• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The article for my portfolio is http://news.bbc.co.uk/2/hi/uk_news/politics/8295863.stm. The Conservatives will "retrench" to a passport database when they scrap the ID scheme

Extracts from this document...

Introduction

Criterion A The article for my portfolio is http://news.bbc.co.uk/2/hi/uk_news/politics/8295863.stm. The Conservatives will "retrench" to a passport database when they scrap the ID scheme (Chris Grayling).A database is an integrated collection of logically related records or files consolidated into a common pool that provides data for one or multiple uses (Wikipedia). It usually consists of many fields, which arrange all the data stored in the data base. Examples of databases are clinical database, police databases, DNA data base. The information recorded in each database is 'indexed' according to what it describes or what the database is supposed to store. For example, a database could be about Books. The various fields of the database may include; the authors name, title of the book, ISBN number (International Standard Book Number) ...read more.

Middle

This became possible with the invention of the computer and the internet. Databases are now used to store almost everything now. The information they store now range from identification of individuals to information about books. Many companies and organizations use databases as a means of storage of their delicate information. In recent years, there has been an outburst in the rate of increase of security issues. Most of these usually involved hacking in some way. At this incredulous rate, everything that can be hacked is getting hacked. It is therefore necessary to protect the information that is stored from theft. Criterion C- Impact of the issue Employees and Organizations like Facebook, Twitter and Perfspot are important stakeholders in areas concerning databases. ...read more.

Conclusion

There will also be less information on the I.D cards as said above than usual. This would limit the amount of information that a hacker could extract. Criterion D To stop hacking from occurring, organizations could set up a security system for their databases. The systems should work like firewalls. They should prevent un-identified users from accessing the database. They should also be able to keep data of people who log into the system, why they logged into the system and also what time they logged on. This would help to keep tabs on every going on in the database incase there is a problem or an attempt by someone to hack the system. This would enable the company or organization to know what time the person tried it and use this to filter out people who logged in at that time. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. CAS IB Report #2

    And what is "genuine effort"? If people are only self-serving then there is no such thing. A billionaire who donates 10 million dollars to charity to help his taxes makes a far greater difference than one person volunteering their time to that charity.

  2. Dutch politics. Political parties are aiming for the same goals. The people in it ...

    Immigration/Integration: The PvdA is into receiving refugees, but they don't want too many foreigners. Immigrants has to adjust themselves, but they have the right to entitle to their own culture. Integration is something that the citizens has to do by themselves.

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Brian McBride, managing director of Amazon.co.uk, said the division offered customers the chance to buy staples such as washing powder and toilet roll in bulk, or shop for gourmet and organic products such as pheasant, partridge and wheels of cheese.

  2. ITGS portfolio Playstation news article. Too much playstation can be painful

    This function, as well as a memory card manager, can be accessed by starting the console without inserting a game, therefore accessing a system menu with a dark blue background and buttons that are designed like rainbow graffiti. If a game is put in the system at any time on the menu, the game will immediately start.

  1. The use of Twitter in the 3.11 Earthquake Tsunami Disaster

    However, Twitter reacted to this, and there were many users that tweeted lots about the tsunami. For example, @japantsunami, tweets about the situation in Japan, especially about the tsunami. This twitter account gave out much information about the current situation to the global users, and prevented misunderstanding of media and inaccurate information.

  2. ITGS Portfolio :: Frauds in online banking -review of a news article.

    [theage.com] ANZ warned its customers about the hacking of the online banking portal by a virus that saves personal details and sends them to the hackers.

  1. In this essay, I will explore how voters use credibility, an elites opinion, and ...

    Soft news programs covers the basic bottom line of issues, they do not go through the traditional political detail as hard news would. Information shortcuts save people effort in searching for facts. Party identification is an example of an information shortcut.

  2. ITGS portfolio Extension

    An important observation that has been made is that security measures can be taken by using higher standards of encryption, setting passwords for networks and not broadcasting the SSID name. Criterion P: Projection of Broader Implications Based On The Interview Wi-Fi technology is slowly replacing local area networks because it

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work