• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The article for my portfolio is http://news.bbc.co.uk/2/hi/uk_news/politics/8295863.stm. The Conservatives will "retrench" to a passport database when they scrap the ID scheme

Extracts from this document...


Criterion A The article for my portfolio is http://news.bbc.co.uk/2/hi/uk_news/politics/8295863.stm. The Conservatives will "retrench" to a passport database when they scrap the ID scheme (Chris Grayling).A database is an integrated collection of logically related records or files consolidated into a common pool that provides data for one or multiple uses (Wikipedia). It usually consists of many fields, which arrange all the data stored in the data base. Examples of databases are clinical database, police databases, DNA data base. The information recorded in each database is 'indexed' according to what it describes or what the database is supposed to store. For example, a database could be about Books. The various fields of the database may include; the authors name, title of the book, ISBN number (International Standard Book Number) ...read more.


This became possible with the invention of the computer and the internet. Databases are now used to store almost everything now. The information they store now range from identification of individuals to information about books. Many companies and organizations use databases as a means of storage of their delicate information. In recent years, there has been an outburst in the rate of increase of security issues. Most of these usually involved hacking in some way. At this incredulous rate, everything that can be hacked is getting hacked. It is therefore necessary to protect the information that is stored from theft. Criterion C- Impact of the issue Employees and Organizations like Facebook, Twitter and Perfspot are important stakeholders in areas concerning databases. ...read more.


There will also be less information on the I.D cards as said above than usual. This would limit the amount of information that a hacker could extract. Criterion D To stop hacking from occurring, organizations could set up a security system for their databases. The systems should work like firewalls. They should prevent un-identified users from accessing the database. They should also be able to keep data of people who log into the system, why they logged into the system and also what time they logged on. This would help to keep tabs on every going on in the database incase there is a problem or an attempt by someone to hack the system. This would enable the company or organization to know what time the person tried it and use this to filter out people who logged in at that time. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. CAS IB Report #2

    And what is "genuine effort"? If people are only self-serving then there is no such thing. A billionaire who donates 10 million dollars to charity to help his taxes makes a far greater difference than one person volunteering their time to that charity.

  2. The use of Twitter in the 3.11 Earthquake Tsunami Disaster

    However, Twitter reacted to this, and there were many users that tweeted lots about the tsunami. For example, @japantsunami, tweets about the situation in Japan, especially about the tsunami. This twitter account gave out much information about the current situation to the global users, and prevented misunderstanding of media and inaccurate information.

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    "EMR Advantages and Disadvantages." Bright Hub. 16 Dec 2008. 27 Sept 2010. <http://www.brighthub.com/health/technology/articles/7402.aspx> 3. Mollar, Katt. "Electronic Medical Records-The Pros and Cons." Submit Your Article. 11 Apr 2009. 20 Sept 2010. <http://www.submityourarticle.com/articles/Katt-Mollar-5424/electronic-medical-records-54667.php> 4. United States. U.S. Department of Health & Human Services. Health Information Privacy. 23 April 2009. 1 Oct 2010.

  2. Databases Portfolio

    Databases are differentiated according to their "model". Different database models function in different ways and are designed for different purposes. Earlier, in the 1980's the database models used most were the " hierarchical and network systems"[4]. This hierarchical database model can be visualized as an "upside down tree of data"[the

  1. Extended Essay: How do different Flavours, Storage Times affect the Effectiveness of Crisps as ...

    Oxidation results in the break down of lipids to fatty acids (as in rancidity, see below), these nutrients then leak out of the crisp, lowering energy values. Therefore, as the temperature increases, oxidation prevention is more efficient as substrate molecules gain more kinetic energy-fewer fatty acids will leak out, retaining a higher energy value.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Blakemore, Erin. "Online Grocery Shopping." Love to know. 3 Oct 2010. <http://online.lovetoknow.com/wiki/Online_Grocery_Shopping> 4. Webley, Kayla. "Online Shopping." Time. 16 July 2010. 3 Oct 2010. <http://www.time.com/time/business/article/0,8599,2004089,00.html> 5. "PayPal." PayPal. 3 Oct 2010. <https://www.paypal.com/cgi-bin/webscr?cmd=xpt/Marketing/securitycenter/buy/OnlineShoppingTips-outside> Amazon launches online groceries division as Ocado gears up for flotation Wednesday 7 July 2010 19.15 BST Internet retailer Amazon piled the pressure on Ocado today

  1. ITGS Portfolio :: Frauds in online banking -review of a news article.

    [theage.com] ANZ warned its customers about the hacking of the online banking portal by a virus that saves personal details and sends them to the hackers.

  2. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    The users of this network are increasing day by day. This technology makes it easier to connect to the Internet without any cables and wires. It is a wireless technology, which connects the device to the Internet. These have been set up in most of the hotels, cafes, schools, malls etc.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work