• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet security

Extracts from this document...


Security Issues and Legal Constraints of Websites How might someone obtain information about another person on the internet? Identify a website where this may happen. Users can easily obtain information from unknown people online such as by viewing at their profile where their contact details are sometimes their bank details are too. These websites are MySpace and Facebook which are all popular for the users because they are social network group. When people give information about them self online, they make it easier for hackers to find people offline. So people should think carefully about who they give out their address to, what their phone number is or which school / job they go to. What potential security issues could this access cause? The potential security issue caused are that they can see people details which may include their full name, date of birth, address and even their bank account. ...read more.


Organisations that stores personal data must take by certain rules: - They must protect the data from unauthorised access. - -they must not pass on the data to other organisations without the individual's permission. - The data they hold must be accurate and up to date, and must not be held for longer than needed. What must a site like www.hsbc.co.uk do to comply with this law? HSBC must comply with the law data person act 1998 such as they keep personal details secure, in all circumstances. This means that organisations cannot use the data people give to them and used it for themselves. For e.g. a member of HSBC send an email to them. The company cannot use email but replying to person who bellowing to. By what methods could a hacker infiltrate a commercial web site like www.hsbc.co.uk? Hacker can infiltrate HSBC website by using other people user name as they have their information. ...read more.


The companies need use encrypted which is a way of making data unreadable to expect the receiver. What can users do to minimise security risks when online? Users should use software protections before going online to prevent attacks from hackers or unwanted viruses which could result the PC stop responding. Antivirus: Is a software helps protect users against viruses. Anti virus scan hidden viruses in an email messenger or web page which could damage the computer system. Anti virus helps disable the virus and prevent it from damaging user's computer. So that users can surf the website safely without worrying about fraud or being attack by viruses or other threats. Spyware: Is software that hides itself somewhere on pc users collecting information about users and what they do on the internet. Users can remove spyware by installing software like Adware that will scan user's pc can remove the unwanted spyware. Firewall: Is software that prevents unauthorised come into user's network. So that cannot steal people privacy. ?? ?? ?? ?? Unit 21: Website Production and Management ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Exemptions to the Registration There are exemptions from the registration. If the company/data user falls under one or more of the following categories then the registration is not applicable.

  2. Discuss the relationship that exists in the UK between the legal rules that govern ...

    should appoint new directors whereas company law suggests that appointment should be by the general meeting. Other legal rules on this point are stated in The Companies Act 1985; S292 says that they are not to have been "disqualified" it also states that anyone over the age of 70 cant be appointed to the board of a plc.

  1. Smart Card System

    For the second step, in some protocols, we can apply up to two access lists to an interface: one inbound access list and one outbound access list. With other protocols, we apply only one access list, which checks both inbound, and outbound packets.

  2. Computer Crime, Security and Data Protection.

    The hacker could also attack the program at the assembly-code level, finding and altering the security measures. Virus builders Some hackers are also virus builders. Viruses, worms, Trojan horses and logic bombs are all forms of programs that can invade a system.

  1. Security Issues of E-Commerce

    Spreading viruses The spreading of viruses on the internet is another big cause of internet crime, especially relating to e-commerce. Viruses and spy ware have common tools that allow the creators to see what information users put in to there computers and then it sends this information back to them.

  2. Ways of Promoting a Website

    Firstly I shall be looking at increasing my rank (which is stored in the search engines database) as high as possible. This can be done in a few ways but mainly by doing the following; * Keyword density - It is important that on the website I have as many key words inside the text as possible.

  1. Free essay

    Setting up and E-Commerce Site

    web hosting we find the correct balance for space and the more products we could store if we needed to. 8. We finally move on to the marketing stage. If we have enough money to do so then we cannot afford to over look the process of marketing.

  2. Firewall Protection

    and through the NetBIOS communication. The NetBIOS is a standard for naming computers in small networks, developed long ago by IBM and Microsoft. There are a few communication standards which are used in relation to the NetBIOS. The ones that are relevant for Microsoft Windows operating systems, are: NBT (NetBIOS over TCP/IP), IPX/SPX, and NetBEUI.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work