Archive for November, 2011

week 10 Lo4

Posted in Uncategorized on November 11, 2011 by stephenmcguire91

Perfomance Criterion (a)  

  1. A firewall is used to keep your computer more safe. A firewall   restricts information that enters your computer from other computers and   lets you have  more control over the data on your computer. Additionally, a firewall   provides a line of defense against people or programs, including viruses and   worms, that try to connect to your computer without invitation.

Click on the control panel from the start button, then click on the security center link so the security center will appear. if the firewall header says that it is on then you will be running Windows Firewall.
2. An internet security suite  gives us easy to use protection against viruses, spyware, spam, inappropriate content, lost files, and data corruption.
To install an internet security suite Make sure your computer meets the minimum security requirements for installing CA Internet Security Suite 2010.

  • Uninstall security software like Firewall, AntiSpyware, or AntiVirus from other vendors currently installed on your computer.
  • Ensure your computer is restarted after uninstalling the  software.
  • Save all data and close  programs that are currently running on your computer.
  • Log off all users.
  • Log into your computer as Administrator .
  • Double click the downloaded setup file.
  • The welcome screen will automatically be brought up
  • press get staarted , then next until the install button comes up then press that.

3. Anti- virus software is software that is used to stop that detects, prevents, and takes action to remove malicious software programs, like viruses and worms.
To install anti virus software once it is downloaded click on the icon that that hold the antivirus file, follow the steps that the anti virus asks you  to do such as clicking next, then click i agree when you read the terms and conditions of the anti-virus. Click on the restart after anti-virus is downloaded then finish. Once you do this the anti-virus will begin to installTo install anti- spyware you click the run button once the file download dialogue button appears. Then follow then steps in within the installer to complete the installation of Spywareby clicking next and agreeing to the terms. Finally then clicking the last finish button for it to begin downloading.
5.Spam filters are programs that are used to detect unwanted e-mails and they are used to prevent the e-mails from getting to a users  inbox.
to install spyware once downloaded click o the anti-spyware file on the desktop, this brings up a new window which you will then click on the next button. next a license agreement will turn up, you should click agree to that. Then click next, now the installation folder shall show. You will click next then finally install.

Performance criteria b

Network security starts with  the user, commonly with a username and a password. Since this requires just one detail authenticating the user name i.e. the password, which is something the user knows  this is sometimes termed one-factor authentication. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.

Performance Criteria c
1.  Download the software, once finished install the software then the user can change the content restrictions on the computer.
Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web. Content-control software determines what content will be available on a particular machine or network;

You can configure Microsoft Internet Explorer to use a proxy server to connect to the Internet. A proxy server acts as a security barrier between your internal network and the Internet, keeping others on the Internet from being able to obtain access to information that is located on your internal network.
3. Acceptable use policies are

  • A description of the instructional philosophies, strategies and goals to be
    supported by Internet access in schools
  • An explanation of the availability of computer networks to students and
    staff members in your school or district
  • A statement about the educational uses and advantages of the
  • A description of what constitutes acceptable and unacceptable use of the
  • A form for teachers, parents and students to sign, indicating that they
    agree to abide by the AUP.

4.Techniques for withholding personal information are to wipe the hard drive of the computers your getting rid of. you shouldn’t give out any personal information to any one on the Internet like passwords or
numbers. if you go to buy something online you make sure that the website is a
secure one.
5.The difference between real and spoofed phishing e-mails are these emails will  contain a web link that you click on. This link thentakes you to a login page and asked to enter your details. Most of these scammers go a long way to try and get your details, most spoof emails contain links to identical websites and users are tricked into entering their personal information. If you submit your information to  these made up websites then the fraudster has all of your details and can commit crimes using your identity.

Performance criterion d
The copyright restrictions when downloading music/video from legal sites
it is legal to be able to download music from sites authorized by copyright  holders.

It is also acceptable to copy music onto analog cassettes and specially  designated audio CD-R’s, mini-discs and digital tapes, because royalties have  been paid on those items. None of these copies can be used for commercial  purposes.