RIPA

The Regulation Of Investigatory Powers Act gives certain authorities the ability to use computers to track, spy on and survey members of the public for reasons of national security.

 

Some of these powers they are given are:

Interception of a communication

Use of communications data

Directed surveillance

Convert human intelligence sources

Intrusive surveillance

 

 

 

 

 

 

 

 

SDLC

SDLC stands for systems development life cycle and is a set of stages that are followed in order to produce a type of system.

sdlc

Problem definition stage- An analyst determines why the system is needed and communicates problems.

Feasibility study- Analyst carries out enquiries to see if the system is possible / feasible

Information Collection- Analyst collects more information about the problem e.g. interviews, questionnaires, meetings

Analysis-  Data flow diagrams, Flowcharts…

Design- Planning of the system design

Implementation- Construction of the system

Testing- The process of testing the software for errors through inputting normal and abnormal data

Evaluation- The client and an analyst evaluate the system to ensure the requirements have been met

Installation- The process of using the system in a real situation

Maintenance- Ensuring the system continues to run properly

 

 

 

 

 

 

 

 

 

Client Server vs Peer to Peer

Client Server

A network organisation in which clients use servers to get resources. The servers maintain a database of users, passwords and access rights to provide security on the resources that it uses.

 

Peer to peer

A network organisation where devices share resources and data directly with each other. This means there is no need for a server, router or switch. Data can be saved or accessed on another stations local storage.

 

 

Computer Misuse Act

The computer misuse act is a legislation which defines electronic vandalism, unauthorised access to computer systems and information theft.

 

Part 1:

Unauthorised access to computer material. For example, accessing data or programs which you should not have access to.

 

Part 2:

Unauthorised access with intent to commit further offences. For example, accessing someone’s details to commit fraud.

 

Part 3:

Unauthorised access with intent to impair the operations of a computer. For example, Sending a virus that causes a computer to malfunction.

 

 

Data Protection Act

Data Subject: Anyone who has data stored about them.

Data Controller: Organisation storing data on data subjects. (e.g. Facebook)

Information Commissioner (ICO): Head of the data protection agency who ensures data controllers use data properly.

Principles:

  1. Data should be processed fairly and lawfully
  2. Data should only be used for the purpose specified in the data protection act
  3. Data should be relevant and not excessive
  4. Data should be accurate and up to date
  5. Data should only be kept as long as necessary
  6. Individuals have the right to see data stored about them
  7. Security must be in place to stop unauthorised access of data
  8. Data may not be transferred out of the EU unless the country has adequate data protection legislation

 

 

 

TCP/IP

TCP stands for Transmission control protocol

IP stands for Internet protocol

It is the most common general purpose standard protocol and allows any networked computer to communicate with each other whatever their equipment.

TCP/IP is made up of four layers:

Application-  Provides network services to applications

Transport- Provides the transmission of data

Internet- Contains the packet construct that will be transmitted.

Link- Carries out encapsulation of IP packets to physical hardware access

 

 

DNS

DNS – domain name system

A domain name shows the location of a site on the internet and each site has a unique one.

For example:

domain

DNS maintains a directory of domain names and translates them into IP addresses.

This is necessary because domain names are easy for people to remember but computers access websites through there IP addresses.

IP address- Internet protocol- uniquely identifies a physical computer linked to the internet.

Uses the format 158.152.1.58