• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the security risks and protection mechanisms involved in website performance.

Extracts from this document...


Transfer-Encoding: chunked ´╗┐Hacking is when somebody gains unauthorised access to data in a system or computer. A hacker will break codes and passwords to get into the computer system which can cause a lot of damage to the system. Unfortunately, even with firewalls preventing hacking it still has occurred to many popular websites including Facebook, Microsoft and Twitter. Twitters systems were hacked early February 2013. The hackers were able to gain access to over 250,000 user accounts including their usernames together with their encrypted and randomised passwords. Phishing is when somebody tries to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organisation but contains a link to a fake website that replicates the real one where information is stolen. Many banks are the target of phishing. ...read more.


Its purpose is to prevent hacking from occurring. Internet data is transferred between the internet and to the computer through different ports. A firewall manages these ports and controls which programs have access to them. Another way to protect websites is Secure Socket Layers (SSL). Secure Sockets Layer is a computing protocol that ensures the security of data sent via the internet by using encryption. This is done by public key encryption and certificate-based authentication. Key encryption is a random string of numbers created for scrambling and unscrambling data. Encryption keys are designed with algorithms intended to ensure that every key is unpredictable and unique. The longer the key, the harder it is to crack the encryption code. They are used to make sure that hackers cannot understand the data if they are trying to steal personal information. Certificate-based authentication is a digital certificate which is obtained to a system for electronic commerce transactions. ...read more.


1. Personal data shall be adequate, relevant and not excessive. 1. Personal data shall be accurate and where necessary, kept up to date. 1. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary. 1. Personal data shall be processed in accordance with the rights of data subjects under the Act. 1. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country outside the European Economic Area unless that country ensures an adequate level of protection. Amazon must abide by the Data Protection Act when dealing with their customer?s information. They explain a lot of their policies regarding data protection on their website. They follow the act by allowing information to be updated or removed, allowing customers to provide some but not all information, data will be processed according to different data acts and to not give information to third parties without purpose. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    the Date to be Returned and R refers to the Daily Rental rate of the vehicle. The reason why (D-B) is squared is so that the longer overdue a vehicle is, the more severe the overdue fee will be. 15.

  2. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    but they could not directly copy the content or design of said website. To protect an idea, a patent must be applied for and granted. To get a patent the idea must be new and involve at least one non-obvious innovative step.

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    only movies on DVDs. The majority of its movies are Hollywood; however there are also movies from other film industries available such as Bollywood, and Cinemas of other countries. The DVDs come in a DVD sleeve, which also protects the disk from damage.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    Alongside a basic picture they sometimes provide an orthographic picture (including dimensions) of the product depending on what It is and whether it is useful to do for that certain product or not. Types of transactions that can be carried out Customers can pay in three ways; credit/debit cards online, using credit/debit to order over the phone, or by cheque.

  1. Peer reviewed

    Internet Risks and Reliability Issues

    4 star(s)

    Sophisticated Security Systems - are installed on computer networks. These enable network administrator to block potential dangerous or offensive content, block specific files and restrict the activities of computer users. This is important to prevent the systems being disabled by an attack.

  2. Topshop Transactional website

    Bags Shoes Petite Tall B Maternity TOPSHOP mini The Tee Shop Product Information In this item the product information tells us that these shoes are high heeled patent Mary Jane style shoe with dark heel detail.

  1. IT Security Threats to Users and Businesses.

    Malicious damage (internal and external causes) Malicious damage is unpredictable and therfore cant really be prepaired for but means that the employer will have to be careful and think about who he is employing. The damage can be caused if a disgruntled employee is getting revenge on the business afater

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    All entities handling the data must ensure data is adequately protected, such as anti-spyware and having staff awareness days. VIII. All data must be kept within the European Economic Area or outside the European Economic Area, if adequate safeguards are in place These eight principles govern the use of personal data, which include any form of gathered information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work