You are on page 1of 20

ICT PROJECT

By Hareth Hameed of VIII-C


Secondary Storage Devices
Secondary Storage Devices - Intro

 Secondary storage refers to any device that can store


data, in addition to main memory. Secondary storage
devices are non-volatile and are typically high capacity,
portable or both.
 Types of Secondary storage:
 Magnetic storage
 Optical storage
 Solid State storage devices
Secondary Storage Devices –
Why does a computer need secondary storage?

 It is possible for a computer not to have or use secondary


storage (e.g., dumb terminal). However, for most
computers and users, secondary storage is required
because of the need to permanently store some data to a
computer. Without primary storage, if you were working
on a document and the power turned off, everything
would be lost because primary storage is temporary.
However, a computer with secondary storage that saved
the file before the power turned off would be able to
recover the last saved version of the file.
Secondary Storage Devices –
How much secondary storage is required for a computer?

 The computer only needs enough secondary storage for


the operating system and hardware drivers. However, we
always recommend getting as much secondary storage as
you can afford since any installed programs, pictures,
music, or other data requires secondary storage.
Secondary Storage Devices –
Uses, advantages and disadvantages of storage media:
Optical Storage Media

 CD, DVD and Blu-ray discs are forms of


optical storage. They are a useful lightweight
media for transporting data and programs.
 Data is written onto the disc by a laser and is
read from the disc by another laser. The discs
are cheap, but they are vulnerable to
scratches. They cannot store as much data as
a hard drive. A CD stores up to 800 MB, a DVD
holds up to 4.7 GB and a Blu-ray holds up to
50 GB.
 You need to have a CD, DVD or Blu-ray writer
on your computer to write information to the
discs. CD, DVD and Blu-ray discs are useful
for creating film or music discs which are
compatible with hardware such as DVD
players.
Optical Storage Media

 CD/DVD disks
 Optical discs that use the same
technology as music CDs. They store up
to 700MB of data. CDs can be used for
multimedia applications such as
encyclopedias and can store pictures,
sounds and video clips or anything else
that will fit.
 DVDs are the same physical size as CDs
but hold much more data - a single
sided disc can hold up to 4.7 GB. DVDs
are commonly used for storing video so
you will often see them measured in
minutes, eg 4.7 GB = 120 minutes.
Optical Storage Media

 Blu-ray discs
 Blu-ray discs are another example
of optical storage media. However,
they are fundamentally different
to DVDs in their construction and in
the way they carry out read-write
operations.
NETWORK SECURITY
WHAT IS NETWORK SECURITY?

 Network security is the practice of preventing and protecting against


unauthorized intrusion into corporate networks. As a philosophy, it
complements endpoint security, which focuses on individual devices; network
security instead focuses on how those devices interact, and on the connective
tissue between them.
 The venerable SANS Institute takes the definition of network security a bit
farther:
 Network security is the process of taking physical and software preventative
measures to protect the underlying networking infrastructure from
unauthorized access, misuse, malfunction, modification, destruction, or
improper disclosure, thereby creating a secure platform for computers, users,
and programs to perform their permitted critical functions within a secure
environment.
NETWORK SECURITY - INTRO

 Computer networks have many benefits but they also create security risks. By
connecting computers it is possible to share personal data easily. However, it
makes computers more vulnerable to interference from other people.
 Anyone sharing personal information, eg bank details, wants to be sure that
they are safe and secure. Most businesses and organisations employ network
managers or administrators to manage the security of their networks.
 There are many potential threats to a network and various ways to protect
them:
 Anti-virus software
 Firewalls
 Secure passwords
 Access levels
 Encryption
NETWORK SECURITY METHODS

 To implement this kind of defense in depth, there are a variety of specialized


techniques and types of network security you will want to roll out. Cisco, a
networking infrastructure company, uses the following schema to break down
the different types of network security, and while some of it is informed by
their product categories, it's a useful way to think about the different ways to
secure a network.
NETWORK SECURITY METHODS

 Access control: You should be able to block unauthorized users and devices from accessing
your network. Users that are permitted network access should only be able to work with the
limited set of resources for which they've been authorized.
 Anti-malware: Viruses, worms, and trojans by definition attempt to spread across a
network, and can lurk dormant on infected machines for days or weeks. Your security effort
should do its best to prevent initial infection and also root out malware that does make its
way onto your network.
 Application security: Insecure applications are often the vectors by which attackers get
access to your network. You need to employ hardware, software, and security processes to
lock those apps down.
 Behavioral analytics: You should know what normal network behavior looks like so that
you can spot anomalies or breaches as they happen.
 Data loss prevention: Human beings are inevitably the weakest security link. You need to
implement technologies and processes to ensure that staffers don't deliberately or
inadvertently send sensitive data outside the network.
 Email security: Phishing is one of the most common ways attackers gain access to a
network. Email security tools can block both incoming attacks and outbound messages with
sensitive data.
NETWORK SECURITY METHODS

 Firewalls: Perhaps the granddaddy of the network security world, they follow the rules
you define to permit or deny traffic at the border between your network and the internet,
establishing a barrier between your trusted zone and the wild west outside. They don't
preclude the need for a defense-in-depth strategy, but they're still a must-have.
 Intrusion detection and prevention: These systems scan network traffic to identify and
block attacks, often by correlating network activity signatures with databases of known
attack techniques.
 Mobile device and wireless security: Wireless devices have all the potential security
flaws of any other networked gadget — but also can connect to just about any wireless
network anywhere, requiring extra scrutiny.
 Network segmentation: Software-defined segmentation puts network traffic into
different classifications and makes enforcing security policies easier.
 VPN: A tool (typically based on IPsec or SSL) that authenticates the communication
between a device and a secure network, creating a secure, encrypted "tunnel" across the
open internet.
 Web security: You need to be able to control internal staff's web use in order to block
web-based threats from using browsers as a vector to infect your network.
WHAT IS DATA PROTECTION ACT?

 The Data Protection Act (DPA) is a United Kingdom Act of Parliament which
was passed in 1988. It was developed to control how personal or customer
information is used by organisations or government bodies. It protects people
and lays down rules about how data about people can be used.

 The DPA also applies to information or data stored on a computer or an


organized paper filing system about living people. Organisations that do not
adhere to the rules set out by DPA risk prosecution by the Information
Commissioner’s Office (ICO) where fines can reach up to £500,000 and even
imprisonment.
DATA PROTECTION ACT

Misuse and unauthorised The purpose of the Data


access to information Protection Act
 With more and more organisations  The 1998 Data Protection Act was
using computers to store and process passed by Parliament to control
personal information there was a the way information is handled and
danger the information could be to give legal rights to people who
misused or get into the wrong hands. have information stored about
A number of concerns arose: them.
 Who could access this information?
 Other European Union countries
 How accurate was the information? have passed similar laws as often
 Could it be easily copied? information is held in more than
 Was it possible to store information one country.
about a person without the
individual’s knowledge or permission?
 Was a record kept of any changes
made to information?
The need for the Data Protection Act

 During the second half of the 20th  Databases are easily accessed,
century, businesses, organisations and searched and edited. It’s also far
the government began using computers easier to cross reference information
to store information about their stored in two or more databases than
customers, clients and staff in if the records were paper-based. The
databases. For example: computers on which databases
 names resided were often networked. This
 addresses allowed for organisation-wide access
to databases and offered an easy way
 contact information
to share information with other
 employment history organisations.
 medical conditions  The data, information and databases
 convictions section has more on searching
 credit history databases.
SOURCES

 https://www.bbc.co.uk/bitesize/guides
 https://en.wikipedia.org/
 https://www.csoonline.com/
 https://www.experian.co.uk/business
 https://searchstorage.techtarget.com/
 Cambridge IGCSE ICT 2nd Edition (ICT textbook)
THANK YOU

You might also like