Sunday 13 July 2014

UNIT 32 P1 - Describe how networks can be attacked - Network System Security


UNIT 32 P1 - Describe how networks can be attacked - Unit 32 Network System Security





UNIT 32 P1 - Describe how networks can be attacked
A computer Virus:
  how networks can be attacked -
A  computer virus is a program that duplicates itself and it spreads itself from computer to computer through the internet. There are many types of Malware and this includes computer viruses such as; Viruses, worms, Trojans, and bots. Viruses have a number of ways to ruin a computer, but most viruses mainly fill up the hard disk space of a computer filing it with useless information which will prevent you from being able to access space you would need in future. When a computer becomes infected by a virus, the virus makes your system slow down tremendously which would lead to software from stop responding, freezes or even corrupting files. Viruses can also automatically make pop ups on your screen faster than you could exist them. If an organisation fell victim to viruses like this, the organisation would have a big problem because their storage will fill up with useless information so they wouldn’t be able to provide a service to the standard the normally preform at nor will they have space for the information that they might need to be saved in

Hacking:
Hacking can either be a hobby or a career in using vulnerabilities in computers or servers to breach into computer systems or websites.  When a hacker weaves their way through a computer system, it is normally to amuse them, to challenge or to compete with other hackers to see who the best is. Hacking is rarely for personal gain, but none the less some hackers have been known to hack into systems to gain profits. The harder a system is for a hacker the more willing they are to hack into the system to prove to themselves. The impact a computer hacker has when they’ve hacked into a computer systems security is immense because they would be able to read, edit, and expose personal data which then puts their privacy at risk. This may also put people at risk of credit card fraud which could be used by the people who hacked in to go on a shopping spree. On the national news there have been many cases where phone hacking acquire information on confidential political information.  This kind of hacking effects politics as people are able to gain information before it is ready to be released to the public. This would also give upper hand to any country if they gain valuable information from other counties.

DDOS
A Denial of service (Dos) attack is an attack to make a computer or network service unavailable to users.  The main reason why they would do this is because they want to shut down a system so the user wouldn’t be able to use their system. This attack is done by someone sending allot of useless traffic to a website to a point where the server would not be able to handle the traffic and crashes.  The effect this would have on an e-commerce business is huge because the company would have to work hard and pay allot of money to get it shorted, this would also mean if the business was a product selling company that they would also be losing the profits they could of made. This would also make customers worried that their financial information could be at risk. 

UNIT 18 D2 - evaluate a database against the specified user need





UNIT 18 D2 - evaluate a database against the specified user need - Testing a Relational Database



UNIT 18 D1 - discuss how potential errors in the design and construction of a database can be avoided - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS



UNIT 18 D1 - discuss how potential errors in the design and construction of a database can be avoided

>>Download the database for UNIT 18  here<<


Within most things in life people get things wrong which makes things break, become incorrect or even corrupted, and there is no exception for databases. I am going to talk about the fairly common errors within a database that happen and how you can overcome these errors with simple steps.

Accidental deletion of fields
When a database is in use, you may find it really easy to accidently delete data which could mean allot of stress. One main way to avoid this would be to make sure that back-ups are made of the data, so whatever the matter the data will not be completely lost. However, it is very annoying when data becomes deleted because it takes allot of time and effort to retype the data. The best way to stop accidental deletion is to set the database to only the designer can manipulate it, so anyone using the database without authorisation cannot manipulate and is only able to read the database with no risk of deletion.

 Incorrect data types
Incorrect data type issues can occurs when an unmatched data type is used. An example would be, a field called ‘fees’ in a table in a database, it will go wrong is a ‘text value’ is inserted instead of a ‘numerical value’ like ‘two hundred’ instead of ‘200’. This can be avoided as you can tell the database to only allow numerical values to be inputted within that field so this error won’t accrue again. The database won’t allow anything inputted other than numbers. 

Renaming Incorrectly
Renaming something or someone incorrectly on a database can be a huge mistake, hugely if it were to happen to be a bank. This is mostly done by human error as a typo or misheard information. This means if the error isn’t spotted then it will not be sorted out; so a way to sort out the problem is by double checking the information given and typed.

Validation
Validation within computers is on par with people verification checks, but checks the data to see if the data entered is sensible and reasonable. When a user puts information in to a database which might not be right then the computer will do validation checks to see a match between the users input and information given to the database to run though a list of checks. Here is an example: The database is given a set of rules to run by which would be >=18 which means that nothing under the number (age) is allow to carry on to the next step. So if someone that is the age of 17 or under will not be allowed to move forward. So as you can see this helps to validate information allowing and disallowing data which helps to organise the database making sure all the data is correct.


Null Values
The meaning of a null value equals to “nothing there” within a database.  This would be a big problem with the database as the database will not be able to work properly as it doesn’t understand what it is told and might cause other errors within the database.  If the data base has not been set to understand the null values it would carry on to the next step, but to prevent this from happening you can the use of a validation rule. The validation rule will work to stop the null value from happening like in an ‘online application form’ where if no value were to be entered then a user wouldn’t be able to carry on to the next step; the validation rule will work in the same way to stop the null value from accruing and missing values from happening.  

UNIT 18 M4 - Implement an automated function - ALL ASSIGNMENTS




M4 - Implement an automated function

UNIT 18 M4 - Implement an automated function



UNIT 18 M3 - Export data to an external source - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS

 


M3 - Export data to an external source


>>Click Here if you want to have UNIT 18 M3 in a word document<<


UNIT 18 M2 - Import data from an external source - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS





UNIT 18 M2 - Import data from an external source

>>Download the database for UNIT 18  here<<




(you can also do this in a video format)

UNIT 18 M1 - explain referential integrity and the purpose of primary keys in building the relationships between tables - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS



UNIT 18 M1 (M 1) - Explain referential integrity and the purpose of primary keys in building the relationships between tables



Referential Integrity  

Referential integrity helps to keep records between linked tables consistent and matched when using foreign keys. An example of a table of the courses and a table of enrolments, if you link them and assign students to each course record, the referential integrity is used to ensure the records correspond between the tables. Here is another example; you will not be able to edit a record to the enrolment table that does not use a valid record from the course table. It also manages updates between the linked tables, for example if a record is removed from the course table it will update the information in the enrolment and student table linked to it. This can alert someone if they try to delete a record which is very helpful.

Primary keys
A primary key is a relational table that uniquely identifies each record in the table. These unique attributes could be normal ones but they have to be something that is guaranteed not to be the same with anything else. Primary keys tend to be at the top of every table which can only be in one table but yet may be able to be linked to other tables to make a record of it. Imagine that there is a ‘student’ table that holds a record of each student at the college. The students unique ID number would be a great choice for a primary key in the ‘students’ table. If the students first and last name were to be used as a primary key then that would not be a good choice as there might be more than one student that has the exactly the same name.

Foreign keys
The whole point of the foreign key is used to link tables together in a table that provides a connection between data for a relationship of the tables to be made. The foreign keys act as a cross-reference between tables due it referencing the primary key to another table, which then establishing a link between them. They are different types of relationships like ‘1-1’,1-many’, ‘many-many’ and ‘many-1’. Here are the examples:

1-1   – One passport to one passport owner.
1-many – One person may have many shoes (more than 2 pairs of shoes).
Many-many- A number of siblings have a number of cousins
Many-1- One dad may have many children. 

UNIT 18 P6-creating forms and combo boxes - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS





UNIT 18  P6-creating forms and combo boxes

>>Download the database for UNIT 18  here<<






UNIT 18 P5 - Perform queries using multiple tables and multiple criteria - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS





UNIT 18 P5 - Perform queries using multiple tables and multiple criteria





UNIT 18 P4 validity and integrity - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS





UNIT 18 P4 validity and integrity





UNIT 18 P3 - Create and populate a database - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS




UNIT 18 P3 - Create and populate a database





UNIT 18 P2 - Design a relational database for a specified user need - ALL ASSIGNMENTS HERE. PASS, MERITS AND DISTINCTIONS




UNIT 18 P2 - Design a relational database for a specified user need



Task1a
The table shown is about data bases. What this means is that the information would be structured in a format to be used for many purposes.
Student:
Fieldname
Data type
Field size
Format
Decimals





Studentno
Text
6
-
-
Fname
Text
11
-
-
Sname
Text
9
­-
-
Street
Text
21
-
-
Area
Text
13
-
-
Gender
Text
   6
      -
      -
DBirth
Date
-
Medium Date
-

Room
Fieldname
Date type
Field size
Format
Decimals
Room no
text
     3
       -
       -
Phone
text
4
-
-






Tutor
Fieldname
Data type
Field size
Format
Decimals





Tutorno
Text
6
-
-
TFname
Text
7
-
-
TSname
Text
7
­-
-
Roomno
Text
3
-
-

Course
Fieldname
Data type
Field size
Format
Decimals





Courseno
Text
6
-
-
Coursetitle
Text
25
-
-
Courseyear
Text
3
­-
-
TutorNo
Text
6
-
-

Enrol
Fieldname
Data type
Field size
Format
Decimals





Studentno
Text
6
-
-
Courseno
Text
6
-
-
Fees
Number
Double
­Fixed
2





ERM

 









The ERM diagram is showing the way students would enter the course by relying on a number of steps which are linked together. The student is related to enrolment because the students enrol first before the person is able to be on the course. The student may enrol on a number of courses but is only able to have one tutor. The tutor is able t have more than one student and rooms.

Data Dictionary
College
New students
Graduating students
Change
Table no:
1


Table Name
Student


Purpose
To store student data.


Field no
1.1
Field no
1.5
Field name
StudentNo
Field name
Area
Primary Key
Yes
Primary Key
No
Data type
Text
Data type
Text
Field size
6
Field size
13
Format
-
Format
-
Decimal
-
Decimal
-
Input mask:
>LL0000
Sample
Chelsea
Validation Rule

Input mask
-
Field no
1.2
Field no
1.6
Field name
Fname
Field name
Gender
Primary Key
No
Primary Key
No
Data type
Text
Data type
Text
Field size
11
Field size
6
Format
-
Format
Male/Female
Decimal
-
Decimal
-
Sample
Roy
Sample
Male
Input mask
-
Input mask
-
Field no
1.3
Field no
1.7
Field name
Sname
Field name
DBirth
Primary Key
No
Primary Key
No
Data type
Text
Data type
Date/Time
Field size
9
Field size
-
Format
-
Format
Medium Date

Decimal
-
Decimal
-
Sample
Armstrong
Sample:
29 Feb 80
Input mask
-
Input mask

Field no
1.4


Field name
Street


Primary Key
No


Data type
text


Field size
21


Format
-


Decimal
-


Sample
1 Nick Lane


Input mask
-










Table no
2


Table Name
Room


Purpose
To store room data


Field no
2.1
Field no
2.2
Field name
Room No
Field name
Phone
Primary Key
Yes
Primary Key
No
Data type
-
Data type
Text
Field size
3
Field size
4
Format
-
Format
-
Decimal
-
Decimal
-
Sample
100
Sample
2100
Input mask
000
Input mask
-
Validation Rule
1{0}3














Table no
3


Table name
Tutor


Purpose
To store Tutor data


Field no
3.1
Field no
3.3
Field name
TutorNo
Field name
TSname
Primary Key
Yes
Primary Key
No
Data type
Text
Data type
Text
Field size
6
Field size
7
Format
-
Format
-
Decimal
-
Decimal
-
Sample
BD1111
Sample
Plummer
Input mask
LL0000
Input mask
-
Validation Rule

Field no
3.4
Field no
3.2
Field name
RoomNo
Field name
TFname
Primary Key
No
Primary Key
No
Data type:
Text
Data type
Text
Field size
3
Field size
7
Format
-
Format
-
Decimal
-
Decimal
-
Sample
100
Sample
Magda
Input Mask
-
Input mask
-










Table No
4


Table Name
Course


Purpose
To store course data


Field no
4.1
Field no
4.3
Field name
CourseNo
Field name
Courseyear
Primary Key
Yes
Primary Key
No
Data type
text
Data type
Text
Field size
6
Field size
3
Format
-
Format
-
Decimal
-
Decimal
-
Sample
CX1342
Sample
One
Input mask
>LL0000
Input mask

Validation Rule

Validation Rule

Field no
4.2
Field no
3.1
Field name
Coursetitle
Field name
TutorNo
Primary Key
No
Primary Key

Data type
Text
Data type

Field size
25
Field size

Format

Format

Sample
GCSE maths
Decimal

Input mask
-
Sample
BD1111








Table No
5


Table Name
Enrol


Field no
1.1
Field no
5.3
Field name
StudentNo
Field name
Fees
Primary Key
No
Primary Key
No
Data type

Data type
Number
Field size

Field size
Double
Format

Format
Fixed
Decimal

Decimal
2
Sample

Sample
300
Input mask

Input mask

Validation Rule

Validation Rule





Field no
4.1


Field name
CourseNo


Primary Key
No


Data type



Field size



Format



Decimal



Sample



Input mask



Validation Rule






Student Number:                                          Surname:
Fname:                                                             Area:
Street:                                                                    DOB:
Gender:
 
Student:
 







Tutor Code:                                           Room Number:
TFName:                                                  
TSname:                                                          
 
Tutor:

 







Course Code:                                            Tutor Number:
Course title:                                                  
Course year:                                                          
 
Course:

 






Room Number:                                       
Phone:                                                   

 
Room:

 





Student No:                                       
Course Code:                                                  
Fees:                                                          
 
Enrolment