Please enable JavaScript.
Coggle requires JavaScript to display documents.
unit.9 - Coggle Diagram
unit.9
network policies
Network policies are documents outlining the rules that users are required to follow while using a computer network. Following its publication, network users will be expected to adhere to the rules.
-
-
activities that are not allowed on the network, such as gambling and installation of unauthorised software
Acceptable and unacceptable use of resource, such as printers
lossless
Lossless compression uses an algorithm to compresses data into a form that may be decompressed without any loss of data, returning the file to its exact original form.
It is preferred to lossy compression when the loss of any detail, for example in a computer program or a word-processed document, could have a detrimental effect.
A simple lossless compression on a word-processed document replaces common strings, such as ‘the’, with a token such as the symbol , making a 2 byte saving every time the word ‘the’ occurs.
-
network security
-
-
To secure a network requires appropriate level of access (restricting people to the data/software they need to do their jobs), secure passwords and encryption (coding the contents of emails, etc.).
-
lossy compression
-
-
Lossy compression is used to compress multimedia data, such as sound and video, especially in applications that stream media over the Internet.
disaster
A disaster recovery policy outlines all the processes that must be carried out in the event of a disaster, such as data loss or a manmade error, to ensure that the business is able to perform normally within a short amount of time. Disasters include:
fire, flood, lightning, terrorist attacks etc.
hardware failure, e.g. power supply unit failing
software failure, e.g. virus damage
accidental and malicious damage, e.g. hacking
-
before the disaster: risk analysis, preventative measures and staff training
-
after the disaster: recovery measures, purchasing replacement hardware, reinstalling software, restoring data from backups
-
encryption techniques
Encryption is using an algorithm to convert data into a form called cyphertext that cannot be easily understood by people without a decryption key.
When data is encrypted, the Xor logical operator is sometimes used.