• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security - BTEC IT Unit 21

Extracts from this document...

Introduction

Internet security Security Risks Viruses - A virus is a computer program that copies itself and infects the computer without out the user knowing or giving permission. The name virus is used, but wrongly, to refer to malware, adware and spyware which are programs which do not have the reproductive capability. Hackers - Hackers are people who break into computers, usually by attaining access to administrative controls. Hackers can do various annoying things from deleting, stealing and modifying files to placing various malicious programs and changing settings. Spyware - Spyware are programs that use your computer to access the internet to send information from your computer to another computer without your knowledge or permission. ...read more.

Middle

However on the internet browser sites you need to make sure that you are putting your details into the right site otherwise your username and password may be stolen. Security Assessor IDS - IDS or Intrusion detection system is both a software and hardware which is designed to detect unwanted attempts at accessing, manipulating and or disabling the computer system through the internet or other similar networks. Attempts may take the form of malware or employees trying to hack the system however an IDS cannot detect an attack in a properly encrypted line of traffic. Legal Constraints Data protection act - An act which declares the protection of personal data. ...read more.

Conclusion

Copyright law - Copyright law makes it so it's illegal to perform the following acts without the consent of the owner * Copy the work * Rent, lend or sell copies of the work to the public * Perform, broadcast or show copies of the work to the public * Adapt the work and pass it off as your own However acts that are allowed * Using the material for private research and study * Performance, copies or lending the material for educational purposes * Criticism and news reporting of the material * Copies of the material that is lent by the librarian * Recording broadcasts to be viewed at a more convenient time * Producing a backup copy of the material for personal use of the computer program ?? ?? ?? ?? Charlotte Gallichan Unit 21 Assignment 1 Page 1 of 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Date to be returned is obtained via the calculation outlined in system requirement 13. Processes: - A query will be performed in which all of the current rental records are displayed 17. List of overdue Rentals displayed onscreen/printed Inputs: - Rental ID, Customer ID, Vehicle ID, Model, Daily Rental Price,

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    I suggest that the technical maintainer also keeps the hardware in working order and replaces any faulty items and up-dates them as necessary. Internal threats Internal threats are damages from inside the Company, e.g. annoyed IT Managers, which could potentially implant viruses, Spyware or other malware.

  1. BTEC Unit 8: The Theory of Data Communications

    * A switch in a communications/server room at school, college or work, which will connect all the computers to the Local Area Network (LAN) and the Internet. Wireless Devices Wireless devices are devices which transmit their data over the air.

  2. Communication Principles

    The difference between a repeater and an amplifier is that amplifiers boost the signal along with any noise or interference that the signal has picked up. Repeaters could be used within the insurance company, to strengthen the communication within it's WAN.

  1. System Analysis and Design Assignment

    File Structures - Defined using field names, data types, validation, help messages, indexed, mandatory etc. 4) File Processing - What operations are required, e.g. open and close, add, delete, calculate, modify, sort, merge etc. 5) Data Collection Forms - Designed to collect data for input to computer.

  2. Internet and Internet Activities

    Video content was impossible to access but after the development, Broadband connections enable data to be transferred much faster than narrow band and there is also a permanent connection that does not tie up the normal phone line as the user can choose to get online connection by an ADSL

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    The employee maintains the work quality and doesn?t let out of work factors affect their work quality. Legislation The Equality Act This act protects people from protected characteristics. These characteristics can protect many people such as disability, age, race etc.

  2. Describe the future of the Internet.

    Now higher educational facilities like Wolverhampton University have many computer and Macs and this is a good example that shows the internet is having an impact on education and research. They provide large areas that previously used to hold book with computers as they are more effective and can provide a lot more information for the user.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work