Professional Documents
Culture Documents
Serena Khan
Access Levels: These can be set up to allow individuals to have access to only specific levels of
application and prevent unauthorized users from accessing particular data. Network managers can set
up groups of users with different levels of access to the network. At the highest level, the network
manager can install and remove software, access all user areas and change permissions. At lower levels,
a group of users may only be able to access particular pieces of software and their files stored in their
own areas. We have a hierarchy for our school the administrators have the most access, the teachers
have a little less and students have limited access.
Firewalls (virus wall): This is a piece of software that monitors all data arriving at your computer from
the internet and all data leaving your computer. A firewall protects (a network or system) from
unauthorized access with a firewall. It stops anything that is harmful or unwanted (such as
viruses, spam and hackers).
iii.
Data encryption: This is used to codify data so that it cannot be read by anyone else who does not have
the key to the code. An algorithm, sometimes known as a cipher, is applied to the data at the
transmission end and the reverse is applied at the reception end. Data encryption is the act of changing
electronic information into an unreadable state by using algorithms or ciphers. Originally, data
encryption was used for passing government and military information electronically.
iv.
Anti-Virus Software: This is set up to intercept computer viruses before they can become resident on the
computer. The software can isolate the virus, remove it and sometimes repair any damage. Equivalent
security programs exists for other types of malware. Antivirus or anti-virus software (often abbreviated
as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and
remove malicious software. Antivirus software was originally developed to detect and remove computer
viruses, hence the name. It can fix a remove viruses.
4. Explain how you would back up files on a computer network in order to protect them and keep them secure.
Making backup of data is the only way of recovering from a total data disaster. Many individuals and organizations
back up data Flash solid state storage devises or magnetic tape at night. Large organizations will back up there
information on server. You can back your information on a cloud e.g. Mrs. Manthys IPad (ICloud would back up
all of her information)
5. Explain ways in which you would prevent physical access to computer systems.
Locks on doors and windows