3. Computer Misuse Act
This law was created to make it
illegal to:
Hack
◦ Gain unauthorised access into a
computer system
Spread Viruses
◦ Send harmful code to other computers
Phish
◦ Pretend to be a company to steal to
password information
4.
Copyright Designs and Patents Act
This law was created to make it illegal to:
Make unauthorised copies of music, movies
or software
Use multiple copies of software when you
only have 1 license
Steal someone’s idea, work etc when it is
under copyright
5. Last Lesson
Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
Today’s Lesson
Computing Laws
◦ Data Protection Act
6.
Data Protection Act
◦ This law was created to control the storage
of personal information
◦ Data Controller
The company or person storing the information on the
person
◦ The Data must be:
Accurate and kept up to date
Protected properly with a password
Relevant and only stored for the period it is
required
Not sell the data on to other companies
7.
The Data User:
◦ The person who makes use of the personal
information, for example, the secretary in a doctor’s
surgery
The Data Subject
◦ The person that the information is about, for example,
the patient in a doctor’s surgery
◦ The Data Subject can:
See the information held on them
Change any inaccurate information
Know why the data is being stored about them
◦
8. Last Lesson
Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
◦ Data Protection Act
Today’s Lesson
Health and Safety
Regulations
9.
Main Health Problems
◦ Back problems
◦ RSI = repetitive strain injury
◦ Eye strain
The law states that an employer must:
◦ Provide adjustable screens, chairs and provide foot support
◦ Make sure lighting is suitable and provide antiglare filters
for monitors
◦ Give employees adequate breaks
◦ Pay for eye tests
◦ Avoid trailing wires
◦ Have suitable heating
◦
10. Last Lesson
Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
◦ Data Protection Act
◦ Health and Safety
Regulations
Today’s Lesson
Environmental
Impact
◦ Carbon footprint
11.
Carbon Footprint = the amount of C02 you
generate
◦ When using a computer system you are adding to
carbon emissions
◦ Desktop = 110 watts
◦ LCD Monitor = 35 watts
◦ You are using electricity generated by fossil fuels
Minimising Carbon Footprint
◦
◦
◦
◦
PCs on the markets that use 25 watts
Low energy processor chips
Automated power shutdown systems for out of hours
Laptop usage rather than desktop
15-60 watt rather than 145 watt
12. Last Lesson
Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
◦ Data Protection Act
◦ Health and Safety
Regulations
Environmental
Impact
◦ Carbon footprint
Today’s Lesson
Security Risks
◦ Virus
◦ Worm
◦ Trojan Horse
13.
Viruses
◦ A piece of code that attaches itself to programs,
makes copies of itself and destroys your system
◦ Ways of spreading
Downloaded from a website
Opened up from an email attachment
Infected backing storage device
◦ Symptoms of a virus
Data loss
Keyboard malfunctioning
Strange display on monitor
Hard drive spinning for no reason
14.
Worms
◦ A program that finds gaps in your security, creates
copies of itself and floods your system with
unwanted data
Trojans
◦ A program that appears as if it is carrying out a
task, for example, defragmenting your hard disk
◦ You download it thinking it is carrying out a
harmless task and it causing hard, for example,
deleting files or adding unwanted toolbars
16.
Keylogging software
◦ A program that monitors user’s keystrokes and is
often used to steal passwords, credit card numbers
etc
Spyware
◦ Spyware programs gather information about you
from your computer, for example which websites
you visit.
◦ This data can be used to target you with specific
marketing
17.
Denial of Service attacks
◦ A DOS attack is designed to cause problems on a
network so that legitimate users cannot access
resources, for example their online bank account
◦ Resource Starvation = using up network resources, for
example processors or disk space on servers so that
legitimate users can’t access resources
◦ Bandwidth Consumption = flooding the network with
useless traffic, for example flooding an email server
with useless data, making it crash
◦ Attacking Routers = corrupt PING attacks that stop
Routers from working properly
19.
Passwords
◦ A list of characters that stops people accessing you data
◦ Disadvantage
You can forget them
Programs have been created that can test billions of different
passwords each second, eventually guessing yours!!
Encryption
Biometrics
◦ Putting data into a code before transfer
◦ The hacker cant understand the data without having the
key to decipher the code
◦ Using physical characteristics to allow access to a
system, for example, finger print, retina, voice, face
recognition
20.
Firewalls
◦ A program that checks all data coming in and out of
a network
◦ The firewall decides which packets of data are
allowed through to the destination address
Anti-virus software
◦ A program that has a database of known viruses
◦ The anti virus software compares sections of code
to this database to identify and destroy viruses
22.
Security Protocols
Security suites
◦ A rule or agreement set up between the sender and
receiver of data
◦ Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) are 2 examples
◦ SSL and TLS both use encryption
◦ Groups of programs used to block threat to your
computer
Anti-virus
Anti-spyware
A firewall
Identify theft protection
Spam Filters
23. Last Lesson
◦ Securing Computers
Passwords
Encryption
Biometrics
Firewalls
Anti virus software
Security Protocols
Security Suites
Today’s Lesson
◦ Databases
Manual V Electronic
storage
What is a Database?
24.
Electronic databases have a number of
advantages over a manual database
You can have a backup copy
They take up less room
Faster to search for records
Email information to others
=
=
25.
A database is a
program used to store
data in a structured
way
Examples
◦ The Police National
Database
◦ DVLA
◦ Inland Revenue
◦ Esporta Health Club
26. Last Lesson
◦ Databases
Manual V Electronic
storage
What is a Database?
Today’s Lesson
◦ Databases
Files, Records and
Fields
Data Types
27. FIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE
FIRSTNAME
RECORD =
INFORMATION
ON ONE
PERSON OR
ITEM
DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE
28.
When creating a database you have to
choose the data/field type depending
on the data that is going to be stored
Examples
◦
◦
◦
◦
◦
◦
Text
Number
Date/Time
Currency
Yes/No
OLE object
29. Last Lesson
◦ Databases
Manual V Electronic
storage
What is a Database?
Today’s Lesson
◦ Databases
Simple/Complex
searching
30.
I want to carry out a simple search on the
field Favourite Hobby with the criteria
Football
31.
I want to carry out a complex search on the
field Surname with the criteria “Forbes” and
on the field Fav Hobby with the criteria
“Football”
32. Last Lesson
◦ Databases
Manual V Electronic
storage
What is a Database?
Simple/Complex
searching
Today’s Lesson
◦ Primary Key
◦ Index key
33.
Primary Key
◦ A primary keys allows
you to make each
record unique in a
database
◦ Example
ID number or Account
number
You may have 2 John
Smith records but they
would have different ID
numbers
Foreign Key
◦ Foreign keys allow
you to set up a
relationship or link
between 2 tables in a
database
◦ Example
ID may be the primary
key in the customer
table and a foreign key
in the book ordered
table
34. Last Lesson
◦ Primary Key
◦ Index key
Today’s Lesson
◦ Computed Fields
◦ Validation
35.
A computed field will carry out a
calculation on another field or fields and
give you an answer
36.
Validation is checking that the correct
information has been entered into the database
Presence Check
◦ This checks that data has been entered and the field has
not been left blank
Restricted Choice
◦ This presents the user with a choice they pick from
Field Length Check
◦ The specifies the number of characters that should be in
each field
Field Range Check
◦ This specifies that range of numbers that can be stored
e.g. > 0 and < 100
37.
I want to carry out a Simple Sort on Surname
Ascending
I want to carry out a Complex Sort on Surname
Ascending following by Firstname Ascending