Unit 3
Wednesday, 25 June 2014
Sunday, 22 June 2014
Wednesday, 11 June 2014
operational issues (p3, m2)
Security of information: Is where information about a employee or customer is protected usually by the IT staff to prevent people who do not have access to the information being able to access the information. The IT department make sure that everyones personal information is non accessible to others who do not have access, by setting certain accounts to have access to the files that contain that information and sometimes by adding a password to the files, where the password is only known by the individual who the information is supposed to be accessible to.
As the owner of the information you are the only person who has the right to change any of the information so that it is up to date.
Backups
Back ups are where information is stored in a more reliable and less likely to lose area for example a back up server which all the information on the main server is backed up weekly, monthly, or daily- which is called the grand father, the father, and son system. If a businesses server goes down the back up server will have the most up to date information which then can be put onto the new server saving the previous information.
Health and safety
Health and Safety is where in the work place things have to particular precautions when doing taks or positioning anything in the workplace. For example when carrying heavy equipment you have to pick it up using your knees rather than you back or if your using a computer its recommend that you take breaks from using a computer to reduce damage or strain on the eyes.
Business continuance plan
Is where a plan is put into place where if the IT system is to fail or if there is any other problem such as a fire. For example if the network server was to be destroyed the IT department would back up the server regularly onto another server so if the server were to go down the IT department could easily change the server and use the back up data. In case of a fire at a business there is usually a continuance plan to meet up outside the building a register everyone who made it there so they can determine who is still in the building or not there that day.
Costs
As of costs it quite self explanatory, the business needs to have realistic spending costs for example if the IT department were spending to much on repairing a set of computers that kept shutting down they would make it more cost effective in the long run to invest money into new ones than spending excessive amounts of money into a hard to maintain set of computers.
There are two cost variables
Additional resources
Is the cost of new equipment such as hardware , computers and software it also entails training for staff. Usually it's smart for a department to have more equipment than is needed so that it is more cost effective in the long road. Also the cost of additional resources can also be the on going costs of running teh system such as electricity bills and Internet service provider fees.
Cost of Development
Is the costs of new computer systems this can be the new servers or computers or any other changes to a computer system. This also entails the on going costs of the system.
As the owner of the information you are the only person who has the right to change any of the information so that it is up to date.
Backups
Back ups are where information is stored in a more reliable and less likely to lose area for example a back up server which all the information on the main server is backed up weekly, monthly, or daily- which is called the grand father, the father, and son system. If a businesses server goes down the back up server will have the most up to date information which then can be put onto the new server saving the previous information.
Health and safety
Health and Safety is where in the work place things have to particular precautions when doing taks or positioning anything in the workplace. For example when carrying heavy equipment you have to pick it up using your knees rather than you back or if your using a computer its recommend that you take breaks from using a computer to reduce damage or strain on the eyes.
Business continuance plan
Is where a plan is put into place where if the IT system is to fail or if there is any other problem such as a fire. For example if the network server was to be destroyed the IT department would back up the server regularly onto another server so if the server were to go down the IT department could easily change the server and use the back up data. In case of a fire at a business there is usually a continuance plan to meet up outside the building a register everyone who made it there so they can determine who is still in the building or not there that day.
Costs
As of costs it quite self explanatory, the business needs to have realistic spending costs for example if the IT department were spending to much on repairing a set of computers that kept shutting down they would make it more cost effective in the long run to invest money into new ones than spending excessive amounts of money into a hard to maintain set of computers.
There are two cost variables
Additional resources
Is the cost of new equipment such as hardware , computers and software it also entails training for staff. Usually it's smart for a department to have more equipment than is needed so that it is more cost effective in the long road. Also the cost of additional resources can also be the on going costs of running teh system such as electricity bills and Internet service provider fees.
Cost of Development
Is the costs of new computer systems this can be the new servers or computers or any other changes to a computer system. This also entails the on going costs of the system.
Monday, 9 June 2014
Saturday, 7 June 2014
Code of Practice (p3, m2)
In order for companies to get optimal working ability and prevent ethical problems in the work place the companies create a code of practice for use of a computer in the organisation.
Examples of these practices are
Email
The code of practice prohibits the use of emails that contain verbal abuse directed at a staff member, using emails to harass staff members, spamming unimportant emails to people in the business, spamming emails to people it has nothing to do with. It also allows a small amount of private emails to be sent to friends, family and love ones but prohibits constant emailing to external sources.
Use of internet
The code of practice prohibits the browsing of inappropriate or the over use of personal websites. Inappropriate entails pornography, gambling, piracy websites and illegal purchasing websites, as over use of personal websites entails over using websites like Facebook or Steam while working. However most company web servers have blocking software on it to prevent viewing of these websites.
The encouragement of whistle blowing
Whistle blowing means that if anybody is misusing their use of the computer a large portion of the time and gets spotted doing this on a regular basis, the spotter is encouraged to tell management especially if it is the the people who enforce the code of practice or doing something illegal with in the work place. an example of this is when a CIA agent in the 1980s was selling drug evidence to make a profit when one of his work colleagues found out he reported it to his boss and the agent was arrested.
Examples of these practices are
The code of practice prohibits the use of emails that contain verbal abuse directed at a staff member, using emails to harass staff members, spamming unimportant emails to people in the business, spamming emails to people it has nothing to do with. It also allows a small amount of private emails to be sent to friends, family and love ones but prohibits constant emailing to external sources.
Use of internet
The code of practice prohibits the browsing of inappropriate or the over use of personal websites. Inappropriate entails pornography, gambling, piracy websites and illegal purchasing websites, as over use of personal websites entails over using websites like Facebook or Steam while working. However most company web servers have blocking software on it to prevent viewing of these websites.
The encouragement of whistle blowing
Whistle blowing means that if anybody is misusing their use of the computer a large portion of the time and gets spotted doing this on a regular basis, the spotter is encouraged to tell management especially if it is the the people who enforce the code of practice or doing something illegal with in the work place. an example of this is when a CIA agent in the 1980s was selling drug evidence to make a profit when one of his work colleagues found out he reported it to his boss and the agent was arrested.
Computer Misuse Act (p3, m2)
Is the act that was created to prevent computers from being used for hacking or causing havoc with malicious intent. The act was created to protect peoples private affairs and prevent total chaos for organisations who had been targeted by hackers the act is then reinforced by the data protection act which give individuals and companies the promise of no private information leaks.
A case of this act being broken is the organisation of the New of the World who were hacking into celebrities and prominent members of societies phone lines and computers in order to steal private information for news stories. However after the scandal was found out the a large amount of members in the organisation gained a prison sentence for breaking the computer misuse act and the Freedom of information act as well as the data protection act.
The act also protect companies digital products by making it illegal for distribution of digital pirated material. However only countries that have similar acts to this can prevent internet piracy as our country can only prevent the distribution here in the UK and can only block foreign websites.
There are three principles to the computer misuse act.
Unauthorised access to computer material: This principle means that accessing a persons personal information from their computer without authorisation and then looking at their information, stealing it, or deleting it, can result in 6 months imprisonment and a large fine.
Unauthorised access with intent to commit or facilitate a crime: This is similar to the first principle. However, the person who does not have access to the information is looking to commit a crime, this being stealing bank account information to gain money or stealing anything else they don't have access to and using it for their personal gain. The result of doing so can lead to five years imprisonment and once again a large fine.
Unauthorised Modification of computer material: This is also similar to the first principle. However, this principle is if the unauthorised person wishes to modify files or delete them from another user or even creating a computer virus for malicious intent to steal or destroy information and same as the last principle you can receive 5 years imprisonment.
A case of this act being broken is the organisation of the New of the World who were hacking into celebrities and prominent members of societies phone lines and computers in order to steal private information for news stories. However after the scandal was found out the a large amount of members in the organisation gained a prison sentence for breaking the computer misuse act and the Freedom of information act as well as the data protection act.
The act also protect companies digital products by making it illegal for distribution of digital pirated material. However only countries that have similar acts to this can prevent internet piracy as our country can only prevent the distribution here in the UK and can only block foreign websites.
There are three principles to the computer misuse act.
Unauthorised access to computer material: This principle means that accessing a persons personal information from their computer without authorisation and then looking at their information, stealing it, or deleting it, can result in 6 months imprisonment and a large fine.
Unauthorised access with intent to commit or facilitate a crime: This is similar to the first principle. However, the person who does not have access to the information is looking to commit a crime, this being stealing bank account information to gain money or stealing anything else they don't have access to and using it for their personal gain. The result of doing so can lead to five years imprisonment and once again a large fine.
Unauthorised Modification of computer material: This is also similar to the first principle. However, this principle is if the unauthorised person wishes to modify files or delete them from another user or even creating a computer virus for malicious intent to steal or destroy information and same as the last principle you can receive 5 years imprisonment.
Subscribe to:
Comments (Atom)