Unit 2 Global Information


?
  • Created by: Sian C
  • Created on: 01-05-17 22:16

UNIT 2- Revision

  • Digital Divide
  • Information Formats
  • Static & Dynamic Web pages
  • Database Design
  • Categories of Data Analysis
  • Legislation With Regards to Global Information
  • Green IT
  • Flow Charts and DFDs
  • Information Security
  • Impacts of Information Security
  • Protection of Data
1 of 14

Data and Information

Data is simply the facts and figures without context.

Information is the context which makes the data meaningful and useful.

2 of 14

Digital Divide

This is the difference in access to digital resources in different areas of the world.

This could be for many reasons including economic, technological, social and geographical. Some people also have a fear of technology or a lack of motivation.

3 of 14

Information Formats

Web- webpages 

Blogs- usually informal + run by an individual

Podcasts- digital audio file available for downloading

Streamed audio/video- played immediately instead of being saved to the hard drive

Document Stores- computer program designed for storing, retrieving and managing information

RSS Feeds- regularly changing web content (news sites) 

4 of 14

Statistic & Dynamic Webpages

Static Web Pages- written in plain HTML & what is in this code of this page is what is displayed to the user, it is cheaper but you have to go back to the designer to have any content changes made

Dynamic Web Pages- written using a server-side scripting language (PHP, ASP, JSP, Coldfusion) meaning the site content is called in via scripting language from other files or from a database depending on actions taken by the user, you can easily pull information in an organised/structured way, all your product pages will be the same page layout with different data being displayed

5 of 14

Database Design

Database design is the process of producing a detailed data model of a database. This data model contains all the needed logical and physical design choices and physical storage parameters needed to generate a design in a data definition language, which can then be used to create a database.

Validation-  makes sure the data is correct

Verification- checks that various types of data are accurate and for inconsistencies after data migration is done

6 of 14

Categories of Information

Communication- a simple email home is clearly information but this could range from comments about the weather to the fact that it was sent at 4 a.m local time

Education and Training- school reports can be paper based or stored online in an intranet

Entertainment- IMDB & Rotten Tomatoes provide a synopsis of each film they list as well as overall scores based on the views of people who have seen the film 

Planning- shared electronic diaries help people plan their lives

Financial- banks and other organisations provide a lot of data from how much money we have in our accounts to grouping expenditures

7 of 14

Stages of Data Analysis

Identify the need- the purpose

Define the scope- restrictions

Identify potential sources- unbiased & suitable to meet objectives

Source and select information- gather & select information

Select the most appropriate tools- representation of data

Process and analyse data- spreadsheets & graphs etc

Record and store information- report containing results

Share Results- publish report for stakeholders, printed, web or written

8 of 14

Legislation With Regards to Global Information

Computer Misuse Act 1990- unauthorised access with intent to commit or facilitate a crime, modification of computer material as well as the unauthorised access to computer material

Data Protection Act 1998- controls how personal information is used by organisations, businesses or the government

Regulation of Investigatory Powers Act 2000- regulates the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications

Protection of Freedoms Act 2012- restores freedoms and civil liberties through the abolition of such things like DNA retention, freedom of information and right to data

9 of 14

Green IT

The purpose is to reduce the carbon footprint and stop using the world's limited resources at such a high rate which will help reduce the use of hazardous material, maximise energy efficiency during the product`s life as well as promote the biodegradability of unused and outdated products.

Implementing Green IT

  • Recycle computers
  • Cloud storage- male savings, less local computers & less overall computers needed
  • Less individual printers
  • More power efficient equipment
  • Companies responsibly dispose of their equipment

Advantages- doing your part for the environment, reduce printer costs, better reputation etc

Disadvantages- increased cost of disposal, cloud solutions may not suit your needs, paperless office may cause more jobs for admin etc

10 of 14

Flow Charts and DFD`s

The curved end rectangle is both the start and stop of the flow chart
The rectangle is a process
The diamond is a decision
The parallelogram shows data 

A DFD is often used as a preliminary step to create an overview of the system without going into great detail, which can later be elaborated

A data flow diagram is a graphical representation of the flow of data through an information system, modelling its process aspect

The direction of the arrows shows who inputs the data and who receives this data 

11 of 14

Information Security

Principles of Information Security

Confidentiality- information can only be accessed by individuals, groups or processes authorised to do so

Integrity- information is maintained so it is up to date and accurate

Availability- information is always available to and usable by the individuals, groups or processes that need to use it

Risks to information 

  • Unauthorised or unintended access to data- competitor gains advantage & breach of DPA 1998
  • Accidental loss of data- breach of DPA 1998 & liable to be prosecuted
  • Intentional destruction of data- depeneds of relevance of data & failure to comply with DPA 1998
  • Intentional tampering with data- decisions made based on this data would be flawed & loss of reputation for organisation holding the data
12 of 14

Impacts of Information Security

Loss of Intellectual property- depends on the nature of the item, loss of a prototype would have a huge impact

Loss of service/access- hacking, systems no longer accessible, passwords compromised, systems may shut down until the hackers are stopped, loss of entire system

Failure in security of confidential information- depends on why the data was confidential in the first place

Loss of information belonging to a third party- in loss of reputation, business and open to litigation

Threat to national security- if any data you hold could be used in a nefarious way you could be contributing to a threat

13 of 14

Protection of Data

Policies- made my companies to state rules on access, procedures that should be followed/backup procedures, training for staff provided

Physical Protection- locks, keypads, biometrics, remote backups, security staff, placing computers above sea level

Logical Protection

  • Tiered level of access to data- only certain people have access to certain things
  • Firewalls- prevent unauthorised external access
  • Anti-malware- anti-virus, pop-up blockers, spyware
  • Obfuscation- making something jumbled so it can`t be understood, makes theft less profitable
  • Encrypting data at rest- data that isn`t being transferred
  • Encryption of data in transit
  • Password protection files
14 of 14

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Data and Information resources »