• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational system security - The possible security issues which exist within the FilmPoster.com system

Extracts from this document...


The possible security issues which exist within the FilmPoster.com system M1 DoS attack: a DoS attack is an attack a person that hacks a computer in an attempt to make computers resources unavailable to its intended users. Though DoS attacks motivation may be carried out for different reasons. Film posters have a web site used to sell movie posters to collectors and a DoS attack will be used by the attacker to prevent the film posters site from functioning efficiently, temporarily or indefinitely. Since film posters hold details of their customers, who have registered with the website, with websites that hold such information people that use DoS attacks target such sites or services hosted on web servers. The attack can be used to saturate the targets machine, such that it cannot respond to legitimate traffic, consume its resources so that it can no longer provide its intended service. They are so many different ways of using DoS attacks they basic types of attacks are, disruptions of physical network components, obstructing the communication media between the user and the film poster from communicating adequately. They can also use Permanent Denial of Service Attacks: a denial service attack attacks and damages a system so badly that it will require replacing or reinstalling the hardware. ...read more.


When executed they attempt to remain unnoticed by the user, they also attempt to hide any evidence of their being accessed remotely over the network. Explain the way that data transmitted over a network can be protected by encryption. M3 Encryption: encryption is the process of changing data using algorithm to protect, make unreadable to anyone during its transit until it gets to the receiver. By using encryption, files can be protected should the security measures fail during transit. Encryption is used to protect data in transit transferred via networks. You can also use other techniques to help preserve and protect data integrity and authenticity, by using messages authentication code MAC or digital signature. Message authentication code uses a secret key input, arbitrary length message that is authenticated and output MAC tag that protects both data's integrity and by also allowing verifiers to detect any changes to the message or data sent. Digital signed messages encryption protects messages, by sharing digital ID the sender and the receiver can protect their email communication during transit, the sender would encrypt the message and by input the digital ID the receiver is able to decrypt the message into plaintext or readable file. ...read more.


PGP pretty good privacy: PGP is a program that provides services such as cryptographic and authentication PGP is used for encrypting and decrypting data, increasing communication security. PGP use hashing, data compression, public key and symmetric key cryptography. PGP supports message authentication and integrity, by creating a digital signature for the message using RSA or DSA algorithms and hashing using the sender's private key to create a digital signature. Intruder detection systems: intruder detection system detects any unauthorised, manipulation of data. The system detects unauthorised access to information. By monitoring traffic for any malicious behaviour or changes to any data or system, they are similar to firewalls though they notice attacks from inside the network. Detection systems write a log and notify the user of any problems. OpenSSH is a tool used to encrypt all traffic that is transmitted on the internet to eliminate eaves drops and other attacks. OpenSSH authenticate users, using SSH protocol with a password public key authentication using per users keys which is a secure for rlogins host. RSA data security encrypts data by using a generated key that unique for each session, the network traffic, the use of encryption module by the client and the server protects data during transit. Data Encryption Standard DES uses symmetric key cryptography which protects network communication and DES encrypts data using the DES algorithm. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, there are some detailed understanding of security issues that FilmPoster could suffer from. However the student, I believe doesn't understand some aspects of this and there should undertake more background research to fill in the missing/in-complete sections. The ...

Read full review

Response to the question

In summary, there are some detailed understanding of security issues that FilmPoster could suffer from. However the student, I believe doesn't understand some aspects of this and there should undertake more background research to fill in the missing/in-complete sections. The DoS section is quite focused on how an attacker is able to make a website appear offline. In order to achieve high marks, the report could explain the effects of a number of consumers in more detail. For example the report could state 'If the website was suffering from a DoS attack, consumers may be placed at an disadvantage due to the inability to access the website. This could result in inconvenience for the consumer'. This would allow the report is to balanced, which shows an in-depth understanding of the different points of view. The report mentions how 'Phishing' is an attack on the website, this is in-correct. Phishing attacks are directly aimed at those consumer's of the website, via e-mails. As a e-mail may contain a link to a website which will look and operate similar with the actual website of FilmPoster. The difference is that the website will have a different URL. These websites are used, in order to acquire consumer's usernames and passwords then there login to the fake website.

Level of analysis

The report clearly describes what encryption is, and this is quite detailed. This is due t that the report states what is meant by the term, and explained how websites may undertake this process to prevent unauthorised access. However all the below sections are lacking detail. I believe that these were written in quite a rush, as these are not in-depth and do not explain each of the security measures.

Quality of writing

The report states the term 'DoS', however the report doesn't break down this term. The report should include something on the lines of 'DoS stands for 'Denial Of Service''. On the flip side, the report has explained this term. The report is aimed at FilmPoster.com, however the report hasn't included a screenshot to allow readers to visualize what the student is writing. This could be added, to enable the reader to visualize the report.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 23/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    sure it is kept secure * do not show information to other people * do not allow access by others the information can be hacked online on the computers meaning other people will gain the customer information, this is not complying with the Data Protection Act meaning they are in

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Notice the way that the answers have been phrased in part (a). The question asked for a comparison of ROM and RAM so both need to be mentioned when you are giving an answer. To say that RAM is volatile is true, but does not answer the question until you say that ROM is not.

  1. Computer systems assignment 1

    DVD Writer is essential if burning data to DVDs which can be used on other computers. These DVDs can contain any type of data and are quite spacious. After all the main upgrade is a motherboard which must be of good quality to connect every component for a great performance outcome.

  2. The impact of the availability of electric information on individuals and society

    Instead of that e-mails and other electronic information will be used; However, paper-based sources are still being widely used because they don't need any electronic devices to support them; also some people prefer to read from a paper than from a screen; in many countries contracts and documents must still be signed on paper for legal reasons.

  1. Evaluate the design and operation of Frito-Lay's logistic network.

    How should the backhaul program be implemented? Frito-Lay should not approve the backhaul program for the following reasons: a. It would be a distraction from their core-competency, which is maintaining their service-to-sales structure. b. They have six core products that account for 80% of their sales. Each core product has a short shelf life (25 to 30 days)

  2. Identify the constituent parts of a total computer system.

    Video sequences captured using a video digitiser are often used in multimedia presentations. Voice recognition (microphone) A microphone is used with a voice recognition system. This can be used with a word processing program to enter text. It can also be used as part of security systems - only certain digitally stored voices have access.

  1. Visual Basic project

    Logical testing This will be used to test every aspect of each form, report and query as soon as it is implemented, using valid, invalid and extreme data. Test data will be added to test each code module and results compared with the expected results.

  2. Evaluate the impact of evolving output mediums on the design and creation of graphic ...

    The way the monitor has evolved and enhanced its use is by going from pixelated images to vector images which makes a clearer and sharper image, this is great for graphic image design, creation and editing. The older version of monitors used the likes of ?Cathode ray tube monitors? whereas

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work