• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet security

Extracts from this document...


Security Issues and Legal Constraints of Websites How might someone obtain information about another person on the internet? Identify a website where this may happen. Users can easily obtain information from unknown people online such as by viewing at their profile where their contact details are sometimes their bank details are too. These websites are MySpace and Facebook which are all popular for the users because they are social network group. When people give information about them self online, they make it easier for hackers to find people offline. So people should think carefully about who they give out their address to, what their phone number is or which school / job they go to. What potential security issues could this access cause? The potential security issue caused are that they can see people details which may include their full name, date of birth, address and even their bank account. ...read more.


Organisations that stores personal data must take by certain rules: - They must protect the data from unauthorised access. - -they must not pass on the data to other organisations without the individual's permission. - The data they hold must be accurate and up to date, and must not be held for longer than needed. What must a site like www.hsbc.co.uk do to comply with this law? HSBC must comply with the law data person act 1998 such as they keep personal details secure, in all circumstances. This means that organisations cannot use the data people give to them and used it for themselves. For e.g. a member of HSBC send an email to them. The company cannot use email but replying to person who bellowing to. By what methods could a hacker infiltrate a commercial web site like www.hsbc.co.uk? Hacker can infiltrate HSBC website by using other people user name as they have their information. ...read more.


The companies need use encrypted which is a way of making data unreadable to expect the receiver. What can users do to minimise security risks when online? Users should use software protections before going online to prevent attacks from hackers or unwanted viruses which could result the PC stop responding. Antivirus: Is a software helps protect users against viruses. Anti virus scan hidden viruses in an email messenger or web page which could damage the computer system. Anti virus helps disable the virus and prevent it from damaging user's computer. So that users can surf the website safely without worrying about fraud or being attack by viruses or other threats. Spyware: Is software that hides itself somewhere on pc users collecting information about users and what they do on the internet. Users can remove spyware by installing software like Adware that will scan user's pc can remove the unwanted spyware. Firewall: Is software that prevents unauthorised come into user's network. So that cannot steal people privacy. ?? ?? ?? ?? Unit 21: Website Production and Management ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    This must be done before information is used because unlawful usage of data possesses a �5000 fine in a magistrate's court and an unlimited fine in a High court. If a person suffers due to unlawful usage of data they also can claim compensation from the company and the courts, adjusted with the severity of the case, decide this amount.

  2. Ways of Promoting a Website

    * Keywords in the domain name again will increase the chances of a higher website ranking * A page title is very important - it will be the first thing people will see in the search engine and if typed correctly will portray a good image before they have even

  1. Free essay

    Setting up and E-Commerce Site

    Let's have a look at what some of the firms are offering and how we can go about the setup stage. There are two parts to selling on the Net. Firstly we have the task of getting people to your site, and selling to them once they get there.

  2. Security Issues of E-Commerce

    If data is protected in the correct way then these security errors cannot be achieved. There is the data protection act that has been implemented and is a standard law that is meant to combat this. We can see that the above security issues are all very important to consider when choosing to use e-commerce.

  1. Firewall Protection

    also who your ISP is, and might decide to invest further time in cracking into your computer. With a firewall, you can set the firewall so that any communication effort from remote users (in the better firewalls you may define an exception list)

  2. Smart Card System

    This API is designed to allow developers to incorporate both low-level and high-level security functionality into their Java applications. The first release of Java Security in JDK 1.1 contains a subset of this functionality, including APIs for digital signatures and message digests.

  1. Flexible Architectures in Communication Security Application

    Public-key ciphers (or asymmetric-key ciphers) use a well-known public key to encrypt and require a different private key to decrypt. The process may also be reversed to produce what is known as a digital signature. Digital signatures authenticate the sender.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    * It must be able to store the large amounts of data input into the system. * It must be able to display the contents of these files in appropriate ways according to the data that has been requested to be shown.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work