BSBITB511 Establish and maintain a network of
digital devices
Assessment 1- computer network and legislation
Presented by Wai Man Lee(BBI000935)
Computer network
Computer network is a group of computer systems and other computing hardware
devices that are linked together through communication channels to facilitate
communication and resource- sharing among a wide range of users.
The Key Principles of Computer Networking
- Information sharing: The ability to share information quickly and inexpensively
has proven to be one of the most popular uses of networking technology. It
describes the exchange of date between various organizations, people and
technologies.
- Hardware and Software sharing: Hardware is a physical device while software
is a program. Hardware sharing is connected with the network and all the
users of the network can use that hardware while software sharing is the
public or private sharing of computer data or space in network with various
levels of access privilege.
- Centralizing administration and support: Networking computers can simplify
support tasks as well. It is far more efficient for technical personnel to support
one version of one operating system.
For each principle of network, identify an example of how it can apply to the
scenario outlined.
In computer networking, a workgroup is a collection of computers on a local area
network (LAN) that share common resources and responsibilities. In the scenario,
the computer used to use the stand-alone network for the business. The staff need
to share the information via the email, USB and so on. Everything need to share via
the platform. However, workgroups organize PCs as peer-to peer local networks that
facilitate easier sharing of files, internet access, printers and other local network
resources. Each computer that is a member of the group can access the same
resources being shared by the others, and in turn, can share its own resources if
configured to do so. Workgroups can contain many computers but work best with 15
computers or less. In this condition, the staff will work more efficiency due to the
network system has been changed. They do not need to print out the document that
need to share to other or ask their email address for transferring the document.
The workgroup software and hardware sharing becomes more popular. For instant,
the app in Microfsoft Windows for Workgroups called Schedues+ could help the staff
or network users to regulate and organize the meeting properly. WOSA is another
Microsoft system that connect the workgroup together based on the message
transaction system, network safety and so on. Therefore, the staff of the charity
organization can share the software and hardware without another computer’s user
consent.
If the administrative power is centralised in a single centre, the policy taking and
policy implementation both become very easy. A great advantage of centralization is
that it frees administration from various complexities. It also offers greater security
over decentralized systems because all of the processing is controlled in a central
location. 15-20 staff company is not a small business, there is important to provide
the security network to the worker. Under workgroup computer network, there is a
central computer to control all the computer. Even all the computer can share the
information, software and hardware easily, there is a central computer to monitor all
the activities.
Identify relevant legislations, codes and standards and provide a brief
summary and each
Computer Misuse Act 1990- creates offences of unauthorised access and
interference with computers and data.
Communication Act 2003- creates offences of improper use of a public
communication services and dishonestly obtaining electronic communications
services.
Investigatory Powers Act 2016- controls the interception of traffic on networks and
creates powers for the police and other investigating authorities to require networks
to provide information about their users and their use of networks.
Data Protection Act 2018- establish requirements on anyone holding personal data
on a computer or any other organized filing systems.
Privacy and Electronic Communications Regulations 2003- contains detailed
restrictions on the use of personal data in electronic communications.
Police and Justice Act 2006, section 37- create new offences relating to the
making, supply and obtaining of tools used in the existing Computer Misuse Act
1990 offences.
For each identified legislation, code and standard, briefly state any impact it
may have on the implementation of a computer network for the scenario
outlines
Computer Misuse Act 1990- The legislation was created to criminalize
unauthorized access to computer systems, and deter serious criminals from using a
computer in the commission of a criminal offence or seek to hinder or impair access
to data stored in a computer.
Communication Act 2003- The legislation has had wide-ranging effects on the
media and telecommunications industries, has been designed to incorporate internet
activity. For instance, the people access and use the WIFI that they did not pay for it.
Investigatory Powers Act 2016- Initially, communication service providers, or any
company that’s involved in the communication od data between users, were forced
to retain internet connection records for up to a year. These records were essentially
a list of web domains vistied and did not include what one actually did on the
website. Many authorites-ragning from the Metropolitan Police to the Department for
Work and Pensions- had access to these records. These authorities did not need a
warrant to access internet connection records when conducting an investigation.
However, as a result of legal challenges, authorities must now secure a warrant in
order to obtain the records from CSPs, except in the case of serious crime.
Data Protection 2018- It designed to modernise data protection laws to account for
new innovations and digital platforms that continually expand the scope of data
collection.
Privacy and Electronic Communications Regulations 2003- The legislation
regulate all forms of electronic communication, is not limited to processing of
personal data related to living individuals but allow Member States to redef in the
split between individual and corporate subscribers to communications services, so
giving corperate subscribers the possibility of protection which may vary from
Member State to Member State.
Police and Justice Act 2009, section 37- Organizations and individuals involved in
research or development of security tools, or in training others to use them, should
be aware of the Crown Prosecution Service’s Guidance to Prosecutors to ensure
that their activities are not caught by these provision.