When you get a question about an information system, you should always consider the four components in your answer: people; data; equipment (which includes hardware and software); and procedures. Without any one of them, data processing is either pointless or impossible.
Networking
Network hardware
Designing networks
Data security
Network protocols (Ethernet)
Task: Define and explain the following. Find images of each to assist with your explanations.
Remember that LANs are geographically limited in size, typically within a hundred metres or so in breadth. (e.g. a college LAN)
A WAN can stretch across a city, state, country or the globe, and is typically made up of connected LANs (e.g. all the branches of the ANZ bank across Australia and New Zealand).
The internet is what you get when WANs interconnect.
A network in the global environment means the internet. The real questions here are why and how organisations and individuals gather and supply data. What are the reasons behind this and what systems are in place to keep data secure.
Refer to the "web-sites" PP at the bottom of the page an complete independent research to answer the following questions:
Task:
1. Why organisations acquire data via websites?
2. why individuals and organisations supply data via websites
3. Techniques for acquiring data on websites
4.Techniques for protecting the rights of individuals and organisations supplying data
Task: Watch the video and make relevant study notes
Task: Watch the video and make relevant study notes
Task: Compare wired and wireless network configurations and comment on transfer rates, cost and reliability.
Is one system better that the other.
Task: Copy and complete the following table:
List as many mobile devise that can be coronet to a network that you can think of.
What the can do, what are their limitations and what might the future hold.
Device
Tablet
PDA
Gaming console
Mobile phone
Image
Capabilities/uses
Calendars
Portable & Light
Many have QWERTY keyboards built in
Limitations
Future direction
Seem to be getting bigger and exponential
increase in computing power
Security threats to data and information communicated and stored within networks.
Network security is, and will be, one of the most crucial challenges facing the global society.
Security issues can be broadly defined into the flowing categories. You should have a clear understanding of internet security issues not only for this unit but to protect yourself.
PP "threats" attached.
DELIBERATE ACTIONS
•Viruses / worms
•Trojans
•Rootkits
•Malware = Adware, spyware
•Theft of computers and data
•Espionage
•Hackers
•Disgruntled employees
•Denial of Service attacks
•Phishing
•Internet scams
ACCIDENTAL ACTIONS
•Incompetent employees
•"Misplaced" data
•Natural disasters
TECHNICAL FAILURE
•Hardware failure (e.g. hard disk crash, file server failure)
•Operating system failure
•Software failure
TASK: Define EACH of the above threats.
Choose 3 risks from the "Deliberate Actions" list, 1 from "Accidental Actions" and 1 from "Technical Failure" and expand further. Include examples, images, case studies, technical details and actions that could be taken to prevent this kind of threat.