hardware failure
timnet

Memo
To: john tucker
From: tinashe marecha
CC:
Date: September 16, 2009
Re: the technology systems performing reliably
Dear Sir im writing to inform you that our security systems isn’t working to good I turned a blind eye but then I released this was important I had noticed that our security is failing because on some of our security doors the padlocks are not even working to be honest there actually falling of the door. The doors are really weak a two year old could open it by just pushing it with their little finger. We need some new CCTV cameras because the ones we currently have are not really working to there use’s you see these we really need these components to have better security

is getting a pair :p
activity 5.9



Q1.
· Add locks
· Add fire extinguishers to prevent fires
· Maybe get some fire proof materials
· Put important components on higher ground incase of a flood.

Q2.a computer hacking device
· Steal some identification to get you etc.swipe card.
· Pick the lock
· Examine the environment and find out ways to get in.
· Steal some identity a portrait the victim like a security guard.
· Use fire



They would be powerful it would cost a lot for people but it would be worth it a lot of money and firewalls unblock unwanted stuff if its setup right.

activity 5.8

Activity 5.8
Advantages and disadvantages
· Could get stolen and whoever stole it could use it for the wrong reasons.
· Could run out of power.
· Gives the person with the swipe card access only to pacific areas.
· Can be broken quite easily.
· Could sometimes not work if maybe tampered with.
· Access codes may sometimes be stolen.
· Easier to break in if your use a keyhole.



A door security room is were someone has a key or or a swipe for only them to get in.
They a better advanced door security rooms which can prove the person is who they say they are etc.thumb scanner and an eye scanner. Depends on what you’re keeping secure
How big you need the door or the maximum security like a bank volt has a big security etc.deadlocks fingerprints and combination codes.


To keep a system available 24/7
· Back up generator
· Check the system regularly
· Back-up service


activty 5.7


Activity 5.7: the Klez virus



The Klez virus is at its ninth year of existing across the World Wide Web experts state that it maybe provider of new viruses of combination of pernicious approaches from pc to another anti virus software makers Symantec and McAfee both report that there’s at least 2000 new infections everyday with no sign or letups.
How it works:
Klez is the example of what we call a blended threat, a software that acts like it distributes itself portraying a virus but pretends but sometimes behaves like a worm and at other times like a TROJAN HORSE.Klez normally arrives in in-boxes of unexpected victims as a file attachment it uses tricky names like “Klez removal tool”. When the victim double clicks the attachment or even views it Then well your stuffed!!!






Activity 5.7: the Klez virus


Trojan horse vs. Klez
· Trojan horses are designed to let a hacker access to a targets computer system.
· Klez infects Microsoft systems.
· Trojan horse can control another computer system.
· Klez comes through an email even viewing it activates it.
· Trojan horse can control components like downloading software’s.





Shield Deluxe 2009
$19.99
Go To
Read
Free


Webroot 6.0
$39.95
Go To
Read
Free


BitDefender
$29.95
Go To
Read
Free


CA 2009
$49.99
Go To
Read
Free


McAfee 2009
$39.99
Go To
Read



Norton 2009
$39.99
Go To
Read



ESET NOD 32 3.0
$39.99
Go To
Read
Free



Free


CA 2009
$49.99
Go To
Read
Free

it i estate agency

i done some research wether estat agencys use information technologoy

and i found out that they did use rather alot of technologoy he just some of the examples

  • mobile phone to communicate with there work coolegues
  • pcs/laptops to view houses for clients
  • screens to show slideshows of homes avaiblie
  • they use tablets to advertise the houses
  • they use usb sticks to transfer data about the homes.
  • they send each other picture messages of availabe homes