Preview

data security process

Satisfactory Essays
Open Document
Open Document
352 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
data security process
1) Name and describe data security process.
It is about keeping data safe. Many individuals, small business and major companies rely heavily on their computer systems. If the data in these computer systems is damaged, lost, or stolen, it can lead to disaster. Key threats to data security. Such process can be done by using Passwords and encryptions.
2) Explain Internet and Intranet with a basic difference
Internet is a worldwide system of interconnected computer networks, when you connect your computer to the Internet via your Internet service provider; you become part of the ISP’s network which is connected to other networks that make up the Internet. It is available to the public.
Intranet is a network that works like the internet but is only available within a particular organization and not to the public. An intranet may have web pages used to share companies’ specific data within that company such as internal telephone numbers, details of employees, companies etc.
3) Is switch smarter than hub? Justify your answer
Yes it is as it does essentially what a hub does but more efficiently but paying attention to the traffic that comes across it. It can also learn the particular addresses are so that most of the network traffic only goes where it needs to go rather than to every system.
4) Why data need to be converted analog to digital and vice versa? Which device is used to do so?
Computer can understand only digital data in the form of 1’s and 0’s. So in order to process it. It has to be converted from analog into digital form with the help of analog Digital converter.
To convert data from digital to analog a device (digital to analog converter) is required.
5) How to secure data network. Explain minimum two ways.
1) Firewall: A firewall blocks unauthorized connections being made to your computer or LAN. Normal data is allowed through the firewall but all other data is blocked.
2) Anti Virus: It is software where it helps us to protect our computer

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    M150a Review Questions

    • 2913 Words
    • 11 Pages

    Internet : Refers to the physical interconnection of large numbers of data communications networks to form a huge , publicly accessible " network of networks " .…

    • 2913 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Telecommunications relies on the transmission of data through different mediums such as a telephone, radio, television, among others. These transmissions are done through two signal types, which are analog and digital. Analog is the first type of transmission type because it is the older and has been around for a lot longer than digital. On the other hand, even though digital transmission is a younger generation, it is currently use in more devices than analog. Each signal has its advantages and disadvantages, but in most scenarios, both need to work together to create an effective transmission. Technologies that convert analog into digital and vice-versa have been created for this purpose. Converting the signals allows for a more cohesive environment because each can be adjusted to work on devices or mediums not made for them originally. The next part of this paper covers the technologies use to convert these signals.…

    • 1056 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Chapter 3 Review

    • 316 Words
    • 2 Pages

    (D) A digital signal requires a repeater, which retransmits the signal in its original form, and an analog signal requires an amplifier, which increases the strength of both the signal and the noise it has accumulated.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    “Digital-to-analog conversion is a process in which signals having a few (usually two) defined levels or states (digital) are converted into signals having a theoretically infinite number of states (analog)”, as explained by Rouse (2005). A modem will control outgoing digital signals from a computer, and process those signals into audio-frequency tones which is then transmitted over a twisted pair (copper wire) telephone line. An analog-to-digital conversion is the opposite process of a digital-to-analog conversion. That same modem can receive incoming audio-frequency tones that were transmitted from the twisted pair telephone line, and convert those tones into the defined levels of digital signals. If an analog-to-digital converter is positioned after a digital-to-analog converter, within a communications circuit, the digital signal output will be identical to the digital signal input (Rouse, 2005).…

    • 1664 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Data Encryption

    • 3732 Words
    • 15 Pages

    Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control.…

    • 3732 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    Overview of Firewalls

    • 1576 Words
    • 7 Pages

    A packet-filtering firewall is a software or hardware firewall that is router and/or appliance based that is configured to monitor the incoming and outgoing packets. The packet-filtering firewall checks the information contained in the packets' TCP and IP headers based on which it accepts or denies packets. Most packet-filtering firewalls forward or deny a packet based on the packet's full association that consists of the Source address, the Destination address, the Application or protocol, the Source port number and the Destination port number. A packet-filtering firewall primarily operates only at the network layer or layer 3 of the OSI model.…

    • 1576 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Dac, Dac0808 and Adc

    • 612 Words
    • 3 Pages

    Normally analogue-to-digital con-verter (ADC) needs interfacing through a microprocessor to convert analogue data into digital format. This requires hardware and necessary software, resulting in increased complexity and hence the total cost.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Modulation

    • 4226 Words
    • 17 Pages

    The equipment that is used to convert digital signals into analogue format is a modem. The word modem is made up of the words “modulator” and “demodulator”.…

    • 4226 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Digital radio is the transmission and reception of sound that has been processed using technology comparable to that used in compact disc (CD) players. In short, a digital radio transmitter processes sounds into patterns of numbers, or "digits" – hence the term "digital radio." In contrast, traditional analog radios process sounds into patterns of electrical signals that resemble sound waves.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    1.1 There are many different risks to data security examples of the risks are theft, loss, neglect and insecure practises. Data security means to resist/protect your records and files from unauthorized users or destructive forces. I have numerous procedures to protect are data from unauthorized users are main ones are firewall protecting are network and computers from being hacked. Another one is that only certain users can get access to these sensitive systems, these users have their own personal passwords but even when they are logged on they can only get access to the data if they have the second password for system we used to store and protect are data.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Digital Data Transmission

    • 895 Words
    • 4 Pages

    Digital Data -- can be represented electronically(by sequences of specified voltage levels) or optically Digital Transmission…

    • 895 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This assignment is to explain the difference between Analog Transmission and Digital Transmission, using both text and diagrams to explain both the mechanisms and the +/_ aspects. Also list the advantages and disadvantages of each technique and current uses for each.…

    • 1269 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Communications

    • 469 Words
    • 2 Pages

    Data communications (Datacom) is the engineering discipline concerned with communication between the computers. It is defined as a subset of telecommunication involving the transmission of data to and from computers and components of computer systems. More specifically data communication is transmitted via mediums such as wires, coaxial cables, fiber optics, or radiated electromagnetic waves such as broadcast radio, infrared light, microwaves, and satellites.…

    • 469 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Digital Television

    • 847 Words
    • 4 Pages

    On November 1, 1998 computer companies, television makers, broadcasters, and program suppliers have made a transition from analog to digital television. When the FCC passed a law forcing the networks to change from an analog broadcast to a digital broadcast, all the above mentioned industries have been scrambling to get a jump on their competition.…

    • 847 Words
    • 4 Pages
    Good Essays