• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational system security - The possible security issues which exist within the FilmPoster.com system

Extracts from this document...


The possible security issues which exist within the FilmPoster.com system M1 DoS attack: a DoS attack is an attack a person that hacks a computer in an attempt to make computers resources unavailable to its intended users. Though DoS attacks motivation may be carried out for different reasons. Film posters have a web site used to sell movie posters to collectors and a DoS attack will be used by the attacker to prevent the film posters site from functioning efficiently, temporarily or indefinitely. Since film posters hold details of their customers, who have registered with the website, with websites that hold such information people that use DoS attacks target such sites or services hosted on web servers. The attack can be used to saturate the targets machine, such that it cannot respond to legitimate traffic, consume its resources so that it can no longer provide its intended service. They are so many different ways of using DoS attacks they basic types of attacks are, disruptions of physical network components, obstructing the communication media between the user and the film poster from communicating adequately. They can also use Permanent Denial of Service Attacks: a denial service attack attacks and damages a system so badly that it will require replacing or reinstalling the hardware. ...read more.


When executed they attempt to remain unnoticed by the user, they also attempt to hide any evidence of their being accessed remotely over the network. Explain the way that data transmitted over a network can be protected by encryption. M3 Encryption: encryption is the process of changing data using algorithm to protect, make unreadable to anyone during its transit until it gets to the receiver. By using encryption, files can be protected should the security measures fail during transit. Encryption is used to protect data in transit transferred via networks. You can also use other techniques to help preserve and protect data integrity and authenticity, by using messages authentication code MAC or digital signature. Message authentication code uses a secret key input, arbitrary length message that is authenticated and output MAC tag that protects both data's integrity and by also allowing verifiers to detect any changes to the message or data sent. Digital signed messages encryption protects messages, by sharing digital ID the sender and the receiver can protect their email communication during transit, the sender would encrypt the message and by input the digital ID the receiver is able to decrypt the message into plaintext or readable file. ...read more.


PGP pretty good privacy: PGP is a program that provides services such as cryptographic and authentication PGP is used for encrypting and decrypting data, increasing communication security. PGP use hashing, data compression, public key and symmetric key cryptography. PGP supports message authentication and integrity, by creating a digital signature for the message using RSA or DSA algorithms and hashing using the sender's private key to create a digital signature. Intruder detection systems: intruder detection system detects any unauthorised, manipulation of data. The system detects unauthorised access to information. By monitoring traffic for any malicious behaviour or changes to any data or system, they are similar to firewalls though they notice attacks from inside the network. Detection systems write a log and notify the user of any problems. OpenSSH is a tool used to encrypt all traffic that is transmitted on the internet to eliminate eaves drops and other attacks. OpenSSH authenticate users, using SSH protocol with a password public key authentication using per users keys which is a secure for rlogins host. RSA data security encrypts data by using a generated key that unique for each session, the network traffic, the use of encryption module by the client and the server protects data during transit. Data Encryption Standard DES uses symmetric key cryptography which protects network communication and DES encrypts data using the DES algorithm. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, there are some detailed understanding of security issues that FilmPoster could suffer from. However the student, I believe doesn't understand some aspects of this and there should undertake more background research to fill in the missing/in-complete sections. The ...

Read full review

Response to the question

In summary, there are some detailed understanding of security issues that FilmPoster could suffer from. However the student, I believe doesn't understand some aspects of this and there should undertake more background research to fill in the missing/in-complete sections. The DoS section is quite focused on how an attacker is able to make a website appear offline. In order to achieve high marks, the report could explain the effects of a number of consumers in more detail. For example the report could state 'If the website was suffering from a DoS attack, consumers may be placed at an disadvantage due to the inability to access the website. This could result in inconvenience for the consumer'. This would allow the report is to balanced, which shows an in-depth understanding of the different points of view. The report mentions how 'Phishing' is an attack on the website, this is in-correct. Phishing attacks are directly aimed at those consumer's of the website, via e-mails. As a e-mail may contain a link to a website which will look and operate similar with the actual website of FilmPoster. The difference is that the website will have a different URL. These websites are used, in order to acquire consumer's usernames and passwords then there login to the fake website.

Level of analysis

The report clearly describes what encryption is, and this is quite detailed. This is due t that the report states what is meant by the term, and explained how websites may undertake this process to prevent unauthorised access. However all the below sections are lacking detail. I believe that these were written in quite a rush, as these are not in-depth and do not explain each of the security measures.

Quality of writing

The report states the term 'DoS', however the report doesn't break down this term. The report should include something on the lines of 'DoS stands for 'Denial Of Service''. On the flip side, the report has explained this term. The report is aimed at FilmPoster.com, however the report hasn't included a screenshot to allow readers to visualize what the student is writing. This could be added, to enable the reader to visualize the report.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 23/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    The Freedom of Information Act The FoIA is not included where more sensitive information is required, they cannot access all of this information because of the DPA (Data Protection Act 1998.) This limits them in what kind of information is allowed.

  2. Computer systems assignment 1

    DVD Writer is essential if burning data to DVDs which can be used on other computers. These DVDs can contain any type of data and are quite spacious. After all the main upgrade is a motherboard which must be of good quality to connect every component for a great performance outcome.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Notice the way that the answers have been phrased in part (a). The question asked for a comparison of ROM and RAM so both need to be mentioned when you are giving an answer. To say that RAM is volatile is true, but does not answer the question until you say that ROM is not.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    Or the Secretary of State may specify cases where this condition is excluded or modified, e.g. * Where the processing is necessary for medical purposes * Where sensitive personal data is necessary for monitoring equal opportunities for people of different racial or ethnic origins and is carried out with the usual safeguards for the rights and freedoms of data subjects.

  1. Identify the constituent parts of a total computer system.

    Software - Applications Package A computer system is made up of hardware and software. The hardware is the physical components like input, output and backing store devices. Software is the computer program that instructs the computer to perform particular operations.

  2. Video Rental System

    EMP_STRT_DTE Employee Start Date Date/Time dd/mm/yyyy hr:min:sec am/pm EMP_END_DTE Employee End Date Date/Time dd/mm/yyyy hr:min:sec am/pm EMP_JOB_TITLE Employee Job title Text 255 X(255) CREATED_DATE Employee Created Date Date/Time dd/mm/yyyy hr:min:sec am/pm PURCHASE_ORDER PUR_ORDER_ID Purchase Order ID Autonumber Long Int 1-99999999 Y PK PUR_ORDER_DATE Purchase Order date Date/Time dd/mm/yyyy hr:min:sec am/pm

  1. The impact of the availability of electric information on individuals and society

    quite slow and sometimes even inaccurate, while availability of electronic information has made this process much faster and left less space for inaccuracies and errors. The access of electronic information has had a huge impact to my parents' lives as well.

  2. James. T. Russell and the Invention of the Compact Disc.

    It has to continually move outward from the center of the disc. The job of the CD player is to focus the laser on the track of bumps. The laser beam passes through the polycarbonate layer, reflects off the aluminum layer and hits an opto-electronic device that detects the changes in light.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work