Topic 2 System Back Plus data Loss

Home Forums System design basics and Data Loss Topic 2 System Back Plus data Loss

Viewing 6 posts - 1 through 6 (of 6 total)
  • Author
    Posts
  • #6578
    Eamonn
    Keymaster

    System backup

    Slide Link

    What is data redundancy and how can it be used to prevent data loss.

    Activity A list a range of causes that can result in data loss. Choose 4 and explain by giving an example. Example user error.. User hits exit without saving and suggest how that might have been prevented

    Activity B Using an example other than school records outline the consequences of data loss.

    Activity C You have been tasked with Implementing a set of procedures to limit the risk of data loss. Details these with an explanation of why they are necessary ( use the same scenario) as in Activity B

    Components of a computer system

    Slide Link
    Past Paper Question

    A small company has a LAN connecting its various desk-top computers and peripheral devices.

    The company is going to provide Internet access to its LAN.

    (a) State the name of an additional hardware device that would be required to permit
    Internet access. [1 mark]

    (b) Explain how a firewall would help to provide security for the LAN. [3 marks]

    (c) Suggest, with reasons, two further measures that the company should take to
    safeguard its data from unlawful access via the Internet. [4 marks]

    Q What hardware component is needed to extend a LAN to a WAN?

    Q Outline 3 key differences between a Switch and a Router.

    Q What is the key difference between a HUB and a Switch?

    Q We looked at hardware components to set up a LAN what are the hardware components need to set up WLAN

    • This topic was modified 11 months, 1 week ago by Eamonn.
    • This topic was modified 11 months, 1 week ago by Eamonn.
    #6581
    ArinN_
    Participant

    System backup
    What is data redundancy and how can it be used to prevent data loss.
    – Data redundancy is when there are two identical sets of data stored in a server or in the same network. This could help prevent data loss as the second set of data would act as a backup for the primary data.

    Activity A list a range of causes that can result in data loss. Choose 4 and explain by giving an example. Example user error.. User hits exit without saving and suggest how that might have been prevented
    – Software corruption for example, poorly managed data system of Software. Suggestion: Inform the developers.
    – System/Hardware Malfunction for example, Old hard disk failed to correctly read or write the data on the disk or the reader-head is broken. Suggestion: Use raid on hard drives and make sure to keep regular backups.
    – Computer Viruses for example, the most recent largest ransomware attacks (WannaCry) or zero-day exploits. Suggestion: Always keep servers and computers updated and if necessary, use anti-viruses.
    – Natural Disaster for example, Flood, Fire, Earthquakes, etc. Suggestion: Store backups off-sites in multiple locations if possible.

    Activity B Using an example other than school records outline the consequences of data loss.
    – One example is, Adobe’s Lightroom update. They lost all the assets and data for iphone users thus a lot of people stopped using their services and there are people starting to post alternative applications that are cheaper and does the same thing as Adobes’.

    Activity C You have been tasked with Implementing a set of procedures to limit the risk of data loss. Details these with an explanation of why they are necessary ( use the same scenario) as in Activity B
    1. Backup.
    2. Make sure that the updates are correct.
    3. Have a way to reverse back.

    Components of a computer system
    Past Paper Question

    A small company has a LAN connecting its various desk-top computers and peripheral devices.

    The company is going to provide Internet access to its LAN.

    (a) State the name of an additional hardware device that would be required to permit
    Internet access. [1 mark]
    Lan Cable
    Router
    Network switch or Hub

    (b) Explain how a firewall would help to provide security for the LAN. [3 marks]
    – Because on a Lan network, typically every computer could access each other and thus a firewall would prevent unauthorized access between each computers on the network but moreover, a firewall would prevent unwanted access from outside the network and limit the number of ports opened in that network.

    (c) Suggest, with reasons, two further measures that the company should take to safeguard its data from unlawful access via the Internet. [4 marks]
    1. Do not click suspicious links.
    2. Only use computers for work.

    Q What hardware component is needed to extend a LAN to a WAN?
    – Network switch

    Q Outline 3 key differences between a Switch and a Router.
    – A router stores and use IP addresses while a switch stores MAC addresses.
    – A router lets the network access to outside while the switch is located after the router and only packet routes to each devices connected to it.
    – a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network.

    Q What is the key difference between a HUB and a Switch?
    – A hub just disperse the packets received to all the ports while a switch directly finds and sends the data to the destination.

    Q We looked at hardware components to set up a LAN what are the hardware components need to set up WLAN
    Wireless router
    Network card

    #6582
    Irfan
    Participant

    System Backup
    Activity A list a range of causes that can result in data loss. Choose 4 and explain by giving an example. Example user error.. User hits exit without saving and suggest how that might have been prevented.
    -Hardware or System Malfunction
    -Human Error
    -Software Corruption
    -Computer Viruses
    -Natural Disasters
    Example Hardware or System Malfunction. The user is using their computer when all of a sudden the hard drive crashes and data is lost. It can be prevented by the User using a computer taken care of well and when needed switching out hardware that is prone to failure.
    Example software corruption. The User is using a software that they use to schedule meetings. However for an unknown reason after saving their work. The software becomes corrupted. The user can prevent this by using software that is up to date. And making sure the software is reliable. Also having external backups either in a USB or something else.
    Example Computer Viruses. The user is doing their work only to foind out a computer virus has corrputed files. The User can prevent this by isolating User and Admin priveleges. And making sure to not download random data that could possibly have a virus. Have a virus scanner to scan downlaod files. And back up files to a external drive.
    Example natural disasters. The User has data stored on a computer that becomes destroyed by a tsunami. The User could prevent this by either moving the literal computer to a safe location. Or having external backups in another location not vulnerable to natural disasters.
    Activity B Using an example other than school records outline the consequences of data loss.
    Loss of productivity. Loss of money. Loss of trust.
    Activity C You have been tasked with Implementing a set of procedures to limit the risk of data loss. Details these with an explanation of why they are necessary ( use the same scenario) as in Activity B
    The data is every 24 hours backed up to a external drive and to a failover system. It is also backed up to a cloud storage. A external drive every 24hours is so that if the server that holds that data loses the data. The data can be given back using it. A failover system so if the server dies, and can’t be fixed a failover can take over. And a cloud storage so that if everything fails at that area and is unrecoverable. A offsite backup, far away from the accident happening on site, will help get the data back.

    Components of a computer system
    A small company has a LAN connecting its various desk-top computers and peripheral devices.

    The company is going to provide Internet access to its LAN.

    (a) State the name of an additional hardware device that would be required to permit
    Internet access. [1 mark]
    A network interface card.
    (b) Explain how a firewall would help to provide security for the LAN. [3 marks]
    -It can detect packets containing malicoius code and isolate it
    -It can detect if a program that has slipped through turns out to be spyware and make sure it cannot connect to anything outside the computer preventing it to send data.
    -It can control depending on user preferences to allow it to make it accesable by other computers to share data or not.
    (c) Suggest, with reasons, two further measures that the company should take to
    safeguard its data from unlawful access via the Internet. [4 marks]
    -Train employees to be vigilant of attacks
    -Have a strong firewall
    -Restrict access to sites that can be potentially used to launch a attack
    -Restrict downloads to only sites that can trusted to not have trojans
    Q What hardware component is needed to extend a LAN to a WAN?
    A wireless router.
    Q Outline 3 key differences between a Switch and a Router.
    1.A switch’s purpose is to create a system of connected computers. And a routers purpose is to connect those netwroks together.
    2.A switch is focued on sending data on the data link level of osi whilst a router is focused on sending data at the network level of osi.
    3.A switch uses MAC addresses to identify devices. Whilst a router uses IP addresses to identify differenct devices.
    Q What is the key difference between a HUB and a Switch?
    A HUB sends data to all devices. A switch howeveer only sends data to the device it needs to.
    Q We looked at hardware components to set up a LAN what are the hardware components need to set up WLAN
    a wireless router. Thats all.

    #6587
    Shiva Chandnani
    Participant

    What is data redundancy and how can it be used to prevent data loss.
    – It is when the same piece of data is held in two separate places in a data storage technology or whenever data is repeated. it can be used to prevent data loss so that when the primary system fails the backup system continues to run and still has all the necessary data, also called a failover system.

    Activity A, list a range of causes that can result in data loss. Choose 4 and explain by giving an example. Example user error. User hits exit without saving and suggests how that might have been prevented
    – Power Outages – There is a thunderstorm that results in the electrical grid short-circuiting results in a city-wide power outage. this can be prevented by having your home or business have a backup generator or save your data frequently as you work to limit the data lost.
    – Computer Theft – While at the park user leaves his laptop unattended to use the bathroom and when he returns his laptop is stolen. This is preventable by carrying your computer with you at all times when in a public place.
    – Liquid Damage – User spills coffee on his computer’s CPU resulting in internal damage. This is preventable by not keeping liquids next to computers or have a liquid container with a lid.
    – Viruses & Malware – User downloads a fake software update through his email and his computer ends up getting a virus. This is preventable by being aware of different methods of receiving viruses or by installing anti-virus software onto your computer’s system.
    – Hackers and Insiders
    – Software Corruption
    – Hard disk Crash

    Activity B Using an example other than school records outline the consequences of data loss.
    – If a hotel loses its online data, it has lost all customer room bookings, records of which rooms each customer is staying at, records of the payment required by each customer. The hotel would have to redo all bookings, bother their customers with the allocation of hotel rooms and further information which only results in customer dissatisfaction resulting in a bad reputation for the hotel.

    Activity C You have been tasked with implementing a set of procedures to limit the risk of data loss. Details these with an explanation of why they are necessary ( use the same scenario) as in Activity B
    – Having a backup system so that if the primary system fails the backup system or failover system will take over resulting in no data loss.
    – Storing backup data/system on a cloud server.

    Components of a computer system
    Past Paper Question

    A small company has a LAN connecting its various desktop computers and peripheral devices.
    The company is going to provide Internet access to its LAN.

    (a) State the name of an additional hardware device that would be required to permit
    Internet access. [1 mark]
    – Router

    (b) Explain how a firewall would help to provide security for the LAN. [3 marks]
    – A firewall would prevent unauthorized access into the LAN system. It would monitor packages sent into the system and would protect it from unauthorized data. The firewall sets a certain group of rules that the computers have to follow in order to maintain security within the system.

    (c) Suggest, with reasons, two further measures that the company should take to
    safeguard its data from unlawful access via the Internet. [4 marks]
    – Only allow the computers to be used for work purposes by the employees. This limits the users/employees accessing certain websites that are not trustable under the the companies LAN for their personal reasons.
    – Restrict online downloads from websites that are not trusted. This limits the risk of potential breach into the LAN as websites considered not trusted by the system or firewall won’t permit downloads onto the computers.

    Q What hardware component is needed to extend a LAN to a WAN?
    – A router

    Q Outline 3 key differences between a Switch and a Router.
    – 1. A switch transfers data from one node in the network to another, while a router transfers data between two separate systems.
    – 2. A router permits the system access to the internet. while a switch only allows access with the specific LAN
    – 3. A switch works on the data link layer of the OSI model while a Router works on the network layer of the OSI model.

    Q What is the key difference between a HUB and a Switch?
    – The switch finds the destination address of the received IP packet and forwards it to the destination address, sending the required data to a specific location. While a HUB will send the packet to all devices in the system.

    Q We looked at hardware components to set up a LAN what are the hardware components need to set up WLAN.
    – A wireless router is the main component.

    #6591
    girwan
    Participant

    What is data redundancy and how can it be used to prevent data loss.

    Data redundancy is when the same piece of data is stored in multiple places. It can be used to prevent data loss as the redundant data acts as a backup if any data gets lost.

    Activity A list a range of causes that can result in data loss. Choose 4 and explain by giving an example. Example user error.. User hits exit without saving and suggest how that might have been prevented

    Natural disasters resulting in physical damage of hardware. For example : fires, floods, earthquakes etc. This cannot always be prevented but a measure that can be taken is storing data on the cloud.
    Data corruption can result in data being unreadable or unaccessible by users. Physical hardware issues like a harddrive fail. It can be prevented by replacing hardware components before they get worn out.
    Malware attack. Viruses can multiply in the computer system resulting in data being deleted. It can be prevented by training employees against phishing attacks.
    Theft : If the storage device gets stolen. It can be prevented by practicing safe and secure storage methods.

    Activity B Using an example other than school records outline the consequences of data loss.
    If data loss occurs at an organization like a financial institution then there will be a loss of consumer trust and it could hurt the future outlook of the organization.

    Activity C You have been tasked with Implementing a set of procedures to limit the risk of data loss. Details these with an explanation of why they are necessary ( use the same scenario) as in Activity B

    Employees should not respond nor click any links from suspicious emails. They should be trained to identify the legitimate emails from the fake ones.
    The in-house servers should be kept in a secure and safe room with weekly backups to the cloud servers.
    Regular maintenance and replacement of faulty drives and hardware.

    Components of a computer system

    Slide Link
    Past Paper Question

    A small company has a LAN connecting its various desk-top computers and peripheral devices.

    The company is going to provide Internet access to its LAN.

    (a) State the name of an additional hardware device that would be required to permit
    Internet access. [1 mark]
    Router

    (b) Explain how a firewall would help to provide security for the LAN. [3 marks]
    A firewall can protect a LAN from unwanted network traffic. This prevents malware or hackers gaining access to your network.
    (c) Suggest, with reasons, two further measures that the company should take to
    safeguard its data from unlawful access via the Internet. [4 marks]
    Using a VPN : A vpn will encrypt the internet connections and data can be transmitted without the risk of detection from malware or potential data thieves.
    Using SSL certificates: SSL certificate allows an encrypted link between a browser and a Web server.
    Q What hardware component is needed to extend a LAN to a WAN?
    Router
    Q Outline 3 key differences between a Switch and a Router.
    Switch works in the data link layer while router works in network layer
    It connects devices among networks while switch connects devices in the same network
    Switch uses MAC addresses while Routers use IP addresses.
    Q What is the key difference between a HUB and a Switch?
    A Hub connects multiple PCs to a single network, whereas a Switch connects various devices together on a single computer network
    Q We looked at hardware components to set up a LAN what are the hardware components need to set up WLAN
    Router, repeater, antennae, NIC’s

    #6592
    joshua7
    Participant

    System backup
    What is data redundancy and how can it be used to prevent data loss.
    – It is when there are two identical set of data stored in a different or same server. This helps prevent data loss as there is a backup for the data, which is the second set of data.

    Activity A list a range of causes that can result in data loss. Choose 4 and explain by giving an example. Example user error.. User hits exit without saving and suggest how that might have been prevented
    – Computer theft – An employee leaves a laptop unattended at a local cafe. Someone comes and takes the laptop so all the data on the laptop is lost. It can be prevented by carrying the laptop at all times or leaving it attended.
    – Virus and Malware – A user accidentally opens a spam email which ends up getting his computer a virus. This can be prevented by never opening spam emails and having regular updates to protect data.
    – Natural disaster – A user has a computer in their home with all the data. It ends up being broken when a tornado hits. This can be prevented by backing up data in a cloud or a remote location.
    – Hardware/System malfunction – While the user is using their computer, the hard disk crashes and all data is lost. It can be prevented by having regular backups in a cloud or an external harddrive and also making sure the computer is up to date and taken good care of.

    Activity B Using an example other than school records outline the consequences of data loss.
    – An investment firm stores all transaction details for SEC filings. When this data is lost, all records of transaction details are lost resulting in inability to file to the SEC. This would lead to an investigation by the SEC where the firm could be charged fines, prison time or even lose their license to trade.

    Activity C You have been tasked with Implementing a set of procedures to limit the risk of data loss. Details these with an explanation of why they are necessary ( use the same scenario) as in Activity B
    1. Having a consistent and regular backup to the cloud. This is to ensure that the data is also kept somewhere safe.
    2. Making sure that the software and the hardware are all up to date. This is to ensure that there wouldn’t be any malfunctions.
    3. Having a backup system so that if the current system fails, the backup system can kick in which would allow it to have a less amount of data loss as the new data could be imputed straight into the backup system.

    Components of a computer system
    Past Paper Question

    A small company has a LAN connecting its various desk-top computers and peripheral devices.

    The company is going to provide Internet access to its LAN.

    (a) State the name of an additional hardware device that would be required to permit
    Internet access. [1 mark]
    Hub

    (b) Explain how a firewall would help to provide security for the LAN. [3 marks]
    – A LAN network would typically allow every computer to access each other. Having a firewall means that without a key, others would not be able to access it. This would prevent unauthorized access which will ensure security.

    (c) Suggest, with reasons, two further measures that the company should take to safeguard its data from unlawful access via the Internet. [4 marks]
    – Use a VPN to ensure all activities done on the internet are encrypted and to prevent potential malware.
    – Computers should only be used by employees for professional purposes. This would prevent employees from downloading certain things from the internet.
    – Have a strong firewall to help increase security

    Q What hardware component is needed to extend a LAN to a WAN?
    – Wireless router

    Q Outline 3 key differences between a Switch and a Router.
    – A router allows the system to access the internet, while the switch only allows access to a specific LAN.
    – A router connects to various networks simultaneously, while the switch connects to various devices simultaneously.
    – A router uses IP address while the switch uses MAC address.

    Q What is the key difference between a HUB and a Switch?
    – A switch uses the IP address of the data packets to ensure that the data is sent to the correct device, however the HUB sends the data packets to all connected ports rather than to the correct device.

    Q We looked at hardware components to set up a LAN what are the hardware components need to set up WLAN
    – Wireless routers and access points

Viewing 6 posts - 1 through 6 (of 6 total)
  • You must be logged in to reply to this topic.
Scroll to Top