Posts

Showing posts from 2024

Public Sector Accessibility Regulations 2018

Public Sector Accessibility Regulations 2018 Features that a defined for accessibility include, subtitles, which can be used by anyone especially those who have impaired hearing. Enlarged text which is used for people who have impaired eyesight. Some of the situations that are listed in the guidelines include a video not having subtitles, having poor colour contrast making it hard to see things in certain situations, not having clear ways to navigate a website. Some examples of providing accessibility features would be being able to enlarge texts, being able to dub different languages, and being able to have subtitles. Test Yourself (WCAG) Two of the principles of the WCAG include making things perceivable (so providing things like text for images so screen readers can work, and make content able to work on various displays). Another principle is operable (making sure that a website can be use by a keyboard and mouse and making sure that the website doesn’t trigger things like seizures...

The considerations and value of meeting customer and end user needs within a a business context

Value of meeting customer and end user needs Happy and satisfied customers and end users will stay with a business over a long period of time. That should be the goal for any business. Ensuring that customer expectations are not only met, but exceeded, means that they will buy products and services from a business again and again. Increased financial benefit Happy customers are customers who will stay with a business. They will also promote the business by talking to friends, family and posting positive comments on social media. Retaining customers who repeat buy from a business means an increase in revenue. Gaining new customers through positive in revenue. Gaining new customers through positive recommendations will also increase revenue. User Experience As previously mentioned, it is important that customers and end users have a positive experience when interacting with the business, their systems, products and services. If the customers and end users have a good experience, they wil...

VLANS

Image
Vlans in Cisco Packet Tracer We setup a network topology We then added a Vlan into the network called 192.168.20.1

Summary of Digital Resilence and Case study of Copeland

A summary of the methods used to implement digital resilience Installation of software updates/upgrades Replacement and removal of hardware Adding redundancy into systems Decommission and remove legacy hardware and software Device hardening: Removing unneeded applications, ports permissions and access Limiting user account functions Maintaining effective back-up systems: On-premises Off-site/remote Cloud Appropriate and reviewed standard operating procedures (sops) Structured staff training for: New hardware/software Staff inductions New and updated policies and procedures A summary of the methods used to implement digital resilience Risk analysis of digital system's resilience Planning for disruption scenarios Planning for disruption scenarios Planning disaster recovery and conducting recover exercises Documenting lessons learnt and incorporating resilience in the continuous improvement part of the lifecycle (ITIL) A summary of the benefits to the organization of being digitally r...

Feedback on presentation

Feedback from Patrick Consider an introduction of your presentation (Including individual presentation) Less contents on your slides Avoid misconception Check spellings and font size Conclude with asking for questions Feedback from Me
Freedom of Information Act 2000 This act deals with access to information It sought to support the right of access; that is the right to access information on any topic from any public authority The FoI Act applies to all public authorities including schools, health trusts, the police and other government agencies The information commission office remains responsible for overseeing the FoI act The Office of the Information Commissioner oversees the FoI act The type of information that can be requested includes  printed documents, computer files, letters, emails, photographs, and sound or video recordings Information that will be withheld includes anything to do with national security, personal data, commercial interests. National security: information supplied by, or relating to, bodies dealing with security matters. A certificate signed by a Minister of the Crown is conclusive proof that the exemption is justified. Computer Misuse Act 1990 The Focus of the act was to criminalise t...

Digital Environments Key Terms

Electromagnetic interference : This is the disruption of electronic operations and electronic operations and electronic devices from electronic emissions. EMI travels in waves and can cause devices to malfunction (which can result in dangerous outcomes) Radio frequency interference : This unwanted signals in the radio frequency spectrum used by  Wi-Fi networks (most commonly 2.4GHz and 5Ghz). Some other electronic devices use the same radio waves as Wi-Fi networks. This causes the prevention of the transmission of data and can create delays and performance degradation. External bus : Sometimes referred to as the expansion bus. This is a connection between a computer and external devices. Application Specific Integrated Circuit (ASIC) : A microchip designed for a specific application such as a handheld digital device or as a transmission protocol. Field Programmable Gate Array (FPGA) : An integrated circuit consisting of internal hardware blocks. The hardware blocks have user-progra...

The types, services and benefits of cloud computing

Cloud computing refers to the outsourcing of IT services and infrastructure, making them accessible remotely via the internet. Utilizing cloud computing models can boost productivity and provide organisations with a competitive edge. There are four different categories of cloud models These are: Public - These are used by a range of end-users ranging from large organisation to an individual. They can be accessed through a digital device with an internet connection. To be able to access and use a public cloud, users must pay a subscription or on a pay-to-use basis   Private - These are used by a specific organisation and can be hosted on site premises or remotely through virtualisation. Access to a private cloud is restricted by a firewall which is managed by the organisation. A private cloud requires that the organisation installs and maintains infrastructure including hardware, software and networking components. Community - A community cloud is one that is designed for and used b...
Further Research Task 1. The IPA is also known as the snooper's charter 2. The UK government oversees the IPA and how it is used in theory, but in practice it is British intelligence agencies. 3. Interception - This relates to the accessing of communication, including telephone, email and any type of messaging, during transmission Interference - This relates to the accessing of electronic equipment, including digital devices and smartphones, so obtain communication data Retention - This means that all internet connection records have to be achieved for 12 months 4. Equipment interference can be carried out by downloading data from a phone or installing something like key logging software which will enable security agencies to track every key that is imputed by the user. 5. In the IRC records, things like information around messages sent or posted, websites visited are archived by the internet service providers. Government security agencies such as the police, GCHQ, ministry of d...
  The types of services and benefits of cloud computing    Cloud computing refers to IT services and infrastructure, making them accessible remotely via the internet. Utilizing cloud storage can help companies get an edge compared to others. There are multiple different versions of cloud storage:  . Public – these are used by a range of users including individuals in large corporations. However, you usually need to pay for a subscription to use public cloud services. It's usually hosted by a cloud vendor, e.g. AWS.   . Private – these are usually hosted by a by an organization and can be hosted on site or remotely via virtualization. They are usually protected by a firewall. A private cloud also requires an organization to implement and maintain infrastructure to host it.   . Community – designed to be used by a group of organizations working in a particular industry. By using this type of cloud system in the financial industry, it makes it easier...
How can an employer Protect their Employees based on the Health and Safety Four things that a companies can do to make sure that employees are safe at work is that they can analyze workstations and assess and reduce risks, plan work so that there are breaks or changes in activity, and they can arrange and pay for eye tests and glasses if they are needed for work.   A display screen equipment (DSE) assessment is a process to evaluate the ergonomics and safety of a workstation where employees use devices like computers, laptops, or any equipment with a screen. It also includes making sure that an employee's desk is adapted to ensure comfort and productivity. This would include having an adjustable seat, desk space, glasses if needed, etc.   A healthy work environment ensures that a workplace is free from hazards, weathe that is physical or from its employees. This would be done by making sure that the workplace is clean, and there are no hazards that can hurt someone. It's also ...

How do different legislations affect IT infrastructure and its operations

How do different legislations affect IT infrastructure and its operations The Health and safety act was originally enacted after an inquiry by Lord Robens towards the end of Harold Wilson's First Government.  The Health and Safety at Work Act 1974 is the main piece of legislation covering health and safety in the workplace. It outlines the responsibilities of both the employer and employee in ensuring there is a safe working environment. An example of this  would be that e mployers are responsible for maintaining a safe working environment, including displaying warning signs.  Employee Responsibilities To take reasonable care of your own and others safety Not to interfere or misuse anything has been provided for your health and safety such as safety equipment.  To report any illness or injury that will affect your ability to work.  To cooperate with your employer by undergoing training, wearing protective clothing and by following health and safety policies Empl...

Virtualisation/cloud services enabling scaling and elastic computing solutions

Image
Types of virtualisation Server virtualisation - Enables one physical server to run multiple operating servers as virtual machines. The benefits are:  - more efficient use if IT equipment - faster workload distribtion - better application operation - improved server access  - reduced operating costs Network virtualisation - reproduces the physical network requirements as a virtual network to allow applications to run in exactly the same way as on the physical network but with logical rather than physical ports, devices, routers, firewalls and so on. Desktop virtualisation - enables organisations to provide software configured for the specific needs of the particular workplace or individual. Any changes or upgrades can be rolled out quickly and easily from the IT department to all relevant locations. It also allows easy rollout to mobile or remote workers who may be using iOS, Android, Windows or any other permitted operating system. Cloud solutions enabling elastic computing so...

Digital Inclusion

Digital Inclusion 1. Minority Groups are one group that could be excluded from digital spaces due to bias and racism. As well as any with a proacted characteristic. 2. More people in rural areas are often less connected then people who live in urban areas, this is being mitigated by programs like the B4RN 3.  4. Digital Exclusion has often come with significant problems, some people may not be able to get there voice heard by those who need it. For example if you cannot access the internet then  UK Digital Strategy 2024-2030 1. The Government can shape the digital enabling environment through establishing fair and progressive policy, regulation and legislation to govern rights, privacy, competition, safety, security as well as drive digital skills development. The private sector can utilize innovative, inclusive technology and business models to facilitate affordable last-mile connectivity, address issues relating to cost of data and devices. Academia can help analyze and incr...

How data is transferred between network devices using the OSI seven-layer model

Application Layer This provides applications with the means to access the services of the other layers and defines the protocols used by the applications to exchange data. The most widely known protocols are used for the exchange of user information are as follows: HTTP - Hypertext transfer protocol FTP - File transfer protocol  TELNET - Used for logging on remotely to networks. SMTP - Simple Mails Transfer Protocol The following protocols are used to assist in the management and use of TCP/IP networks: DNS - Domain Name System RIP - Routing Information protocol (Used for example by routers to exchange routing information on an IP network) SNMP - Simple Network Management Protocol (Used for example to collect and exchange network management information) Transport Layer This Layer is responsible for providing the application layer with session and datagram communication services. The main protocols are:   TCP - Transmission Control Protocol. This provides a one-to-one communica...

Diversity Part 2

When to take action against discrimination An individual could take action if they feel they have been discriminated against. The action could be to. Complain to your employer either informally or using a formal grievance process. Ask for help and support from, for example, a trade union, equality organization or the Citizens Advice. Someone from these organizations can be asked to act on your behalf. This is sometimes called a mediation process. If necessary you can take your complaint to a court or tribunal for a verdict. Equality human rights statutory code of practice for services The code aims to provide guidance relating to protected characteristics and how those providing a service ir function should ensure that there is no discrimination when these are being accessed. Associations are also included in the code of practice and how these can alleviate the risk of discrimination. By following the code of practice those offering services and functions and those involved in associat...

Packet Tracer Challenge

  Project with Jackson Scenario   Two businesses want to communicate but on 2 different sites with different IP.   Both businesses have 1 8 computer, 5 laptops, Switch, router and a server.   Requirements   We will need to use DHCP.   We need to use a logical representation on cisco packet tracer   Make sure that you are able to communicate across the two networks.   Process   After setting up the clients we set up the DHCP on the server, starti ng with the first sight   The server is then linked to the switch which is then connected to all of the clients. Because we used DHCP, all the IP addresses were automatically set on each of the clients to match the one that is of the servers to allow seamless communication between each device. The process of how-to setup DHCP on a network: 25oct - dhcp.docx   For the second site just copy the first two stages.   You then connect them by using a router     What we sh...