• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet security

Extracts from this document...


Security Issues and Legal Constraints of Websites How might someone obtain information about another person on the internet? Identify a website where this may happen. Users can easily obtain information from unknown people online such as by viewing at their profile where their contact details are sometimes their bank details are too. These websites are MySpace and Facebook which are all popular for the users because they are social network group. When people give information about them self online, they make it easier for hackers to find people offline. So people should think carefully about who they give out their address to, what their phone number is or which school / job they go to. What potential security issues could this access cause? The potential security issue caused are that they can see people details which may include their full name, date of birth, address and even their bank account. ...read more.


Organisations that stores personal data must take by certain rules: - They must protect the data from unauthorised access. - -they must not pass on the data to other organisations without the individual's permission. - The data they hold must be accurate and up to date, and must not be held for longer than needed. What must a site like www.hsbc.co.uk do to comply with this law? HSBC must comply with the law data person act 1998 such as they keep personal details secure, in all circumstances. This means that organisations cannot use the data people give to them and used it for themselves. For e.g. a member of HSBC send an email to them. The company cannot use email but replying to person who bellowing to. By what methods could a hacker infiltrate a commercial web site like www.hsbc.co.uk? Hacker can infiltrate HSBC website by using other people user name as they have their information. ...read more.


The companies need use encrypted which is a way of making data unreadable to expect the receiver. What can users do to minimise security risks when online? Users should use software protections before going online to prevent attacks from hackers or unwanted viruses which could result the PC stop responding. Antivirus: Is a software helps protect users against viruses. Anti virus scan hidden viruses in an email messenger or web page which could damage the computer system. Anti virus helps disable the virus and prevent it from damaging user's computer. So that users can surf the website safely without worrying about fraud or being attack by viruses or other threats. Spyware: Is software that hides itself somewhere on pc users collecting information about users and what they do on the internet. Users can remove spyware by installing software like Adware that will scan user's pc can remove the unwanted spyware. Firewall: Is software that prevents unauthorised come into user's network. So that cannot steal people privacy. ?? ?? ?? ?? Unit 21: Website Production and Management ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    This means if a virus distorts the data, the computer crashes, the disk that holds the data is lost, stolen or destroyed or if you even accidentally delete the document then there is always a back up at hand. To do this you simply save any important documents on a

  2. Discuss the relationship that exists in the UK between the legal rules that govern ...

    a timely manner with information in a form and of a quality appropriate to enable it to discharge its duties. All directors should receive induction on joining the board and should regularly update and refresh their skills and knowledge." The Combined Code 2003 S1A.5 The management of a company is

  1. I have been given the task to design a database for a company called ...

    I tried to enter in 4 to begin with and it would not type it, only when I entered in a letter would it accept it. Destination Table There is an input mask for the business postcode, which is the same as the input mask above.

  2. Free essay

    Setting up and E-Commerce Site

    The fact that the services allows the user to take full control over the catalogue is very good, this means that it is in their full control whilst if anything goes wrong they can still ask for the support and service of the people that created and implemented it in the first place.

  1. Security Issues of E-Commerce

    If anything the in store method is worse as the user of the pin maybe watched the cards the stolen and fraud is committed. Reliable credit card processing If the website has been set-up correctly then when we go to enter our details, sufficient checks are put in place for

  2. Smart Card System

    emerging needs of the smart card market through the development of highly secure and open platforms. The aim of the project is to develop new platforms that will offer: * Advanced VLSI, sub micron chips for embedding in plastic cards; * High levels of security against a broad range of

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    It is also important for my client to be able to request a paper copy of this file for further backup purposes. Field name Field type Field size Firstname String 20 Secondname String 30 Addressline1 String 30 Addressline2 String 30 Town/City String 20 Postcode String 6 Phonehome Integer 10 Phonemobile

  2. Introduction to Viruses

    Just as the virus's infection phase can be triggered by some event, the attack phase also has its own trigger. Viruses usually delay revealing their presence by launching their attack only after they have had ample opportunity to spread. This means that the attack may be delayed for years after the initial infection.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work