• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational system security - The possible security issues which exist within the FilmPoster.com system

Extracts from this document...


The possible security issues which exist within the FilmPoster.com system M1 DoS attack: a DoS attack is an attack a person that hacks a computer in an attempt to make computers resources unavailable to its intended users. Though DoS attacks motivation may be carried out for different reasons. Film posters have a web site used to sell movie posters to collectors and a DoS attack will be used by the attacker to prevent the film posters site from functioning efficiently, temporarily or indefinitely. Since film posters hold details of their customers, who have registered with the website, with websites that hold such information people that use DoS attacks target such sites or services hosted on web servers. The attack can be used to saturate the targets machine, such that it cannot respond to legitimate traffic, consume its resources so that it can no longer provide its intended service. They are so many different ways of using DoS attacks they basic types of attacks are, disruptions of physical network components, obstructing the communication media between the user and the film poster from communicating adequately. They can also use Permanent Denial of Service Attacks: a denial service attack attacks and damages a system so badly that it will require replacing or reinstalling the hardware. ...read more.


When executed they attempt to remain unnoticed by the user, they also attempt to hide any evidence of their being accessed remotely over the network. Explain the way that data transmitted over a network can be protected by encryption. M3 Encryption: encryption is the process of changing data using algorithm to protect, make unreadable to anyone during its transit until it gets to the receiver. By using encryption, files can be protected should the security measures fail during transit. Encryption is used to protect data in transit transferred via networks. You can also use other techniques to help preserve and protect data integrity and authenticity, by using messages authentication code MAC or digital signature. Message authentication code uses a secret key input, arbitrary length message that is authenticated and output MAC tag that protects both data's integrity and by also allowing verifiers to detect any changes to the message or data sent. Digital signed messages encryption protects messages, by sharing digital ID the sender and the receiver can protect their email communication during transit, the sender would encrypt the message and by input the digital ID the receiver is able to decrypt the message into plaintext or readable file. ...read more.


PGP pretty good privacy: PGP is a program that provides services such as cryptographic and authentication PGP is used for encrypting and decrypting data, increasing communication security. PGP use hashing, data compression, public key and symmetric key cryptography. PGP supports message authentication and integrity, by creating a digital signature for the message using RSA or DSA algorithms and hashing using the sender's private key to create a digital signature. Intruder detection systems: intruder detection system detects any unauthorised, manipulation of data. The system detects unauthorised access to information. By monitoring traffic for any malicious behaviour or changes to any data or system, they are similar to firewalls though they notice attacks from inside the network. Detection systems write a log and notify the user of any problems. OpenSSH is a tool used to encrypt all traffic that is transmitted on the internet to eliminate eaves drops and other attacks. OpenSSH authenticate users, using SSH protocol with a password public key authentication using per users keys which is a secure for rlogins host. RSA data security encrypts data by using a generated key that unique for each session, the network traffic, the use of encryption module by the client and the server protects data during transit. Data Encryption Standard DES uses symmetric key cryptography which protects network communication and DES encrypts data using the DES algorithm. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, there are some detailed understanding of security issues that FilmPoster could suffer from. However the student, I believe doesn't understand some aspects of this and there should undertake more background research to fill in the missing/in-complete sections. The ...

Read full review

Response to the question

In summary, there are some detailed understanding of security issues that FilmPoster could suffer from. However the student, I believe doesn't understand some aspects of this and there should undertake more background research to fill in the missing/in-complete sections. The DoS section is quite focused on how an attacker is able to make a website appear offline. In order to achieve high marks, the report could explain the effects of a number of consumers in more detail. For example the report could state 'If the website was suffering from a DoS attack, consumers may be placed at an disadvantage due to the inability to access the website. This could result in inconvenience for the consumer'. This would allow the report is to balanced, which shows an in-depth understanding of the different points of view. The report mentions how 'Phishing' is an attack on the website, this is in-correct. Phishing attacks are directly aimed at those consumer's of the website, via e-mails. As a e-mail may contain a link to a website which will look and operate similar with the actual website of FilmPoster. The difference is that the website will have a different URL. These websites are used, in order to acquire consumer's usernames and passwords then there login to the fake website.

Level of analysis

The report clearly describes what encryption is, and this is quite detailed. This is due t that the report states what is meant by the term, and explained how websites may undertake this process to prevent unauthorised access. However all the below sections are lacking detail. I believe that these were written in quite a rush, as these are not in-depth and do not explain each of the security measures.

Quality of writing

The report states the term 'DoS', however the report doesn't break down this term. The report should include something on the lines of 'DoS stands for 'Denial Of Service''. On the flip side, the report has explained this term. The report is aimed at FilmPoster.com, however the report hasn't included a screenshot to allow readers to visualize what the student is writing. This could be added, to enable the reader to visualize the report.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 23/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    It will find it by stripping of the data link layer protocol from which it receives through one of its ports. This will also help it know where to send the next packet. The data from the network layer protocol will be encapsulated into a new data link layer frame before it transmits or sends it.

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    A database is a very effective and professional way of managing and then further processing the information the supermarket receives. When developing a system within a supermarket, a data model must first be created. A data model explains and describes every piece of information within the system.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Notice the way that the answers have been phrased in part (a). The question asked for a comparison of ROM and RAM so both need to be mentioned when you are giving an answer. To say that RAM is volatile is true, but does not answer the question until you say that ROM is not.

  2. Computer systems assignment 1

    DVD Writer is essential if burning data to DVDs which can be used on other computers. These DVDs can contain any type of data and are quite spacious. After all the main upgrade is a motherboard which must be of good quality to connect every component for a great performance outcome.

  1. Identify the constituent parts of a total computer system.

    They are usually used for Computer Aided Design (CAD) and Computer Aided Manufacture (CAM) applications such as printing out plans for houses or car parts. Other devices * Speakers * LCD projectors BACKUP STORAGE Backing store - magnetic disks Magnetic disks are the most common backing storage medium. Magnetic disks include 3.5-inch portable floppy disks and also the hard disk drive fixed inside your computer.

  2. Visual Basic project

    The data that will be added initially is shown below. Subsequent tests will often involve adding new data which will then be deleted when the test works satisfactorily. CustomerID Title Surname Initials Street Town Borough PostCode TelephoneNo 1 Mr Wait J 74 Walton Rd Sidcup Greenwich SE18 6UU (020)

  1. The impact of the availability of electric information on individuals and society

    books; newspapers and magazines. While now I mostly use the internet and a search engine for doing that. The problem with search engines is that you have to be very accurate and know exactly what kind of information you want to find, otherwise you might never find what you need or not exactly the kind of information you need.

  2. BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

    Rules may include for example blocking certain IP addresses to disallow any traffic to and from a certain IP or blocking a domain name and preventing any traffic to and from the web server. Virus checking software: This is an application which runs in the background and will scan any

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work