• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Viruses

Pose the biggest threat under the heading malicious damage. A virus is a program that replicates itself automatically and usually carries with it some payload which causes damage.

Trojans

A program that performs a legitimate task but also carries with it an undesirable function.

Worms

A program that keeps replicating itself automatically and as it does so it takes more and more disk space and also uses a greater proportion of the system's resources for each copy.

How can viruses be spread?

- external/internal email


- the organisations intranet


- shared disk


- banner advertisements


- downloads

How can viruses be prevented?

- up-to-date virus checking software


- do not open emails from unknown sources


- have a clear acceptable use policy


- train staff to be aware of the problems

Backup

Keeping copies of software and data so that the data can be recovered should there be a total loss of the ICT system.

Where should you keep backups?

It is always best to keep backups off site but this is sometimes inconvenient. If inconvenient, they should be kept in a fireproof safe or online.

Procedures for backup:

- Use a different tape or disk each day and have a system for rotating them


- Make one person responsible for the taking of backups


- Keep backups safe and preferably off site


- Rehearse backup recovery procedures

Backup strategy

- What


- When


- How


- Storage

What

- Decide what needs to be backed up


- e.g. data and programs

What are the different types of backup?

- full backup


- incremental backup


- differential backup

Full backup

Involves making a copy of all the files on the system.

Incremental backup

Backs up the files which have changed since the last full backup. Useful because it it possible to have an audit trail of the file changes.

Differential backup

A cumulative backup of changes made since the last full backup.

When

How often backups are taken depends on how much data changes and how often it changes.

Individuals

- Backups need to be taken regularly and not just when you remember


- Many people take backups at the end of a session of work


- Not so many people bother to make backups of media such as music, images and video mainly because of the time it takes

Organisations

- Employ computer professionals who realise that the risk of losing data is real


- More systematic


- Taken at the end of the day or more frequently depending on the volume of work


- Taken in the evening when the processing power is not needed for other tasks

How

Depends on the amount of storage capacity needed and if there is the requirement for the data to be recovered immediately.

Backup storage devices and media

- Storage capacity needed


- Portability of device/media


- Speed of data transfer


- Speed of access


- Ability to be connected to different computers or other devices

Magnetic tape

An ideal backup medium - it is cheap and has a high storage capacity. They are removable media which means they can be exchanged with any compatible drive.

Magnetic disk

Takes the contents of one magnetic disk and copies it onto a different magnetic disk.

Optical media

Includes CD-ROM, CD-RW etc. The main problem with optical storage for backup is that the transfer rate is low, which means taking backups takes longer.

Pen/flash drives

Very popular as they are small and portable and are ideal for backing up small amounts of work. They are easily lost or stolen.

Recovery procedures

- Alternative accommodation should the building be destroyed


- Availability of staff at short notice


- Availability of hardware to run the backups on


- Training for staff to instruct them how to get things back to normal again


- Availability of alternative communication lines