IT Security Threats to Users and Businesses.

Threats Unauthorised access: Internal & External There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system. Access causing damage to data or jamming resources e.g viruses People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system. Accessing systems or data without damage; e.g phishing, identity theft, piggybacking, hacking Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an

  • Word count: 1950
  • Level: AS and A Level
  • Subject: ICT
Access this essay

ICT in Retail and the advantages to the shop and the customer.

Online shopping 22/11/11 When an item is scanned through the till, the price is received through a Local Area Network, from the database. The data received from the database is outputted with a screen, to show the customer what they've purchased. The information of what the customer has purchased is then sent to the companies HQ via a Wireless area network, to tell them what their customers are buying. If the price needs to be altered, it can be done so easily. For example, with manual methods, if an item needs to be altered, you have to change the price of every single item. However, with automated methods you can change the database to the correct price, then, once it's scanned through the till, the correct price is received from the database. You must also change the price on the shelf as customer's can grow angry if it's misleading to the customer. The benefit of this is that you can easily alter the price of one product on all items. However, if the system/database grows bugs/glitches then it may lead to the wrong prices being outputted. This means that you may be losing money as you're selling goods for much cheaper than originally proposed. Just-in-time stock is where you can re-order stock just before it has all been sold. This is good because it improves cash flow as you don't have order large quantities of stock, and keep it in a store room. You are buying and

  • Word count: 1536
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Setting up a new system (installing software and hardware)

As you can see this is my desktop screen before I have changed any settings and made any changes to the system. Here I clicked on the start menu and then I have selected "control panel" to enter the systems controls. Here I am able to do a number of things including: * Changing mouse settings * Creating user accounts and setting user types eg. Administrator etc. * Date and time settings * Network connections Etc. This is the control panel. As you can see there are a lot of things that you can set or change. All of these options allow you to alter the appearance and functions of the computer. By selecting this "date and time" icon you are navigated to he date and dialogue. This option will allow you to change the settings and appearance of your date and time. This is the date and time dialogue. As you can see there are three tabs for you to select; Date & Time; Time Zone; Internet Time. You can set the date by clicking the desired date on the calendar. You are able to navigate through the months by clicking on the dropdown menu and selecting the month you want and the scroll menu to select the year you want. To adjust the time you simply click on the Digital display, then click on the hours (highlighted in blue) and then use the up and down roll arrows to select the hour you want. You follow the same procedure to adjust the minutes also. Any adjustments

  • Word count: 1750
  • Level: AS and A Level
  • Subject: ICT
Access this essay

I had to create an event driven application for the company Kris Arts Media, in order for them to be able to have a working calculator that provides their customers with a brief estimation on how much the cost will be to print out certain brochures

P4 implement a working event driven application to meet defined requirements Control Property Property Settings Form Name Text Kris Art and Media Ltd FormKAML Group Box Text Printing Radio Button Name Text rdoBandW Black and White Radio Button Name Text rdoGreyscale Greyscale Radio Button Name Text rdofullC Full Colour Text Box Name Text blank Text Box Name Text blank Text Box Name Text blank Group box Text Paper Radio Button Name Text rdoMattS Matt Stock Radio Button Name Text rdoGlossS Gloss Stock Text Box Name Text blank Text Box Name Text blank Group box Text Graphic Label Text txtillustration Label Text txtbaw Label Text txtCP Text Box Name Text Text Box Name Text Text Box Name Text Group Box Text Other Check Box Name Text Label Name Text Text Box Name Text Button Name Text Text Box Name Text 2.2 - Data Storage Furthermore, the need for storage space will not be required within this event driven programme, additionally, the user will be able to use the calculator to gain an estimated quote, however there will not be a need for the company, "Kris Arts" to store the data for future reference, seeing as the event driven programme is only an estimation 2.3 - Action/Event Table Action Event User makes a basic selection No event happens User clicks a button

  • Word count: 676
  • Level: AS and A Level
  • Subject: ICT
Access this essay

User Guide

User Guide Contents Page Number Section Heading Page 03 Intended User and Skill Level Page 03 System Requirements Page 04 Installation Guide Page 05 Getting Started Page 06 Using the System Page 10 Backing Up The System Page 10 Printing a Document Page 11 Frequently Asked Questions Intended User and Skill Level Name of Company: Mastercare (division of Dixons PLC) Area of company where system is needed: Service Engineers, Office Staff Job titles of prospective users: Electrical Engineers, Customer Service Advisor Computer skills of users: The computer skills of the users of the system are adequate enough to utilize the system without the need of any training other than being shown how the system works and a user manual to refer to when problems occur during use of the system. The office staff and the engineers that will be using the new system have basic computer skills that include previous work using database, word processing and spreadsheet packages to a non-advanced level. The users who will operate the new system have some experience of data input as it has been used frequently for a long time but they have no experience of advanced database programming. System Requirements The following system requirements are the minimum requirements that will enable the software and the system to run on a computer. Although these are the minimum requirements to run

  • Word count: 2429
  • Level: AS and A Level
  • Subject: ICT
Access this essay

explain how legislation relating to ICT affects Logo's R Us

Explain how legislation relating to ICT affects Logo's R Us Data Protection Act (1998) Any organisation that needs to store data, must inform the information commissioner. The principles of which Logo's R Us should follow are: . Data may be collected and processed fairly and lawfully. 2. Data may be collected and used only for one or more specific and lawful purpose 3. Data must be adequate, relevant and not exclusive for the purpose 4. Data must be accurate and up to date 5. Data must not be kept longer than necessary 6. Data must be processed in accordance with the rights of the data subjects 7. Data must be kept secure against unauthorised or unlawful processing and accidental loss, damage or destruction. * Simple database- they need to make sure that all the customer details etc are secure within the system and that only they have access to this. * The sales manager is responsible for securing sales for the company. They would be responsible for keeping customers details etc safe. * If the Sales order processing clerks get an order wrong, the sales manager would be the one to sort it out. The sales order processing clerk would also have to be safe with the customer details and orders. Copyright, Design and Patents Act (1980) This act is to stop other companies from steeling each others ideas. * A team of designers design new garments each season. They have

  • Word count: 1063
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Topic 8 - Development Methods

Topic 8 - Development Methods Linear methodology - systems development methodology where the project is divided into sequential phases where one phase is completed before the next one starts. Iterative methodology - attempts to solve a problem by finding successive approximations to the solution starting from an initial guess. Iteration means the act of repeating a process usually with the aim of approaching a desired goal or target or result. Each repetition of the process is also called iteration and the result of the last iteration is used as a starting point for the next iteration. System Investigation/Feasibility Project definition: Is identifying the problem that needs to be solved using ICT and then stating what the problem is in clear terms by writing a project definition. Aims & Objectives of the New System: Is the definition that will be stating aims and objectives of new system. These might include: * Being able to accurately predict delivery dates for customer orders. * Reducing number of input errors. * Reducing the number of part deliveries by having a much more efficient and accurate stock control system. Cost Benefit Analysis: Being able to create a new system with stated aims and objectives at reasonable cost, this is called a feasibility report, where the costs and benefits are weighed up. Initial Fact Find: Will give information on what is required

  • Word count: 1173
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Individual in society

Task 1 Introduction The access to information that has been created by the World Wide Web has been a huge effect on society and how individuals live their lives. Moreover, because of the huge volume of information available, finding information the information you need is not is always not straightforward. In this task I have been asked to use my internet skills to identify websites that could identify possible mobile phone service providers. About how be finding out what is a search engines, how do they work, how they work and all the different types of search engines they are. To do this I will have to find out as much information I can about search engines by using different resources. I will also use and try many search engines to find relevant information to prove/disprove my five hypothesis. The information am looking for should be a paragraph. I will be looking for the best possible package, including free minutes and texts and a good choice of available mobile phone models, r alternatively choose a pay as you go tariff. I will also report it back to him with the finding of the research as well as conducting some financial analysis which should give him an indication of values for money. Search Engines A search engine is the program that searches documents for specified keywords and returns a list of the documents where the keywords were found. Although search

  • Word count: 4388
  • Level: AS and A Level
  • Subject: ICT
Access this essay

FEB 2009 hi-tech news

2009 hi-tech news There were a few major events that happened recently. One of the most interesting things of the week was that the new iPhone 3G has finally been cracked by a Russian hacker group - Dev Team.1 They have presented to the first day of 2009 special software, thank to which iPhone 3G from Apple can work in networks of any GSM-operator. Use of the patch which has received name Yellowsn0w, is possible only for iPhone with an official version 2.2 from Apple. Hackers-developers describe " the small program " as absolutely harmless - the end user will not notice anything besides that phone quite successfully works with a SIM-card of the other mobile operator. The program easily uninstalls, and most iPhones don't get damaged or affected negatively at all. The other rising issue is that the beta version of windows seven has now been spread by Russian hackers and millions of testers are testing it out.2 However officially, there are 7 Microsoft testers and they were asked to describe what has changed...3 On the first look, it seems like the desktop hasn't changed at all but this feeling is faulty, in reality the structure has changed significantly. Most think that the changes were good, but most of them are just little things, but not something important. For example, the "Seven" if it sees that you are from Russia, it would put a picture of Kremlin on desktop4 and

  • Word count: 805
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Different Purposes for which an Organisation uses ICT.

Different Purposes for which an Organisation uses ICT Organisations use ICT in many different ways and it is a valuable asset to companies as it allows various tasks to be completed quicker, also communication is made easier as e-mail allows letters, pictures, drawings and messages to be sent within seconds or minutes as opposed to days by the regular postal service. Those are very brief descriptions of a small amount of uses that organisations have for ICT, here is a more in depth look at the uses of ICT in organizations. Communication Communication is a major factor of ICT usage by companies and organizations. It is vital for companies to be able to send and receive up to date information swiftly. A major part of this comes through the use of e-mail (electronic mail); this is basically a modern day version of the postal service and allows the sending and receiving of documents all around the world to take place within seconds or minutes as opposed to days, which is a major key to success in most modern day businesses. Companies can use this to send mail quickly to another part of the company or even a customer and get feedback quickly from anywhere in the world, this can be seen in customer service departments of organisations as this allows the customer to send an e-mail and gain the information needed quickly and also allows the company to help the customer or act on

  • Word count: 925
  • Level: AS and A Level
  • Subject: ICT
Access this essay