Posts

Showing posts from November, 2024
Further Research Task 1. The IPA is also known as the snooper's charter 2. The UK government oversees the IPA and how it is used in theory, but in practice it is British intelligence agencies. 3. Interception - This relates to the accessing of communication, including telephone, email and any type of messaging, during transmission Interference - This relates to the accessing of electronic equipment, including digital devices and smartphones, so obtain communication data Retention - This means that all internet connection records have to be achieved for 12 months 4. Equipment interference can be carried out by downloading data from a phone or installing something like key logging software which will enable security agencies to track every key that is imputed by the user. 5. In the IRC records, things like information around messages sent or posted, websites visited are archived by the internet service providers. Government security agencies such as the police, GCHQ, ministry of d...
  The types of services and benefits of cloud computing    Cloud computing refers to IT services and infrastructure, making them accessible remotely via the internet. Utilizing cloud storage can help companies get an edge compared to others. There are multiple different versions of cloud storage:  . Public – these are used by a range of users including individuals in large corporations. However, you usually need to pay for a subscription to use public cloud services. It's usually hosted by a cloud vendor, e.g. AWS.   . Private – these are usually hosted by a by an organization and can be hosted on site or remotely via virtualization. They are usually protected by a firewall. A private cloud also requires an organization to implement and maintain infrastructure to host it.   . Community – designed to be used by a group of organizations working in a particular industry. By using this type of cloud system in the financial industry, it makes it easier...
How can an employer Protect their Employees based on the Health and Safety Four things that a companies can do to make sure that employees are safe at work is that they can analyze workstations and assess and reduce risks, plan work so that there are breaks or changes in activity, and they can arrange and pay for eye tests and glasses if they are needed for work.   A display screen equipment (DSE) assessment is a process to evaluate the ergonomics and safety of a workstation where employees use devices like computers, laptops, or any equipment with a screen. It also includes making sure that an employee's desk is adapted to ensure comfort and productivity. This would include having an adjustable seat, desk space, glasses if needed, etc.   A healthy work environment ensures that a workplace is free from hazards, weathe that is physical or from its employees. This would be done by making sure that the workplace is clean, and there are no hazards that can hurt someone. It's also ...

How do different legislations affect IT infrastructure and its operations

How do different legislations affect IT infrastructure and its operations The Health and safety act was originally enacted after an inquiry by Lord Robens towards the end of Harold Wilson's First Government.  The Health and Safety at Work Act 1974 is the main piece of legislation covering health and safety in the workplace. It outlines the responsibilities of both the employer and employee in ensuring there is a safe working environment. An example of this  would be that e mployers are responsible for maintaining a safe working environment, including displaying warning signs.  Employee Responsibilities To take reasonable care of your own and others safety Not to interfere or misuse anything has been provided for your health and safety such as safety equipment.  To report any illness or injury that will affect your ability to work.  To cooperate with your employer by undergoing training, wearing protective clothing and by following health and safety policies Empl...

Virtualisation/cloud services enabling scaling and elastic computing solutions

Image
Types of virtualisation Server virtualisation - Enables one physical server to run multiple operating servers as virtual machines. The benefits are:  - more efficient use if IT equipment - faster workload distribtion - better application operation - improved server access  - reduced operating costs Network virtualisation - reproduces the physical network requirements as a virtual network to allow applications to run in exactly the same way as on the physical network but with logical rather than physical ports, devices, routers, firewalls and so on. Desktop virtualisation - enables organisations to provide software configured for the specific needs of the particular workplace or individual. Any changes or upgrades can be rolled out quickly and easily from the IT department to all relevant locations. It also allows easy rollout to mobile or remote workers who may be using iOS, Android, Windows or any other permitted operating system. Cloud solutions enabling elastic computing so...

Digital Inclusion

Digital Inclusion 1. Minority Groups are one group that could be excluded from digital spaces due to bias and racism. As well as any with a proacted characteristic. 2. More people in rural areas are often less connected then people who live in urban areas, this is being mitigated by programs like the B4RN 3.  4. Digital Exclusion has often come with significant problems, some people may not be able to get there voice heard by those who need it. For example if you cannot access the internet then  UK Digital Strategy 2024-2030 1. The Government can shape the digital enabling environment through establishing fair and progressive policy, regulation and legislation to govern rights, privacy, competition, safety, security as well as drive digital skills development. The private sector can utilize innovative, inclusive technology and business models to facilitate affordable last-mile connectivity, address issues relating to cost of data and devices. Academia can help analyze and incr...

How data is transferred between network devices using the OSI seven-layer model

Application Layer This provides applications with the means to access the services of the other layers and defines the protocols used by the applications to exchange data. The most widely known protocols are used for the exchange of user information are as follows: HTTP - Hypertext transfer protocol FTP - File transfer protocol  TELNET - Used for logging on remotely to networks. SMTP - Simple Mails Transfer Protocol The following protocols are used to assist in the management and use of TCP/IP networks: DNS - Domain Name System RIP - Routing Information protocol (Used for example by routers to exchange routing information on an IP network) SNMP - Simple Network Management Protocol (Used for example to collect and exchange network management information) Transport Layer This Layer is responsible for providing the application layer with session and datagram communication services. The main protocols are:   TCP - Transmission Control Protocol. This provides a one-to-one communica...

Diversity Part 2

When to take action against discrimination An individual could take action if they feel they have been discriminated against. The action could be to. Complain to your employer either informally or using a formal grievance process. Ask for help and support from, for example, a trade union, equality organization or the Citizens Advice. Someone from these organizations can be asked to act on your behalf. This is sometimes called a mediation process. If necessary you can take your complaint to a court or tribunal for a verdict. Equality human rights statutory code of practice for services The code aims to provide guidance relating to protected characteristics and how those providing a service ir function should ensure that there is no discrimination when these are being accessed. Associations are also included in the code of practice and how these can alleviate the risk of discrimination. By following the code of practice those offering services and functions and those involved in associat...

Packet Tracer Challenge

  Project with Jackson Scenario   Two businesses want to communicate but on 2 different sites with different IP.   Both businesses have 1 8 computer, 5 laptops, Switch, router and a server.   Requirements   We will need to use DHCP.   We need to use a logical representation on cisco packet tracer   Make sure that you are able to communicate across the two networks.   Process   After setting up the clients we set up the DHCP on the server, starti ng with the first sight   The server is then linked to the switch which is then connected to all of the clients. Because we used DHCP, all the IP addresses were automatically set on each of the clients to match the one that is of the servers to allow seamless communication between each device. The process of how-to setup DHCP on a network: 25oct - dhcp.docx   For the second site just copy the first two stages.   You then connect them by using a router     What we sh...

Diversity

1. Age, Disability, Race, Sexual Orientation, Gender Reassignment , Religion, Pregnancy, Marriage 2. Direct Discrimination, Indirect Discrimination, Harassment, Victimization 3. A pregnant women gets rejected because of her condition. An older person being rejected because of there age. Raising an issue about discrimination and then being discriminated against.

Business Context Mind-map

Image
Know your markets - Using google trends to look at what people are interested in. Risks - Waying up the risks in your investment/technology/employees/environment. The way you would manage risk is be having a specific team to identity and mitigate the risks. For example preventing your staff from posting  Remote Working - Letting your employees work from home can help people with disabilities or physical distance  How do organizations and companies manage issues Business context is how someone can manage technology in business and how an individual must consider various aspects of technology to allow the business to thrive. You also need to consider other things that the business will need that will involve technology and how you are able to make decisions to pursue it. The context of it also makes you understand how a business uses technology and allows us to know how to make the correct decisions that won't harm the business. This could be something like managing risk which a...
Referencing Models  The TCP/IP Model: Model is a conceptual framework used to describe the functions of a networking system. This model divides network functions into 4 (sometimes describe by 5) layers The OSI Model: Mainly used for debugging it is a conceptual framework used to describe the functions of a networking system. This model divides network framework into 7 layers. Protocols Networks need to have a set of rules of how to communicate and transmit information from start to end. These rules are called PROTOCOLS Without common protocols, networks would not understand each other. Protocols work with specific layers of the network model, depending on the function A port in networking is a software-defined number associated to a network protocol that receives or transmits communication for a specific service Why are network functions logically separated into layers? What is a layer:     A division of network functionality The Advantages of layers:     Each l...