• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Businesses now have to take certain precautions to ensure theirs and customer data is safe and not under threat

Extracts from this document...

Introduction

´╗┐Contents Introduction Potential threats to customer data collected via website Hacking Natural Disaster Viruses Legislation Data Protection Act Computer Misuse act Bibliography Hacking Natural Virus Other ________________ Introduction Transactional websites are used constantly all around the world. Because they are so popular with such a large number of people using them there are many threats when using these websites. Some people target these websites by hacking, sending viruses, theft or other attack. Businesses now have to take certain precautions to ensure theirs and customer data is safe and not under threat. Potential threats to customer data collected via website Websites collect personal data for different reasons. For example Topshop.com ask the customer for your email address, a phone number, your address, your credit or debit card details and sometimes the amount of times you visit their website. The privacy policy on the website should explain how the website uses the data and the customer should read this before entering their personal information. Further information can be collected through surveys and other questionnaires to improve and develop the website further. For Topshop the information you enter can be sent to other companies that are closely connected with them. An email address would be used to send the customer information about new products, offers or details of their purchase, their address would be also be used for information of the products but obviously to send your purchased items to you too. ...read more.

Middle

To compare, cold sites offer the space for businesses to set up again but they have to have their own computers and information already. From statistics on a website called Protect Data, we can see that natural disasters are the cause of 3% of the world?s data loss; even though this isn?t a large number it is still a big threat and is very easily prevented. Data can easily be stored off site somewhere completely different especially not in areas that these disasters are likely to occur. A Tsunami in Japan on the 11th March 2011 is an example of how badly natural disasters can affect business. Huge companies like Toyota Motor Co., Sony Corp. and Panasonic all had to close production and put the country at economic unrest. All the data held by companies and businesses would have been lost and most likely destroyed. Viruses Computer viruses attack computer systems and have the ability to replicate and pass through a system to other computers. A virus can be sent via the internet, a network or carried on a hard drive. Viruses infect files and then go on to other computers then affecting files in the whole system. Often a user will be unaware of a virus on their computer making it hard to get rid of. A virus on the system of a transactional website will infect the customer data and databases within the website. ...read more.

Conclusion

Another student went against part 1 and 3, this shows us how important this act actually is and also how efficient it is as many people are caught and punished for going against this law. Preventative Measures Preventing these problems can be hard, but there are many measures out there that we can take to ensure these problems are prevented effectively. Firewalls are not strong enough to keep hackers away, however they can be made even more effect by having user names and passwords letting only certain users in or adding multiple firewalls. It is important for companies and businesses to keep their information safe physically, for example certain computers and files should be kept safe and only available for some people also backups should not be kept in the same room as the server as through physical damage could ruin both. Anti-virus software is very effective in making sure viruses don?t attack a computer or server, they are constantly checking and updating to get rid of any files that may be a threat. This is extremely effective as it means viruses and files with threats can be removed straight away before they attack the system. There are many effective ways of preventing these threats to data, and with all these measures companies can be certain their information is safe, however these measures need to be check regularly to make sure they are constantly working and in order. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    customers, and manufacturers are continuously changing due to a multitude of factors. As such, it is very important that the business keeps track of these changes and amends existing data structures and records as appropriate. There are many instances in which details held by the system will have to be amended.

  2. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    Customers will not buy from somebody they do not trust - people need to know that their information is secure. Customers financial details being leaked can destroy their credit ratings if unscrupulous individuals get their hands on it. ________________ Consumer Credit Act The Consumer Credit Act protects both customers and businesses.

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Therefore this means that a customer would always have to enter the name of the movie or actors/directors correctly without any righting mistake, or they would not be able to find the video on that website.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    On this page it gives information on the product. It gives the product name, price and if it's in stock along the top. Then just below it gives the options, these very depending on the product, but on this product we can choose size and colour. Below this is the picture of the item and the item in other

  1. Threats to Data

    SET also includes the use of digital certificates. This is issued by a certification authority and effectively tells you that you are dealing with who you think you are. When you supply your credit card number to a secure site using the site actually only sees an encrypted form of

  2. The Impact of Mobile Phones on social Interaction

    Region Mobile Users Mobile Consumers Africa 4,900,000 1,650,000 Asia-Pacific 206,500,000 131,750,000 Europe 68,850,000 39,350,000 Central/South America 18,250,000 11,850,000 North America 133,290,000 86,790,000 Australia 5,250,000 3,100,000 Former USSR 11,191,500 8,191,500 World 448,231,500 282,681,500 Worldwide Number of Mobile Users and Consumers, 2001 (10)

  1. Theory of data communication

    For this task (covering P1) you should be describing general communication devices, not specific components which are covered in Assignment 3. In practice, it might be quite difficult to make this distinction, but don't spend too much time describing network components in this assignment. In terms of communication devices, the unit content mentions wired devices, such as DTE devices (e.g., a computer)

  2. Topshop Transactional website

    Also located in the options in the left hand side is 'Topshop info' when clicked upon this brings the viewer to various options like Store Locator, Contact us, policies or Services and Help. Topshop site is well laid out and simple to navigate around, the Information like Privacy is straightforward

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work