info systems design and development

41
National 4/5 Computer Science Information Systems Design and Development Faculty of ICT

Upload: iarthur

Post on 13-Nov-2014

220 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Info systems design and development

National 4/5 Computer Science Information Systems Design

and Development

Faculty of ICT

Page 2: Info systems design and development

Computing Laws◦ Computer Misuse Act◦ Copyright Designs and Patents Act

Aims - Systems Lesson 1

Page 3: Info systems design and development

Computer Misuse Act This law was created to make it

illegal to: Hack

◦ Gain unauthorised access into a computer system

Spread Viruses◦ Send harmful code to other computers

Phish◦ Pretend to be a company to steal to

password information

Computing Laws

Page 4: Info systems design and development

Copyright Designs and Patents Act This law was created to make it illegal to: Make unauthorised copies of music, movies

or software Use multiple copies of software when you

only have 1 license Steal someone’s idea, work etc when it is

under copyright

Computing Laws

Page 5: Info systems design and development

Last Lesson Computing Laws

◦ Computer Misuse Act

◦ Copyright Designs and Patents Act

Today’s Lesson Computing Laws

◦ Data Protection Act

Aims - Systems Lesson 2

Page 6: Info systems design and development

Computing Laws Data Protection Act

◦This law was created to control the storage of personal information

◦Data Controller The company or person storing the information on the

person

◦The Data must be: Accurate and kept up to date Protected properly with a password Relevant and only stored for the period it is

required Not sell the data on to other companies

Page 7: Info systems design and development

Computing Laws The Data User:

◦ The person who makes use of the personal information, for example, the secretary in a doctor’s surgery

The Data Subject◦ The person that the information is about, for

example, the patient in a doctor’s surgery◦ The Data Subject can:

See the information held on them Change any inaccurate information Know why the data is being stored about them

Page 8: Info systems design and development

Last Lesson Computing Laws

◦ Computer Misuse Act

◦ Copyright Designs and Patents Act

◦ Data Protection Act

Today’s Lesson Health and Safety

Regulations

Aims - Systems Lesson 3

Page 9: Info systems design and development

Health and Safety Regulations

Main Health Problems◦ Back problems◦ RSI = repetitive strain injury◦ Eye strain

The law states that an employer must:◦ Provide adjustable screens, chairs and provide foot

support◦ Make sure lighting is suitable and provide antiglare filters

for monitors◦ Give employees adequate breaks◦ Pay for eye tests◦ Avoid trailing wires◦ Have suitable heating

Page 10: Info systems design and development

Last Lesson Computing Laws

◦ Computer Misuse Act

◦ Copyright Designs and Patents Act

◦ Data Protection Act◦ Health and Safety

Regulations

Today’s Lesson Environmental

Impact◦ Carbon footprint

Aims - Systems Lesson 4

Page 11: Info systems design and development

Environmental Impact

Carbon Footprint = the amount of C02 you generate◦ When using a computer system you are adding to

carbon emissions◦ Desktop = 110 watts◦ LCD Monitor = 35 watts ◦ You are using electricity generated by fossil fuels

Minimising Carbon Footprint◦ PCs on the markets that use 25 watts◦ Low energy processor chips◦ Automated power shutdown systems for out of hours◦ Laptop usage rather than desktop

15-60 watt rather than 145 watt

Page 12: Info systems design and development

Last Lesson Computing Laws

◦ Computer Misuse Act◦ Copyright Designs

and Patents Act◦ Data Protection Act◦ Health and Safety

Regulations Environmental

Impact◦ Carbon footprint

Today’s Lesson Security Risks

◦ Virus◦ Worm◦ Trojan Horse

Aims - Systems Lesson 5

Page 13: Info systems design and development

Viruses◦ A piece of code that attaches itself to programs,

makes copies of itself and destroys your system◦ Ways of spreading

Downloaded from a website Opened up from an email attachment Infected backing storage device

◦ Symptoms of a virus Data loss Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason

Security Risks

Page 14: Info systems design and development

Worms◦ A program that finds gaps in your security,

creates copies of itself and floods your system with unwanted data

Trojans◦ A program that appears as if it is carrying out a

task, for example, defragmenting your hard disk◦ You download it thinking it is carrying out a

harmless task and it causing hard, for example, deleting files or adding unwanted toolbars

Security Risks

Page 15: Info systems design and development

Last Lesson Security Risks

◦ Virus◦ Worm◦ Trojan Horse

Today’s Lesson Security Risks

◦ Keylogging Software◦ Spyware◦ DOS attacks

Aims - Systems Lesson 5

Page 16: Info systems design and development

Keylogging software◦ A program that monitors user’s keystrokes and is

often used to steal passwords, credit card numbers etc

Spyware◦ Spyware programs gather information about you

from your computer, for example which websites you visit.

◦ This data can be used to target you with specific marketing

Security Risks

Page 17: Info systems design and development

Denial of Service attacks◦ A DOS attack is designed to cause problems on a

network so that legitimate users cannot access resources, for example their online bank account

◦ Resource Starvation = using up network resources, for example processors or disk space on servers so that legitimate users can’t access resources

◦ Bandwidth Consumption = flooding the network with useless traffic, for example flooding an email server with useless data, making it crash

◦ Attacking Routers = corrupt PING attacks that stop Routers from working properly

Security Risks

Page 18: Info systems design and development

Last Lesson Security Risks

◦ Virus◦ Worm◦ Trojan Horse◦ Keylogging Software◦ Spyware◦ DOS attacks

Today’s Lesson Securing

Computers◦ Passwords◦ Encryption◦ Biometrics◦ Firewalls◦ Anti virus software

Aims - Systems Lesson 6

Page 19: Info systems design and development

Passwords◦ A list of characters that stops people accessing you data◦ Disadvantage

You can forget them Programs have been created that can test billions of different

passwords each second, eventually guessing yours!! Encryption

◦ Putting data into a code before transfer ◦ The hacker cant understand the data without having the

key to decipher the code Biometrics

◦ Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition

Securing Computers

Page 20: Info systems design and development

Firewalls◦ A program that checks all data coming in and out

of a network◦ The firewall decides which packets of data are

allowed through to the destination address Anti-virus software

◦ A program that has a database of known viruses◦ The anti virus software compares sections of code

to this database to identify and destroy viruses

Securing Computers

Page 21: Info systems design and development

Last Lesson◦ Securing Computers

Passwords Encryption Biometrics Firewalls Anti virus software

Today’s Lesson◦ Securing Computers

Security Protocols Security Suites

Aims - Systems Lesson 6

Page 22: Info systems design and development

Security Protocols◦ A rule or agreement set up between the sender and

receiver of data◦ Secure Sockets Layer (SSL) and Transport Layer Security

(TLS) are 2 examples◦ SSL and TLS both use encryption

Security suites◦ Groups of programs used to block threat to your computer

Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters

Securing Computers

Page 23: Info systems design and development

Last Lesson◦ Securing Computers

Passwords Encryption Biometrics Firewalls Anti virus software Security Protocols Security Suites

Today’s Lesson◦ Databases

Manual V Electronic storage

What is a Database?

Aims - Systems Lesson 7

Page 24: Info systems design and development

Manual/Electronic Systems

=

=

Electronic databases have a number of advantages over a manual database

You can have a backup copy They take up less room Faster to search for records Email information to others

Page 25: Info systems design and development

What is a Database

A database is a program used to store data in a structured way

Examples◦ The Police National

Database◦ DVLA◦ Inland Revenue◦ Esporta Health Club

Page 26: Info systems design and development

Last Lesson◦ Databases

Manual V Electronic storage

What is a Database?

Today’s Lesson◦ Databases

Files, Records and Fields

Data Types

Aims - Systems Lesson 8

Page 27: Info systems design and development

Data File/Record/FieldFIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE FIRSTNAME

RECORD = INFORMATION ON ONE PERSON OR ITEM

DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE

Page 28: Info systems design and development

Data/Fields Types

When creating a database you have to choose the data/field type depending on the data that is going to be stored

Examples◦ Text◦ Number◦ Date/Time◦ Currency◦ Yes/No◦ OLE object

Page 29: Info systems design and development

Last Lesson◦ Databases

Manual V Electronic storage

What is a Database?

Today’s Lesson◦ Databases

Simple/Complex searching

Aims - Systems Lesson 9

Page 31: Info systems design and development

Complex Search

I want to carry out a complex search on the field Surname with the criteria “Forbes” and on the field Fav Hobby with the criteria “Football”

Page 32: Info systems design and development

Last Lesson◦ Databases

Manual V Electronic storage

What is a Database? Simple/Complex

searching

Today’s Lesson◦ Primary Key◦ Index key

Aims - Systems Lesson 10

Page 33: Info systems design and development

Primary Key◦ A primary keys

allows you to make each record unique in a database

◦ Example ID number or Account

number You may have 2 John

Smith records but they would have different ID numbers

Foreign Key◦ Foreign keys allow

you to set up a relationship or link between 2 tables in a database

◦ Example ID may be the primary

key in the customer table and a foreign key in the book ordered table

Keys

Page 34: Info systems design and development

Last Lesson◦ Primary Key◦ Index key

Today’s Lesson◦ Computed Fields◦ Validation

Aims - Systems Lesson 11

Page 35: Info systems design and development

Computed/Calculated Fields A computed field will carry out a

calculation on another field or fields and give you an answer

Page 36: Info systems design and development

Validation

Validation is checking that the correct information has been entered into the database

Presence Check ◦ This checks that data has been entered and the field

has not been left blank Restricted Choice

◦ This presents the user with a choice they pick from Field Length Check

◦ The specifies the number of characters that should be in each field

Field Range Check◦ This specifies that range of numbers that can be stored

e.g. > 0 and < 100

Page 37: Info systems design and development

Simple/Complex Sort

I want to carry out a Simple Sort on Surname Ascending

I want to carry out a Complex Sort on Surname Ascending following by Firstname Ascending

Page 38: Info systems design and development

Arrangements

Page 39: Info systems design and development

Arrangements

Page 40: Info systems design and development

Arrangements

Page 41: Info systems design and development

Arrangements