Recommending hardware and software for an ebay company.
Scenario
IBox is an Ebay shop run by the owner from their home office. The business sells a large variety of discounted electronic items to EBay bidders. The business has asked you to recommend a new computer system for them to purchase.
The business currently has a desktop PC with the following specification:
* 1.5 GHz Intel Pentium Processor
* 512 MB RAM
* 20 GB Hard Disk (2 GB free space)
* 15" Monitor
* 2 USB connections
* Floppy Disk Drive
* 16x DVD ROM Drive
The PC has the following peripheral devices:
* Mouse
* Keyboard
* Black and white inkjet printer
* 2 Mega pixel digital camera (with 512MB memory card)
* BT ADSL Modem
* Speakers
The PC has the following software installed:
* Microsoft Windows 98 Professional
* Microsoft Office 2000 Premium (incorporating: Word, Excel, Access, PowerPoint, Outlook, Publisher, FrontPage, PhotoDraw)
* Microsoft Internet Explorer 4.0
The aim of the required system is to be able to perform faster and produce a better working environment. The computer that is already in use is now so out of date. We know this by the way the company is still using floppy disk drive in today's society floppy disks don't exists any more. Also using a old spec computer to run a business of is so bad especially having only 2 GB of memory free on a 20Gb hard drive. Also to provide a flat screen monitor to reduce the risk of strain to the eye, on the other hand the computer's processor is below average spec and wouldn't be able to run to much programs and it would be very slow. Also the printer that the company Is using is really old. There for to provide the company with an all in one printer scanner and fax. The Bt ADSL Modem I would scrap and replace it with a BT package called BT Total Broadband Business. This package includes a free wireless router and also it comes with enhanced technical support. Also it gives you an option to have your very own web domain with a website creator. Then I would have another BT Line coming in to the house or home this enables you to keep you home personal line free and not having to give out your home number. With this free wireless router that is included you can have as many computers and Laptops as you like. All with internet access and also all of the computers and laptops can print from anywhere around the house.
The purpose of the required system is because the business uses the PC at least 6 days a week for work purposes during office hours; however the computer is used for personal use in the evenings.
The company uses internet explorer to enter descriptions of all the products sold on the EBay shop. The information is then copied into the EBay listing which includes photos from a digital camera.
Also the details are typed and saved into word processed documents is also another purpose.
The business also use a relational database system created in Microsoft Access which is used to store the details of buyers and items. This system is used to print a receipt which in enclosed with the buyer's purchase. Another purpose of this system is to be able to print.
Buyers are contacted by email to request payment and when their purchase has been despatched. The business typically makes 5-10 sales each day. This is another good purpose of the system because the business needs to make contact with customers.
The business accounts are kept on a spreadsheet file and updated weekly.
The PC is also used regularly for online banking.
The business owns a domain name and setting up a website advertising the online shop is a possibility for the future.
The business does not currently backup any of its files, use a firewall or anti-virus software.
The hardware required by the business would be:
Input and Output Devices:
Mouse and keyboard would be essential for the business because if they didn't have that they would be stuck and won't be able to anything without them. Also depending on machine the computer wont boot up if it does not detected that keyboard and mouse is not present. This I would recommend an wireless mouse and keyboard. I would recommend this as there would be less wires hanging from the computer. The all in one printer would be used to print out the spreadsheets and details of the buyers and items bought. Also it will be able to scan, copy, fax. Also it will tack up less room rather then having a separate printer and scanner. The wireless router would be used for there internet so they can use the internet for work purposes. Also with the wireless router the business can link the printer up to the router.
In the scenario it states that the company has a 2 mega pixel digital camera with 512MB of memory which for one it does not give a good picture and secondly to run a business like the company it is not very good as the memory would not be enough. I personally would up grade to either a 7.5 mega pixel camera with at least 2 GB memory. The company will need a digital camera because there are going need to take good quality pictures of their products that they are selling if they are going to put the images on web. Digital cameras have all the features of a normal camera (E.G. Zoom, Focus, Shutter Speed E.C.T) but the image is digitised and saved to memory card or to a minidisk inside the camera. The quality from the higher resolution cameras rivals the resolution of a 35mm slide. Most digital camcorders are now also able to capture still images. The images are stored on a videotape or on memory modules such as the Sony memory stick. Digital cameras use variety of methods to transfer the stored images to a pc, such as USB, serial and infrared links. Others use removable storage such as floppy disks or CD - R Disk.
Networking
As I have mentioned in the aim, purpose and input and out put I have been mentioning about wireless. For the new computer I would have a wireless card installed in side the computer with an Arial with a wire coming from the computer. With the wireless router installed and you have working internet then you can go by setting up your home network and adding printers or other computers/laptops.
Processor
The processor consists of 1.5GHz Intel Pentium so It doesn't have a good amount of processor power to run the application and software they need to use for there work. I would recommend a processor of at least 2GHz. The 512MB Ram in the old computer. I would recommend at least 2GB of ram.
Storage Devices
It has got 2 USB connections to attach a memory stick to the PC if they wished and any other removable hardware. This would be replaced on
up-to-date computers to 4 or 6 round the back of the machine and two at the front. The 16x DVD ROM Drive would be used to backup the data on the computer with the details of the buyers and items sold. The PC have got a 20GB hard drive with only 2GB free space so they cant really store all the data of the buyers and all of the items that have been sold. This I would recommend a hard drive at least 120GB. The processor is the brains of the computer because it is where most of the calculations take place.
In order for the computer to work it has to temporarily store the programme and data in an area where it can be used by the computer's processor. This area is known as the computers memory or sometimes as primary storage. The memory chips consist of a large number of cells, each having a fixed capacity for storing data and each has a unique location or address. This type of memory is known as RAM. RAM stands for random access memory it's contents are volatile. This means that the programme and the data that is held in the memory is lost when the computer is switched off.
CD / DVD ROMS
The computer CD player works in a similar way to an ordinary CD player, except that the data that is read is computer data instead of audio data. The disks used with CD players can store around 650 MBYTES of data, which is equivalent to about 500 high - density floppy disks. The disks are removable and are not easily damaged. The only draw back is that the basic system only reads data from a disk to computer. Read and write systems are available but are more expensive. DVD disks works in a similar way but store much data (typically 4.7 GB)
Operating system
I would recommend Windows Vista Home premium or ultimate as a suitable operating system for the business because it runs a lot better and depending on the processor is much faster and more reliable to use. This operating system comes complete with
* Windows media centre
* 5 Games
* any many more extras
Home premium I would say is the best operating system for the company and it is at the most reasonable price.
This table is comparing the other vista operating system and listing all the features ...
This is a preview of the whole essay
Operating system
I would recommend Windows Vista Home premium or ultimate as a suitable operating system for the business because it runs a lot better and depending on the processor is much faster and more reliable to use. This operating system comes complete with
* Windows media centre
* 5 Games
* any many more extras
Home premium I would say is the best operating system for the company and it is at the most reasonable price.
This table is comparing the other vista operating system and listing all the features that come with that operating system.
Features
Home Basic
Home Premium
Business
Ultimate
Suggested Retail Price
£108.62
£141.20
£162.89
£173.75
Most secure Windows ever...
Most secure Windows ever with Windows Defender and Windows Firewall
Quickly find what you need...
Quickly find what you need with Instant Search and Windows Internet Explorer 7
Elegant Windows Aero experience...
Elegant Windows Aero desktop experience includes glass-like menu bars, Windows Flip 3D, and Live Thumbnails
Best choice for laptops...
Best choice for laptops through features like Windows Mobility Centre and Tablet PC support
Share documents and collaborate...
Share documents and collaborate with Windows Meeting Space
Use a secondary screen on your mobile PC...
Use a secondary screen on your mobile PC or extend your display to other devices using Windows SideShow
All-in-one media center functionality...
All-in-one media center functionality makes any room a media room using Windows Media Center and Media Center Extenders
Protect against hardware failure...
Protect against hardware failure with Windows Complete PC Backup and Restore
Scan, fax, and receive documents and images...
Scan, fax, and receive documents and images with Windows Fax and Scan
Automatically back up your files...
Automatically back up your files with Scheduled Backup
Remotely access your business resources...
Remotely access your business resources and applications with Remote Desktop Connection
Easier networking connectivity...
Easier networking connectivity helps you stay connected wherever and whenever you like with the Network and Sharing Center
Better protect your data against loss...
Better protect your data against loss with Windows BitLocker Drive Encryption
Easily make DVDs...
Easily make DVDs with Windows DVD Maker
Have more fun on your PC...
Have more fun on your PC with three new premium games: Chess Titans, Mahjong Titans, and InkBall
Create high-definition movies...
Create high-definition (HD) movies with Windows Movie Maker in HD
From this table I am certain that Home Premium is the better value of money because it comes with quite a few features but here is the main feature that the company are going to benefit from.
Automatically back up your files
* The file backup and restore features in Windows Vista make it easier for you to keep your data safe from user error, hardware failure, and other problems.
* The Windows Backup and Restore Centre gives you the user one place to manage all backup and restore features.
Automatically back up your files with Scheduled Backup
* Depending on the version of Windows Vista you have, there are two approaches you can take to backing up files: Automatic Backup, which backs up just your files and data; or Complete PC Backup, which backs up everything on your PC, including the operating system and applications
Most secure Windows ever - Windows Defender
* Windows Defender works with Internet Explorer 7 to help you make conscious choices about software installed on your PC by providing always-on protection that monitors key system locations, watching for changes that signal the presence of spy ware.
Most secure Windows ever Windows Firewall
* Windows Firewall is a critical first line of defense to protect your computer against many types of malicious software.
* Properly configured, it can stop many kinds of malware before they can infect your computer or other computers on your network. Windows Firewall, which comes with Windows Vista, is turned on by default and begins protecting your computer as soon as Windows starts.
Windows Internet Explorer 7
* Windows Internet Explorer 7 in Windows Vista, the new version of the popular web browser, represents a major step forward in making everyday web tasks easier.
Making everyday tasks easier
* To help you perform tasks more productively and efficiently, Internet Explorer 7 has been redesigned with new and enhanced capabilities for searching and making use of myriad sources of information.
Application Software
Microsoft office 2000 premium is ok but I would use Microsoft office 2003 or Microsoft office 2007 which on Microsoft office 2007 it has more tools and better template designs but is more complicated then Microsoft office 2003.
Microsoft office 2007 comes with
• Microsoft Office Access 2007
• Microsoft Office Excel 2007
• Microsoft Office Outlook 2007 with Business Contact Manager
• Microsoft Office PowerPoint 2007
• Microsoft Office Publisher 2007
• Microsoft Office Word 2007
Microsoft office 2003 comes with
• Microsoft Office Access 2003
• Microsoft Office Excel 2003
• Microsoft Office Outlook 2003
• Microsoft Office PowerPoint 2003
• Microsoft Office Publisher 2003
• Microsoft Office Word 2003
Microsoft office 2003 is hard to get hold off nowadays so the only option I can think off is Microsoft office 2007 and you get on a training course or get a book about Microsoft office 2007.
I would then download internet explorer 8 the reason why I would do this is so you don't need to open up too many internet explorers you just open up new tabs which would make the computer run faster because the more programmes running the slower the computer runs.
Microsoft Office Word - word processing otherwise known as word has fixed facilities to enter text, modify it, move it around, format it (E.G. make it or underlined or italics), check It for grammar and spelling errors E.C.T. These facilities of word processors have extended from simple text processing to handling other contents such as tables, charts and graphs.
It's usefulness to organisations has been enhanced by it's ability to use templates for standard letters and invoices. Word is mainly used for writing reports and general letters.
However, it has evolved into a powerful tool for creating websites, compiling mail shots and mailing lists.
Microsoft Office Access - There are a load of packages the one that most people would know of is Microsoft Access this software would be used for customer management systems, stock control systems, payroll systems, ordering systems and so on.
Microsoft Office Excel - this software provides the tools for entering text, numeric values and formulae into a matrix of cells to create a computational model for delivering specific calculations.
The data is held in the spreadsheet's rows and columns and the contents can be sorted (E.G. into alphabetic or numeric order). Also the contents can be searched to find a particular value and can also be filtered (E.G. to find out which rows have products with a zero VAT rating) the results can be displayed as a set of figures or they can be displayed pictorially using 2-D or 3 - D charts.
Microsoft Office Outlook- this software is a Personal Information Manager that is made up primarily of the following components:
The Mail component lets you send, receive and manage email messages. Messages can be sent to other users on your network, or to external contacts with a valid email address, and can include file attachments, shortcuts and hyperlinks to web pages.
The Calendar is used to keep track of appointments and plan meetings with other Outlook users. On a personal level, it can be used to record appointments, events and important dates such as birthdays and anniversaries. On a group level, it can be used to schedule and track meetings with other users at a time convenient to all involved.
The Contacts area is used to maintain address information for all internal and external contacts. The contact list can be used to send messages to contacts, view contact web pages, view maps to the contact's place of work and to record important contact dates such as birthdays.
Additional Components
Tasks provide to-do lists comprising jobs that can be assigned to other users, tracked and scheduled in your calendar. You can check the status of a task, set a priority for each task, and set tasks that recur at specific intervals.
Outlook can also be used to record notes for any textual information. Notes can be posted on your desktop as constant reminders and can be forwarded to other users or included in word processing documents.
The Journal allows you to record interactions with customers by tracking email messages, meetings, tasks and other items such as Word documents and Excel spreadsheets. Telephone conversations and non-computer related work can also be recorded.
Photoshop - A graphics editing program developed and published by Adobe Systems. It is the current and primary market leader for commercial bitmap and image manipulation. Photoshop is the flagship product of Adobe Systems.
Photoshop CS4 is the current version it was officially announced on 23 September 2008.
Photoshop revolves around editing pixels, unlike Adobe Illustrator which uses vectors. When an image is rendered into Photoshop, it is compiled by millions of single-coloured pixels. This would be an excellent package for the company as they can edit their pictures with this software for example crop, adjust colour, red eye removal.
The better the quality of pictures the better quality on the website.
Antivirus
Antivirus scanning software, or a virus scanner, is a program which examines all files in specified locations and looks at the contents of memory, the operating system, the registry, unexpected program behaviour, and anywhere else relevant with the intention of identifying and removing any malware.
When the antivirus software looks at a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified. If a piece of code in the file matches any virus identified in the dictionary, then the antivirus software can take one of the following actions:
* Attempt to repair the file by removing the virus itself from the file; quarantine the file (such that the file remains inaccessible to other programs and its virus can no longer spread)
* Delete the infected file.
I would recommend AVG free which you can download for free and it dose not cost anything.
Task 2
Dell Studio Hybrid N1073502
Dell Studio Hybrid D101G10
Base
Intel(r) Core(tm) 2 Duo Processor T8100 (2.1GHz, 800MHz FSB, 3MB L2 Cache
Intel(r) Core(tm) 2 Duo Processor T8100 (2.1GHz, 800MHz FSB, 3MB L2 Cache
Microsoft Operating System
Genuine Windows Vista(r) Home Premium SP1, 32-bit -English
Genuine Windows Vista(r) Home Premium SP1, 32-bit -English
Microsoft Application Software
Microsoft(r) Office 2007 Home and Student/ English - Microsoft(r) Word, Excel, One Note, PowerPoint
Microsoft(r) Office 2007 Home and Student/ English - Microsoft(r) Word, Excel, One Note, PowerPoint
Enhanced Service Packs
Year Limited Warranty - Collect & Return
Year Limited Warranty - Collect & Return
Colour Choice
Jet Black Colour with Matte Finish
LCD
7 Widescreen WXGA+ CCFL (1440x900) TFT Display with True Life(tm)
22in E228wfp Widescreen UK/Irish (1680 X 1050) TC099 DVI-D
Memory
4096MB 667MHz Dual Channel DDR2 SDRAM [2x2048]
4096MB 667MHz Dual Channel DDR2 SDRAM [2x2048]
Web Camera
2.0 Mega pixel Integrated Web Camera - CCFL
x
Hard Drive
320GB (5.400rpm) SATA Hard Drive
320GB (5.400rpm) SATA Hard Drive
Video Card
Intel Integrated Graphics Media Accelerator X3100
Intel Integrated Graphics Media Accelerator 3100
Optical Devices
Fixed Internal 8X DVD+/-RW Slot Load Drive including Software
DVD+/- RW Drive
Mouse
Dell(tm) Bluetooth Travel Mouse
Wireless Keyboard and mouse
Primary Battery
Primary 9-cell 87 WHr Lithium Ion battery
Keyboard
Internal UK English Qwerty Keyboard
AS MOUSE
Biometric Identification
Biometric Fingerprint Reader Standard [Included in Price]
X
Cables
Meter Power Cord (3 Wire) - UK
Meter Power Cord (3 Wire) - UK
Shipping Documents
English - Documentation Studio 1735
English - Documentation inspiron Desktop
Standard Warranty
Yr Limited Warranty - Collect & Return
Yr Limited Warranty - Collect & Return
Power Supply
90W Power Adapter (3 Wire)
65W AC Adapter (3 Wire)
Dell System Media Kit
Studio 1735 Resource DVD (Diagnostic & Drivers)
Dell Printers
Dell(tm) All-in-One Printer V305w [Included in Price]
Dell(tm) All-in-One Printer V305w [Included in Price]
Printer Driver
Dell V305 FI Printer Drivers for all Dell systems
Dell V305 FI Printer Drivers for all Dell systems
Cables
USB 2.0 3m Black Printer Cable
USB 2.0 3m Black Printer Cable
Printer Ink Cartridges
Dell V305 Standard Colour Ink Cartridge
ell V305 Standard Colour Ink Cartridge
Base
Dell All-In-One Wireless Inkjet Printer V305 (order with system)
Dell All-In-One Wireless Inkjet Printer V305 (order with system)
Carrying Cases
Targus Campus XL Backpack for laptops up to 17" - Black
x
Accessories
Pentax Optio M40 Digital Compact Camera - Easy to use and high resolution of 8.0 megapixels
Pentax Optio M40 Digital Compact Camera - Easy to use and high resolution of 8.0 megapixels
Bluetooth
Dell Wireless 370 Bluetooth Module
x
Wireless Networking
Dell Wireless 1397 Mini Card (802.11 b/g)
Dell (tm)Wireless 1505 Wireless-N Minipci Card EUR
USB Memory Keys
Lexar JumpDrive FireFly USB Flash Drive - 4GB
x
Adobe
Adobe(r) Photoshop(r) Elements 6 (English)
Adobe(r) Photoshop(r) Elements 6 (English)
Accidental Damage Support
3Yr Accidental Damage Support
3Yr Accidental Damage Support
Online Backup
DataSafe Online Backup 100GB
DataSafe Online Backup 50GB
Protect your new PC
Norton(tm) Internet Security(tm) 2008 3 year Version
x
Which One Out Of the Two Specs Which One I Would Chose And Why I Would Recommend?
Depending on the company for time being the Dell Studio Hybrid D101G10 will do the company fine, however later on the company might consider investing into a laptop that is why I have chosen one laptop and one pc.
However as the company is small the computer would be beneficial.
Task 3
Task 4
"Configure applications software".
Task 7
Term
Definition
Backup
Back up consist of copied data this can be all of data or parts of data stored on your computer. The copied data can be copied to portable hard ware such as hard drive, CD / DVD R/W or even to a memory stick for small files.
Backups are useful primarily for two purposes. The first is to restore a state following a disaster (called disaster recovery). The second is to restore small numbers of files after they have been accidentally deleted or corrupted.
Archive
Archive refers to a collection of historical records, and also refers to the location in which these records are kept. In the company's case afer shipping out an order the details of that order are keept safe in an archive incase any complaints come through.
Full backup
Full back up is the starting point for all other backups and contains all the data. This is a good starting point as the company as not backed up any of files.
Incremental backup
An incremental back takes on full copy of the filing system, and then only records the changes that you make. This would benefit the company once they have initially done a full back up and then an incremental backup. This would have to be every night. All the files that have been edit or created that day would be backed up.
Grandfather Father Son (rotation backup)
It refers to the most common rotation scheme for rotating backup media. Originally designed for tape back up. It is rotated on a daily basis with one graduating to father status each week. The weekly or Father backups are rotated on a weekly basis with one graduating to Grandfather status each month. Often one or more of the graduated backups is removed from the site for safekeeping and disaster recovery purposes. This strategy provides the company with the ability to restore data from the last week, plus any Monday over the last month, plus any month for as many monthly CD'S as you have. Variations on this scheme are available, and provide a trade-off between the number of tapes required, and the number of monthly CD'S available.
Hard disk
Hard disc is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. The company will store all the customer records on this and all files relating to company.
USB memory
The most common use of flash drives is to transport and store personal files such as documents, pictures and videos. Individuals also store medical alert information on MedicTag flash drives for use in emergencies and for disaster preparation. The company may not need to use this as the company has only one computer and it would be pointless. The company may use one but only for back up.
CD-RW
A type of CD that can be recorded similar to CD-R but can be recorded over again. The CD drive can rewrite over what was on the disk before.
The company would benefit from this as an option to back up files also it would com in handy if some one wanted a hard copy of what they brought over a certain period.
DVD-RW
DVD+RW is a re-recordable format similar to CD-RW. The data on a DVD+RW disc can be erased and recorded over numerous times without damaging the medium. This is another option for back up company documents and files for later use and it would cut down on hard disk usage.
Recommendation for a suitable backup procedure for them
I recommend Incremental back up - this will only back up the files that have been changed, added, deleted since last back up. This is helpful as the business has new and existing clients every day and the business is keeping records on their system. The media I would use for this is an external hard drive as it can store more and it will only take up less space then loads of CD / DVD - RW. The company would need to back up every night as they have got clients coming and going and loads of orders so there for I am suggesting every night.
Once the data has been backed up rename the folder with an suitable name e.g. 01/01/08mon this can be done for incremental back up and full back up.
Finally I would store the external hard drive in a fire proof safe during the day and once back up is complete.
As the company has not backed up files before I would recommend that the company does a full back up. This I would do on the external hard drive as later on it will only back up files that have been changed.
Task 7
Term
Definition
Encryption
Encryption is a process which is applied to text messages or other important data, and alters it to make it humanly unreadable except by someone who knows how to decrypt it. The complexity of the algorithms used means that a strongly encrypted message might require thousands of years of processing by very fast computers to break the encryption. The most popular use of encryption is for securing web servers that are accessed by the https protocol not http so that data such as credit cards can be sent safely over the internet.
Hacker
A general term used for anyone who spends time poking into computers and operating systems, trying to discover their vulnerabilities.
Cracker
someone who looks for and breaks into computers or networks without authorization, either for the fun of it or to steal valuable information such as credit card numbers; also called a "black hat" hacker.
Virus
A virus is a small program that piggybacks on e-mail and program files. For example, a virus might attach itself to a program or a game. Each time the program is opened the virus runs and can infect other programs or damage your computer. Some viruses move around through e-mail then replicate by automatically mailing to the victim's entire e-mail address book. Never open an e-mail attachment unless first scanned through anti-virus software.
Trojan
A Trojan Horse is the name of another type of virus, which is simply a computer program that masks as another program. Trojan Horses are sent as an e-mail file attachment. For example, it may claim to be a game, but once opened, can cause damage to your computer, from erasing files to changing your desktop. It then sends itself to other people in your address book to propagate itself.
Worm
A worm virus is a small program that searches through networks to find security holes to replicate itself from machine to machine. Worms use up computer time, space, and speed when replicating, with a malicious intent to slow or bring down entire web servers and halt Internet use.
Logic Bomb
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as the salary database), should they ever leave the company.
Phishing
Spoofing is organizations that lure users into giving up sensitive data it is a favourite technique among security fraudsters. In a common phishing scam, users receive a look-alike e-mail message purportedly from a trusted institution like their bank, alerting them to an urgent need. Users follow the embedded link to a convincing site that requires them to sign in using account information.
Spyware
Ad ware is a software application in which advertising banners or pop ups are displayed on your computer screen while the program is running. Software that also includes codes to track a user's personal information, which is then passed on to third parties without the user's knowledge, is called Spy ware. The Spy ware programs are typically bundled with other freeware or shareware programs that are downloaded from the Internet. Spy ware is like a Trojan horse computer infection because it is installed when users install something else.
In addition to being annoying, pop ups caused by ad ware and spy ware programs slow system performance, using memory and system resources that can lead to system crashes and instability. Ad ware and Spy ware programs invade your online privacy and are considered other forms of identity theft. The programs may have the ability to monitor keystrokes, scan files on your hard drive, change your default homepage on your browser, and relay information about your web visits for marketing purposes.
Firewall
A firewall designed to prevent unauthorized electronic access to a networked computer system.
Anti-virus Software
Anti-virus Software is designed to prevent the threats of dangerous viruses and hackers getting in to your machine by getting a software package.
Anti-spam Software
It prevents the receiving of unsolicited emails. These types of software examine the header of an email and checks to see if it is safe to open or not.
The Computer Misuse Act
Relates to multiple unauthorised computer uses.
Unauthorised access to computer material
Unauthorised use of a computer with the intent to commit or facilitate a commission of a crime
Unauthorised modification of computer material
Punishable with six months prison sentence or £2000 fine, both is also possible.
Biometric Measures
Biometric refers to authentication techniques that rely on measurable physical characteristics that can automatically be checked. For example a thumb login scanner would only let the people DNA/ fingerprint it holds in to the machine.
Write a recommendation to the business explaining suitable security measures they should take to protect their data. Your report should include:
* The risks of not securing their data
* Guidelines for creating & using passwords
* The types of security software they should use
* The importance of updating software
How to recognise hoax emails
The risks of not securing data are you are going to lose it this can be done intentionally or through no fault of your own. Not securing you data is one of the most common ways of data going missing. Also to prevent this from happening then they should back up by incremental back up. Also more security feature is to create passwords this could include documents which only can be read and write by the person who created the password. This would benefit the company as they hold a lot of confidential data. One thing that I can say with passwords is don't use any thing easy like name of your dog, your name, date of birth.
A password should be strong here how to make a strong password
Make it lengthy, Combine letters, numbers, and symbols, The fewer types of characters in your password, the longer it must be, Use the entire keyboard, Use words and phrases that are easy for you to remember, but difficult for others to guess.
Password strategies to avoid
Avoid sequences or repeated characters, Avoid using only look-alike substitutions of numbers or symbols, Avoid your login name.
I would also recommend an antivirus such as AVG as it is free and it automatically
updates it's self.
Another security that can be placed is running up dates on all software that is being used. This would be essential to the company as they receive so many email orders and they use the internet quite a lot for their business.
How to recognise hoax email
Task 8
Term
Definition
Local area network
Local area network otherwise known as LAN is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport.
Router
A router allows connectivity to one or more computers it is also helping to create a network. For home users, these are particularly useful for taking a single broadband internet account, and spreading it to at least two or more computers. Standard routers require the internet connection from a standalone modem, but modem-routers are increasing in popularity, which can be plugged into any broadband-enabled phone line, reducing cable clutter, and only taking up one power socket. Wireless routers work in a same way as a regular wired router connected by an Ethernet cable known as CAT 5. with the wireless router the Ethernet cable would not have to run form the computer and the router as long as there is a wireless network Card in the computers that you want connected to the internet.
Wireless routers generally have four ports to connect Ethernet cable as well this can be used for Peripherals e.g printer, one pc that is used as a server. This would be benificual for the company as they hold a lot of data.
Network Interface Card
A network card is a piece of computer hard ware designed to allow computers to communicate over a computer network. It is also part of the OSI model layer1.
Hub
Mbps (megabits per second)
Bandwidth
Peer to peer (network)
Peer to Peer Networks allow users to share files resources and shared files on other computers can be accessed.
All Peer to Peer computers are equal and all have the same abilities to use the resources available on the Network
Client server (network)
Client-server allow the network to centralise functions, the file servers provide access to resources and security.
Each Client-Server connected to a network is also referred to as nodes.
Fibre optic cable
Fibre optic cables transmit light instead of electric signals which stops the problem with electrical interference; it is also the standard for connecting networks between buildings. Fibre optic can also transmit signals over longer distances than Coaxial.
. Write a recommendation to the business explaining what type of network would be suitable for the company and what equipment they need to buy.
2. Now that the company has a network explain what further security must be put into place.
As the
Network security
Computer security is the process of preventing and detecting unauthorized use of your
computer. Prevention measures help you to stop unauthorized users (also known as
"intruders") from accessing any part of your computer system. This detection helps you to
determine whether or not someone attempted to break into your system, if they were
successful, and what they may have done.
The security risks involved in networking varies from a lot of things.
Intruders (also referred to as hackers, attackers, or crackers) may not care about your
identity. They only want to gain control of your computer so they can use it to launch attacks
on other computer systems.
After obtaining control of your computer it gives them the ability to hide their true location as
they launch attacks, often against high-profile computer systems such as government or
financial systems. Even if you have a computer connected to the Internet only to play the
latest games or to send email to friends and family, your computer may be a target.
Intruders are able to watch all your actions on the computer, or cause damage to your
computer by reformatting your hard drive or changing your data. Also they can see what you are typing and what websites that you have been looking at. The most annoying thing that
they can do is use your computer to commit fraud in your name.
To help prevent this from happening you have to have reliable virus protection software and
firewalls to stop Trojans and hackers from gaining control. Also using other security such as
passwords and usernames to help prevents un-authorized access to your accounts and
computer. The virus protection that I would recommend is AVG which I think is really reliable.
A bad type of antivirus is MCFEE which I think is a virus it self. This is my own opinion and
others may think different.
Backing up files is essential encase of computer failure and hackers. These are the items you
can use to copy your files onto; CD-R, DVD+-R, tape, hard drives (internal and external),
online, and flash drives.
Also you will need to choice a back-up program. For personal computers, there are many
options. If you are using Microsoft Windows, there is a back-up program built in
(Start>Programs>Accessories>System Tools>Backup). You can also use third party back-up
managers, ranging from small programs to full online backup services
~Also to help minimise risks keep your back-ups in a safe place away from environmental
hazards. Depending on how important it is, fire safes and safety deposit boxes are great
place to keep back-up media. If they are not very critical, filing cabinets or desks are fine.
You will need a firewall as well as an antivirus to help prevent problems occurring whilst
networking, a firewall is a dedicated appliance, or software running on another computer,
which inspects network traffic passing through it, and denies or permits passage based on a
set of rules this is an essential to help prevent computer corruption.
Also access control whilst network iD is another essential as it helps prevent un-authorised access.
Craig waters OCR Level 2 National In ICT 15/12/2008
Unit 13: IT Systems & User Needs