• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the security risks and protection mechanisms involved in website performance.

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐Hacking is when somebody gains unauthorised access to data in a system or computer. A hacker will break codes and passwords to get into the computer system which can cause a lot of damage to the system. Unfortunately, even with firewalls preventing hacking it still has occurred to many popular websites including Facebook, Microsoft and Twitter. Twitters systems were hacked early February 2013. The hackers were able to gain access to over 250,000 user accounts including their usernames together with their encrypted and randomised passwords. Phishing is when somebody tries to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organisation but contains a link to a fake website that replicates the real one where information is stolen. Many banks are the target of phishing. ...read more.

Middle

Its purpose is to prevent hacking from occurring. Internet data is transferred between the internet and to the computer through different ports. A firewall manages these ports and controls which programs have access to them. Another way to protect websites is Secure Socket Layers (SSL). Secure Sockets Layer is a computing protocol that ensures the security of data sent via the internet by using encryption. This is done by public key encryption and certificate-based authentication. Key encryption is a random string of numbers created for scrambling and unscrambling data. Encryption keys are designed with algorithms intended to ensure that every key is unpredictable and unique. The longer the key, the harder it is to crack the encryption code. They are used to make sure that hackers cannot understand the data if they are trying to steal personal information. Certificate-based authentication is a digital certificate which is obtained to a system for electronic commerce transactions. ...read more.

Conclusion

1. Personal data shall be adequate, relevant and not excessive. 1. Personal data shall be accurate and where necessary, kept up to date. 1. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary. 1. Personal data shall be processed in accordance with the rights of data subjects under the Act. 1. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country outside the European Economic Area unless that country ensures an adequate level of protection. Amazon must abide by the Data Protection Act when dealing with their customer?s information. They explain a lot of their policies regarding data protection on their website. They follow the act by allowing information to be updated or removed, allowing customers to provide some but not all information, data will be processed according to different data acts and to not give information to third parties without purpose. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Some of the fields, such as the age field, will be obtained by the computer by performing calculations on the other values entered into the system. Processes: - The original creation of the onscreen form and the entering of the staff member's details into the system.

  2. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    but they could not directly copy the content or design of said website. To protect an idea, a patent must be applied for and granted. To get a patent the idea must be new and involve at least one non-obvious innovative step.

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    Item Description - This covers most of the important features like colour, size, material, capacity etc. This information may vary as the products may be totally different, for example it is important to put the capacity of a water cooler but capacity it is not relevant to something like ski wear.

  2. IT Security Threats to Users and Businesses.

    individual worker restless as many things now get completed over the systems, so any failure would distrupt this. Human errors Human errors can cause many system failures such things as lack of knowledge, ignorance and forgetfulness can all play a part in the way human errors occur.

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    5. "a breach of industry-specific legislation or regulations"[1] 6. If you breach the Human Rights Act of 1998 in terms of privacy in family life, home life and communications. You can under the Data Protection Act for a new purpose if the new purpose is not too far from what you already do, and it is fair to do

  2. Wjec alevel ict creating a website

    The second webpage Warley Builders give specific detail on the building section of the company and then gives information on the washout event, such as the date location and a hyperlink for people to get locations from the AA.

  1. Role of different departments at Bedrooms4U, personnel involved. Main processes carried out by Bedrooms4U,inputs, ...

    Public, hotels, House builders Customer details, order requirements, size, measurements Final design and quotation. Face to face Companys that supply; - Wardrobes and cuboards - Handles - Coth rails curtains carpets etc Quantity, size colour measurements and product description. Face to face Face to Face email post Post Types of

  2. The different aspects of the design of my website for Hatch end cars.

    Even though these changes were optional, they were strongly taking into consideration and the changes were made. These are shown below: MAIN MENU New buttons have been included in the MAIN MENU called FUNCTIONALITIES and EXIT as highlighted in the previous page.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work