and development

  1. 1. Faculty of ICT
  2. 2.  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act
  3. 3. Computer Misuse Act  This law was created to make it illegal to:  Hack ◦ Gain unauthorised access into a computer system  Spread Viruses ◦ Send harmful code to other computers  Phish ◦ Pretend to be a company to steal to password information
  4. 4.      Copyright Designs and Patents Act This law was created to make it illegal to: Make unauthorised copies of music, movies or software Use multiple copies of software when you only have 1 license Steal someone’s idea, work etc when it is under copyright
  5. 5. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act   Today’s Lesson Computing Laws ◦ Data Protection Act
  6. 6.  Data Protection Act ◦ This law was created to control the storage of personal information ◦ Data Controller  The company or person storing the information on the person ◦ The Data must be:  Accurate and kept up to date  Protected properly with a password  Relevant and only stored for the period it is required  Not sell the data on to other companies
  7. 7.  The Data User: ◦ The person who makes use of the personal information, for example, the secretary in a doctor’s surgery  The Data Subject ◦ The person that the information is about, for example, the patient in a doctor’s surgery ◦ The Data Subject can:  See the information held on them  Change any inaccurate information  Know why the data is being stored about them ◦
  8. 8. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act   Today’s Lesson Health and Safety Regulations
  9. 9.  Main Health Problems ◦ Back problems ◦ RSI = repetitive strain injury ◦ Eye strain  The law states that an employer must: ◦ Provide adjustable screens, chairs and provide foot support ◦ Make sure lighting is suitable and provide antiglare filters for monitors ◦ Give employees adequate breaks ◦ Pay for eye tests ◦ Avoid trailing wires ◦ Have suitable heating ◦
  10. 10. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act ◦ Health and Safety Regulations   Today’s Lesson Environmental Impact ◦ Carbon footprint
  11. 11.  Carbon Footprint = the amount of C02 you generate ◦ When using a computer system you are adding to carbon emissions ◦ Desktop = 110 watts ◦ LCD Monitor = 35 watts ◦ You are using electricity generated by fossil fuels  Minimising Carbon Footprint ◦ ◦ ◦ ◦ PCs on the markets that use 25 watts Low energy processor chips Automated power shutdown systems for out of hours Laptop usage rather than desktop  15-60 watt rather than 145 watt
  12. 12. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act ◦ Health and Safety Regulations  Environmental Impact ◦ Carbon footprint   Today’s Lesson Security Risks ◦ Virus ◦ Worm ◦ Trojan Horse
  13. 13.  Viruses ◦ A piece of code that attaches itself to programs, makes copies of itself and destroys your system ◦ Ways of spreading  Downloaded from a website  Opened up from an email attachment  Infected backing storage device ◦ Symptoms of a virus     Data loss Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason
  14. 14.  Worms ◦ A program that finds gaps in your security, creates copies of itself and floods your system with unwanted data  Trojans ◦ A program that appears as if it is carrying out a task, for example, defragmenting your hard disk ◦ You download it thinking it is carrying out a harmless task and it causing hard, for example, deleting files or adding unwanted toolbars
  15. 15. Last Lesson  Security Risks ◦ Virus ◦ Worm ◦ Trojan Horse   Today’s Lesson Security Risks ◦ Keylogging Software ◦ Spyware ◦ DOS attacks
  16. 16.  Keylogging software ◦ A program that monitors user’s keystrokes and is often used to steal passwords, credit card numbers etc  Spyware ◦ Spyware programs gather information about you from your computer, for example which websites you visit. ◦ This data can be used to target you with specific marketing
  17. 17.  Denial of Service attacks ◦ A DOS attack is designed to cause problems on a network so that legitimate users cannot access resources, for example their online bank account ◦ Resource Starvation = using up network resources, for example processors or disk space on servers so that legitimate users can’t access resources ◦ Bandwidth Consumption = flooding the network with useless traffic, for example flooding an email server with useless data, making it crash ◦ Attacking Routers = corrupt PING attacks that stop Routers from working properly
  18. 18. Last Lesson  Security Risks ◦ ◦ ◦ ◦ ◦ ◦ Virus Worm Trojan Horse Keylogging Software Spyware DOS attacks   Today’s Lesson Securing Computers ◦ ◦ ◦ ◦ ◦ Passwords Encryption Biometrics Firewalls Anti virus software
  19. 19.  Passwords ◦ A list of characters that stops people accessing you data ◦ Disadvantage  You can forget them  Programs have been created that can test billions of different passwords each second, eventually guessing yours!!  Encryption  Biometrics ◦ Putting data into a code before transfer ◦ The hacker cant understand the data without having the key to decipher the code ◦ Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition
  20. 20.  Firewalls ◦ A program that checks all data coming in and out of a network ◦ The firewall decides which packets of data are allowed through to the destination address  Anti-virus software ◦ A program that has a database of known viruses ◦ The anti virus software compares sections of code to this database to identify and destroy viruses
  21. 21. Last Lesson ◦ Securing Computers      Passwords Encryption Biometrics Firewalls Anti virus software  Today’s Lesson ◦ Securing Computers  Security Protocols  Security Suites
  22. 22.  Security Protocols  Security suites ◦ A rule or agreement set up between the sender and receiver of data ◦ Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are 2 examples ◦ SSL and TLS both use encryption ◦ Groups of programs used to block threat to your computer      Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters
  23. 23. Last Lesson ◦ Securing Computers        Passwords Encryption Biometrics Firewalls Anti virus software Security Protocols Security Suites  Today’s Lesson ◦ Databases  Manual V Electronic storage  What is a Database?
  24. 24.  Electronic databases have a number of advantages over a manual database  You can have a backup copy  They take up less room  Faster to search for records  Email information to others = =
  25. 25.   A database is a program used to store data in a structured way Examples ◦ The Police National Database ◦ DVLA ◦ Inland Revenue ◦ Esporta Health Club
  26. 26. Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Today’s Lesson ◦ Databases  Files, Records and Fields  Data Types
  27. 27. FIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE FIRSTNAME RECORD = INFORMATION ON ONE PERSON OR ITEM DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE
  28. 28.   When creating a database you have to choose the data/field type depending on the data that is going to be stored Examples ◦ ◦ ◦ ◦ ◦ ◦ Text Number Date/Time Currency Yes/No OLE object
  29. 29. Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Today’s Lesson ◦ Databases  Simple/Complex searching
  30. 30.  I want to carry out a simple search on the field Favourite Hobby with the criteria Football
  31. 31.  I want to carry out a complex search on the field Surname with the criteria “Forbes” and on the field Fav Hobby with the criteria “Football”
  32. 32. Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Simple/Complex searching  Today’s Lesson ◦ Primary Key ◦ Index key
  33. 33.  Primary Key ◦ A primary keys allows you to make each record unique in a database ◦ Example  ID number or Account number  You may have 2 John Smith records but they would have different ID numbers  Foreign Key ◦ Foreign keys allow you to set up a relationship or link between 2 tables in a database ◦ Example  ID may be the primary key in the customer table and a foreign key in the book ordered table
  34. 34. Last Lesson ◦ Primary Key ◦ Index key  Today’s Lesson ◦ Computed Fields ◦ Validation
  35. 35.  A computed field will carry out a calculation on another field or fields and give you an answer
  36. 36.   Validation is checking that the correct information has been entered into the database Presence Check ◦ This checks that data has been entered and the field has not been left blank  Restricted Choice ◦ This presents the user with a choice they pick from  Field Length Check ◦ The specifies the number of characters that should be in each field  Field Range Check ◦ This specifies that range of numbers that can be stored e.g. > 0 and < 100
  37. 37.   I want to carry out a Simple Sort on Surname Ascending I want to carry out a Complex Sort on Surname Ascending following by Firstname Ascending

×