• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted.

Extracts from this document...

Introduction

Section C - Security Risk Assessment Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted. The way in which companies do this is by hiring a security team with a lot of background knowledge and experience in ethical hacking. The security team should also be aware of the best firewall and antiviral services that are available. The security team at Colorwarepc.com have a lot of practice in ways, which hackers would attempt to gain entry into a business server system. ...read more.

Middle

It is the measures that prevent or detect hackers from using a service, resource or information stored on physical media. As Colorwarepc.com is a company based solely online I would expect they have a very good physical security measures in their premises. I think Colorwarepc.com will have a protected server room with alarms, CCTV etc. this is necessary as so that the company can assess and monitor the server room and distinguish unusual activity. A server room should be firmly locked. There should be securing access to all of the computers users should have codes and passwords before being allowed to enter the server premises. ...read more.

Conclusion

The username may consist of first name, last name, initial etc. the passwords which the users have will must be of high strength. In order for a password to have strength it needs to be random and adequately long, case sensitive and alphanumeric. Users must also be weary when making an account on the Internet because when creating their password they must not fall into the trap of always using the same password. This is for the simple fact if a hacker finds out one password then this can give them the advantage of hacking into all their accounts including the Colorwarepc account. Finally users need to guarantee they don't use easy passwords or share them with friends or family. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report is quite good. The sections are quite short, however there do give detailed information. Some area's do need a little altering though, to improve the level of the report. The report mentions how a business may ...

Read full review

Response to the question

In summary, the report is quite good. The sections are quite short, however there do give detailed information. Some area's do need a little altering though, to improve the level of the report. The report mentions how a business may hire a security team, however this is only one option. The business will have the option of implementing this in-house (if there have the skills required within their own employees), to undertake the work required.

Level of analysis

The report states how a back-up should be made to ensure that any data loss can be restored by using the back-up. However it's important to state that any back-ups should be around 100 miles away from the original data, as the data will need to stored in a secure location away from the original data. This would ensure that if there were a flood within the area, the data would still be recovered. This would show the examiner the potential risk, and the solution to this situation occurring.

Quality of writing

The presentation of the report is quite good, as the report clearly shows the three sub-heading which allows the examiner to read each section clearly and with ease. The report could include an screenshot of the website, to allow the examiner to visualize the student's though of mind.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 23/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Social Implications of E-Commerce

    A wider range of stock can be offered for sale online and orders can be filled as they come in, which saves money on warehouse costs. It also reduces the risk of over ordering on a product that doesn?t sell well.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    Animation- Before attempting to create an animation in ?Fireworks? I initially produced a storyboard to help me plan out the six different frames and what the movement was going to be in each frame. Afterwards I created a six frame animation using a variety of software tools and techniques.

  1. ict as level coursework

    To be easy to user and user friendly After someone with no knowledge of the system has used the system, I will take their feedback on appearance, attributes and professionalism as a test. New customer details should automatically be transferred to the customer details spread sheet.

  2. How successful was the Poor Law Amendment Act in 1834 in meeting the needs ...

    In many ways, the Law was successful, but the main question that many Historians ask is how successful in meeting the needs of the poor. At the time, the social classes were prominently rich or poor, if you were poor you were very poor but if you were rich you were very rich.

  1. A2 ICT CouseWork

    there call will be transferred over to our secretary Caroline Cook . The customer will inform our secretary on what services there require, our secretary will then follow the procedure of writing down the customer Details such as their Name, Address and what services the customer requires, on a Paper Form.

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    I suggest that the technical maintainer also keeps the hardware in working order and replaces any faulty items and up-dates them as necessary. Internal threats Internal threats are damages from inside the Company, e.g. annoyed IT Managers, which could potentially implant viruses, Spyware or other malware.

  1. Threats to Data

    The third group of hackers try to get into the machine simply to gain information, even though they have no intention of using the information. They are just being nosey. There are two dangers here, you do not necessarily want strangers knowing this information and if they find out something

  2. Evaluate the use of e-commerce in a brick and click organisation

    This is similar to a click store. On Asda?s website their website structure is very easy to use as it has drop down menus of different categories including. Fresh & Chilled, Food Cupboard, Frozen Food and many more; these then have sub menus.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work