R001 January 2018 Notes

?
  • Created by: Rokith
  • Created on: 17-12-17 21:27

CCTV Monitoring

Most businesses use CCTV cameras to keep track of their employees.

Main uses:

  • Crime Prevention - Theft/Burglary 
  • Safety - Check for fires
  • Checking if employers are at their desk
  • Vehicle Monitoring - To help with traffic flow

Image result for cctv system diagram (http://data-phone.net/wp-content/uploads/2015/11/1.-CCTV_Diagram-e1450268206351.png)  

1 of 26

What Hardware Do We Need?

Computer hardware: The collection of physical parts of a computer system. It is what you can physically touch.

This includes:

  • Computer Case
  • Monitor
  • Keyboard
  • Mouse

Inside the computer case, it includes all the parts such as:

  • Hard Disk Drive
  • MotherBoard
  • Video Card
2 of 26

Storage Devices

Storage Devices: They are many types of hardware that are used to store photos, documents, videos and music either permanently or temporary.

Optical Disks

CD (Compact Disc): Store up to 700MB and can be used for multimedia applications.

DVD (Digital Versatile Disc): Store up to 4.7 GB which is equivalent to 120 minutes.

Hard Drives (HDD): Data storage device that uses magnetic storage to store and retrieve digital information. 

Solid State Drives (SSD): They do not have any moving parts, unlike HDD. This stores a lot of data and can be very expensive. This can be found on new computers.

Flash Memory (USB, Memory Cards): They are devices that erase data in units called blocks. It can be electrically erased and can be reprogrammed.

3 of 26

Advantages & Disadvantages of Hard Drives

Advantages:

  • More affordable than SSD
  • Higher storage capacity than SSD:
  • HDD is easier to buy in most stores
  • Longer lifespan than SSD

Disadvantages:

  • HDD is slower than SSD
  • Higher power consumption
  • Produces noise while in operation
  • Not durable compared to SDD
4 of 26

Advantages & Disadvantages of Solid State Drives

Advantages:

  • Faster than hard disk drives
  •  Low power consumption
  • Durable than hard disk drives
  • No noise while in operation

Disadvantages:

  • More expensive than hard disk drives
  • Limited storage capacity
  • Poor availability
  • Shorter lifespan than hard disk drives
5 of 26

Input Devices

Input Devices:

Mouse: Moving around a computer

Keyboard: Still the most common way of quickly typing in or taking print screen into a computer.

Joystick: A stick that pivots on a base and reports its angle or direction to the device it is controlling.

Digital Cameras: Records and stores photographic images in digital form.

IP Cameras: a type of digital video camera commonly employed for surveillance, and which, unlike closed-circuit television (CCTV) cameras, can send and receive data via a computer network and the Internet.

Microphone: This would be used to make recordings or as voice control.

6 of 26

Output Devices

Monitor: A display screen used to provide visual output from a computer. 

Widescreen Monitor: Images that are displayed on computer screens.

Printer: Used for producing a hard copy of the information which can be taken away from a computer.

Speakers: Used for hearing sounds, music.

7 of 26

CCTV Cabling

In a CCTV system, we would find lots of different cables attached to the camera such as:

  • Fibre-Optic - This is a flexible, transparent fibre made of drawing glass or plastic to a diameter which is slightly thicker
  • RJ45 - This is a type of connector commonly used for Ethernet networking.
  • HDMI
  • USB
  • Firewire
8 of 26

Pros & Cons of Fibre Optic

Pros:

  • Bandwidth Capacity - optical signals can carry much more information than electrical ones. They have a theoretical capacity of 350 Terabits/second or 350.000 Gigabits/second.
  • Signal reliability - optical signals do not suffer electromagnetic interference and present a much smaller bit error rate compared to electrical systems. 
  • Size and weight - the core of an optical fibre go from 10 to 50 micrometres.

Cons:

  • Cost per user - optical networks are the rule for carrier’s backbone because the huge amount of traffic justifies the economic investments. 
  • Physical Constraints - optical fibres cannot be bent too much or they lose some light reflecting properties.The cost and complexity of the repair are significantly higher.
  • Switching - current optical technology is very efficient for point-to-point data transmission.  
9 of 26

Pros & Cons of RJ45 (Cat 5)

Pros:

  • Cost -  This is one of the cheapest option available on the market. That’s the main reason why people prefer to connect their computers to the Internet by using the Cat 5 network cable.
  • Accessibility - It’s easy to install. Even people who are not tech geeks would be able to connect their computers in just a few minutes.
  • The Cat 5 network cable is mostly used for home networking since it’s able to transmit data only to a limited extent. 

Cons:

  • You won’t be able to move the computer from one place to another. That’s why most people choose the wireless networking.
  • This is not designed to transfer data over short distances. That might cause a big problem in the network connection.
10 of 26

Keywords

Network: A group or system of interconnected people or things.

Topology: The way in which basic parts are interconnected or arranged.

Node: A point in a network or diagram at which lines or pathways intersect or branch.

Configuration: An arrangement of parts or elements in a particular form, figure or combinations.

11 of 26

Network Topology

Network Topology refers to the layout of a network and how different nodes in a network are connected to each other and how they communicate.

There are a number of different types of network topologies, including:

  • Point to Point
  • Mesh
  • Ring
  • Line/Bus
  • Star
12 of 26

Point to Point

This topology is the simplest. It consists of a permanent connection between two nodes. For example, a computer and a printer or two computers.

Image result for point to point topology diagram (http://www.conceptdraw.com/How-To-Guide/picture/point-to-point-network-topology.png)

13 of 26

Ring

In a ring topology, the nodes are connected in a ring and data travels in one direction using a control signal called a 'token'.

Advantages:

  • Compared to a star topology, it uses less cabling so, therefore, is less expensive.
  • It can operate over larger distances and handle more data than a bus topology.
  • Because the signals only go one way around the ring, they do not interfere with each other.

Disadvantages:

  • If one computer in the network stops working then the whole network goes down because it can no longer pass on the signal.
  • It can be difficult to expand a ring network because adding a new computer means interrupting the whole communication ring.
14 of 26

Mesh

Full Mesh

The illustration of a mesh network consists of six nodes. Each node is shown as a sphere and connections are shown as straight lines.

Partial Mesh

The illustrations of a partial mesh also consist of six nodes. Each node is shown as a sphere and connections are shown as straight lines. The connection in either a full or partial network can be wired or wireless.

15 of 26

Line/Bus

Nodes are connected to a main (bus) cable. If data is being sent between nodes then other nodes cannot transmit. If too many nodes are connected then the transfer of data slows dramatically as the nodes have to wait for the bus to be clear.

Advantages:

  • It's easy to add more computers to extend the network.
  • It uses less cabling than the other network designs.
  • If a single computer breaks, it does not disable the whole network.

Disadvantages:

  • A break or fault anywhere on the cable will disable the whole network.
  • The size of the network is limited by the capacity and the length of the bus.
  • A single bus is not suitable for networks with a lot of computers and a lot of data being transmitted.
16 of 26

The Main Three (1)

Line (Bus):

  • Performance: Medium
  • Change in performance with many nodes: Most affected
  • Ease of troubleshooting: Fairly easy
  • Cost of Installation: Low
  • Ease of setting up: Easy to set up and modify 
  • Problems with the network: Failure of the bus cable causes total failure

Ring:

  • Performance: Slow
  • Change in performance with many nodes: Least affected
  • Ease of troubleshooting: Hard
  • Cost of Installation: High
  • Ease of setting up: Easy to set up but harder to modify 
  • Problems with the network: Cable or node failure causes total network failure
17 of 26

The Main Three (2)

Star:

  • Performance: Fast
  • Change in performance with many nodes: Some affect but switch/hub can be upgraded easily.
  • Ease of troubleshooting: Easy
  • Cost of Installation: High
  • Ease of setting up: Easy to set up and modify 
  • Problems with the network: Cable or node failure only affects that node. Failure of the hub/switch or the server causes total network failure.
18 of 26

Star

In this type of network, a central computer (server) usually forms in the main node and the other nodes are connected to it and to each other through a switch or hub.

Advantages:

  • If one connection breaks, the rest of the network is unaffected. 
  • As each computer has its own cabling, the load on each section of cabling is less.
  • If there is a fault, it is easier to find and correct, for example by replacing one section of cable.

Disadvantages:

  • It uses more cabling than other topologies, which can be expensive.
  • If the central server or hub breaks down, the whole network fails.
19 of 26

Moral & Ethical Issues

Computer systems are increasingly used to hold personal and private data. Almost every business will hold data on its customers and employees.

Ethical Issue

The ethical principle is that they will be able to see staff doing things that are personal and might take advantage of this information or judge people on this information.

Moral Issue

The moral principle is that they might abuse this information for their own entertainment or use it for more dubious purposes like blackmail. 

Overall, the security staff will be able to see and access private and confidential video footage that may be seen as intrusive (too personal) for them to access.

20 of 26

Computer Misuse Act

The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act:

  •  It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking.
  •  It is illegal to access data on a computer when that material will be used to commit further illegal activity, such as fraud or blackmail.
  •  It is illegal to make changes to any data stored on a computer when you do not have permission to do so. If you access and change the contents of someone’s files without their permission, you are breaking the law. This includes installing a virus or other malware which damages or changes the way the computer works.

The maximum punishment for breaking this law is a £5000 fine or several years’ imprisonment such as 5 years in prison.

21 of 26

Data Protection Act

The Data Protection Act is built around eight principles which state how personal data should be treated:

1.       Personal data must be fairly and lawfully processed. This means that an organisation must be truthful about what personal data they wish to collect and what they want to use it for.

2.       Personal data must be obtained for specified and lawful purposes. This means that an organisation cannot use personal data for any purpose other than that stated when they collected the data.

3.       Personal data must be adequate, relevant and not excessive. This means that an organisation cannot ask for any data that is not immediately needed.

4.       Personal data must be accurate and up to date. If data held about you is wrong or out of date, you have the right to have it corrected or deleted. 

22 of 26

Rules For An Effective Password

  • For an effective password, it must consist of 8 characters or more, including both upper and lower cases.
  • Avoid words from the dictionary.
  • Avoid personal information such as birth dates and names.
  • Include numbers in your password.
  • Avoid using the same password you use for other applications.
23 of 26

Advantages & Disadvantages of Cloud Storage

Advantages:

Usability: All cloud storage services have desktop folders for Mac’s and PCs. This allows users to drag and drop files between the cloud storage and their local storage. 

Bandwidth: You can avoid emailing files to individuals and instead send a web link to recipients through your email.  

Accessibility: Stored files can be accessed from anywhere via an Internet connection.

Disadvantages:

Usability: Be careful when using drag/drop to move a document into the cloud storage folder. This will permanently move your document from its original folder to the cloud storage location. 

Accessibility: If you have no access to Internet Connection then you have no access to your data.

24 of 26

Biometrics

Biometrics includes Fingerprint Lock and Facial Recognition which are important for securing data in case someone might steal valuable information.

The benefits of biometrics

  • Added security
  • File Protection

Drawbacks of Biometrics

  • Cuts not allowing fingerprint recognition 
  • Glasses and beards to limit facial recognition.
25 of 26

MAC & IP Address

MAC Address

MAC address will tell the network which computer is being used to access the information on the network and cannot be disguised so if Will is using a computer with a false ID or false IP the activity can still be tracked to one machine.

IP Address

AN IP is the logged in computer and will flag up during access which machine is assessing the information, this can be masked.

26 of 26

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Revision Notes resources »