• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the security risks and protection mechanisms involved in website performance.

Extracts from this document...


Transfer-Encoding: chunked ´╗┐Hacking is when somebody gains unauthorised access to data in a system or computer. A hacker will break codes and passwords to get into the computer system which can cause a lot of damage to the system. Unfortunately, even with firewalls preventing hacking it still has occurred to many popular websites including Facebook, Microsoft and Twitter. Twitters systems were hacked early February 2013. The hackers were able to gain access to over 250,000 user accounts including their usernames together with their encrypted and randomised passwords. Phishing is when somebody tries to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organisation but contains a link to a fake website that replicates the real one where information is stolen. Many banks are the target of phishing. ...read more.


Its purpose is to prevent hacking from occurring. Internet data is transferred between the internet and to the computer through different ports. A firewall manages these ports and controls which programs have access to them. Another way to protect websites is Secure Socket Layers (SSL). Secure Sockets Layer is a computing protocol that ensures the security of data sent via the internet by using encryption. This is done by public key encryption and certificate-based authentication. Key encryption is a random string of numbers created for scrambling and unscrambling data. Encryption keys are designed with algorithms intended to ensure that every key is unpredictable and unique. The longer the key, the harder it is to crack the encryption code. They are used to make sure that hackers cannot understand the data if they are trying to steal personal information. Certificate-based authentication is a digital certificate which is obtained to a system for electronic commerce transactions. ...read more.


1. Personal data shall be adequate, relevant and not excessive. 1. Personal data shall be accurate and where necessary, kept up to date. 1. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary. 1. Personal data shall be processed in accordance with the rights of data subjects under the Act. 1. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country outside the European Economic Area unless that country ensures an adequate level of protection. Amazon must abide by the Data Protection Act when dealing with their customer?s information. They explain a lot of their policies regarding data protection on their website. They follow the act by allowing information to be updated or removed, allowing customers to provide some but not all information, data will be processed according to different data acts and to not give information to third parties without purpose. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Date to be returned is obtained via the calculation outlined in system requirement 13. Processes: - A query will be performed in which all of the vehicles on rental are displayed on the condition that Date to be Returned = Today's Date.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    This is because it is not LatestDVD9, who is responsible for the interest level and quality of the film. The company however makes itself responsible for a good video quality. For this there are overall feedbacks from various customers. These are shown on the homepage in a small window on the right.

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    Price - Out of all the product information provided this is the most vital, without this the customer would not know whether the product is worth buying or not, if the company did not include the price of the product then customers would be put off straight away buying from them online.

  2. ict as level coursework

    There was a problem that I was faced with, with regard to stock levels. The stock levels would show up, however they are not accurate. For example if a product has been purchased it would not deduce from the original stock level, hence stock levels are inaccurate.

  1. Topshop Transactional website

    Google, it will locate the site. When entered the site is quick and effortless to load which is a huge advantage also as no password is needed to enter the Topshop website any user is aloud to access it. The Topshop website is in keeping with the corporate identity and

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    You need to reregister each year; failing to do so is a criminal offence. Types of people exempt from registering are: 1. Staff using data for internal staff use such as payroll and people's birthdays, earnings etc. 2. People involved in advertising and public relations only within your own company (no third party companies).

  1. Wjec alevel ict creating a website

    - Default Font, style 2 and text colour #996633, size normal Table text Warley Builders - Default font, x-large, colour #996633 Warley Painters - Arial, Helvetica, sans-serif, style 9, x-large size, colour #000000 Georgia, Times New Roman, Times, serif, style 10, colour #000000 Middle panel text - Style 11, Verdana,

  2. IT Security Threats to Users and Businesses.

    Malicious damage (internal and external causes) Malicious damage is unpredictable and therfore cant really be prepaired for but means that the employer will have to be careful and think about who he is employing. The damage can be caused if a disgruntled employee is getting revenge on the business afater

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work