• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted.

Extracts from this document...

Introduction

Section C - Security Risk Assessment Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted. The way in which companies do this is by hiring a security team with a lot of background knowledge and experience in ethical hacking. The security team should also be aware of the best firewall and antiviral services that are available. The security team at Colorwarepc.com have a lot of practice in ways, which hackers would attempt to gain entry into a business server system. ...read more.

Middle

It is the measures that prevent or detect hackers from using a service, resource or information stored on physical media. As Colorwarepc.com is a company based solely online I would expect they have a very good physical security measures in their premises. I think Colorwarepc.com will have a protected server room with alarms, CCTV etc. this is necessary as so that the company can assess and monitor the server room and distinguish unusual activity. A server room should be firmly locked. There should be securing access to all of the computers users should have codes and passwords before being allowed to enter the server premises. ...read more.

Conclusion

The username may consist of first name, last name, initial etc. the passwords which the users have will must be of high strength. In order for a password to have strength it needs to be random and adequately long, case sensitive and alphanumeric. Users must also be weary when making an account on the Internet because when creating their password they must not fall into the trap of always using the same password. This is for the simple fact if a hacker finds out one password then this can give them the advantage of hacking into all their accounts including the Colorwarepc account. Finally users need to guarantee they don't use easy passwords or share them with friends or family. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report is quite good. The sections are quite short, however there do give detailed information. Some area's do need a little altering though, to improve the level of the report. The report mentions how a business may ...

Read full review

Response to the question

In summary, the report is quite good. The sections are quite short, however there do give detailed information. Some area's do need a little altering though, to improve the level of the report. The report mentions how a business may hire a security team, however this is only one option. The business will have the option of implementing this in-house (if there have the skills required within their own employees), to undertake the work required.

Level of analysis

The report states how a back-up should be made to ensure that any data loss can be restored by using the back-up. However it's important to state that any back-ups should be around 100 miles away from the original data, as the data will need to stored in a secure location away from the original data. This would ensure that if there were a flood within the area, the data would still be recovered. This would show the examiner the potential risk, and the solution to this situation occurring.

Quality of writing

The presentation of the report is quite good, as the report clearly shows the three sub-heading which allows the examiner to read each section clearly and with ease. The report could include an screenshot of the website, to allow the examiner to visualize the student's though of mind.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 23/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    their performance, the effectiveness of their performance, the staff's involvement in such tasks, faults in the system and how the system can be improved. All the data collected here will be used to gain a clear understanding of the present system and in developing the new one.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    For example, onion skinning allowed me to see the previous and next frame so that I could see the overall movement. Looping was used to make the animation repeat itself and run again. This was useful if I did not want the animation to stop after running once.

  1. ict as level coursework

    Option of titles should be displayed i.e. user chooses 'Miss, Mr, Mrs, Dr' 5 Check if combo button works- catalogue number Press on the drop down list for catalogue number. Various catalogue numbers should appear. 3 catalouge number per group of product.

  2. How successful was the Poor Law Amendment Act in 1834 in meeting the needs ...

    In many ways, the Law was successful, but the main question that many Historians ask is how successful in meeting the needs of the poor. At the time, the social classes were prominently rich or poor, if you were poor you were very poor but if you were rich you were very rich.

  1. Threats to Data

    It is a form of vandalism. This could be a serious problem for a transactional website as the server the website is uploaded onto can be badly damaged stopping all traffic to the site, if the location of customers' data is also damaged by these type of hackers, customers details

  2. The Digital Divide is used to describe the progressively growing gap between those who ...

    Social and cultural In the information age almost every application, commerce and transactions can be done online. People are suddenly expected to Have a computer and broadband Internet connection and use a computer confidently. People who do not tick fall into these categories.

  1. Evaluate the use of e-commerce in a brick and click organisation

    This would not happen in a brick store, if you do not have the money you will not be able to pay for the items. Similarly, brick stores have more payment methods than a click store which is beneficial. Online you can only pay for items using a debit or

  2. Examine the social implications of e-commerce on society

    The ability to search for a particular product then find the lowest price is provided by a number of sites which could lead to saving money and time which is beneficial to the customer. Despite all the benefits to customers using e-commerce there are some drawbacks to customers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work