• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security - BTEC IT Unit 21

Extracts from this document...

Introduction

Internet security Security Risks Viruses - A virus is a computer program that copies itself and infects the computer without out the user knowing or giving permission. The name virus is used, but wrongly, to refer to malware, adware and spyware which are programs which do not have the reproductive capability. Hackers - Hackers are people who break into computers, usually by attaining access to administrative controls. Hackers can do various annoying things from deleting, stealing and modifying files to placing various malicious programs and changing settings. Spyware - Spyware are programs that use your computer to access the internet to send information from your computer to another computer without your knowledge or permission. ...read more.

Middle

However on the internet browser sites you need to make sure that you are putting your details into the right site otherwise your username and password may be stolen. Security Assessor IDS - IDS or Intrusion detection system is both a software and hardware which is designed to detect unwanted attempts at accessing, manipulating and or disabling the computer system through the internet or other similar networks. Attempts may take the form of malware or employees trying to hack the system however an IDS cannot detect an attack in a properly encrypted line of traffic. Legal Constraints Data protection act - An act which declares the protection of personal data. ...read more.

Conclusion

Copyright law - Copyright law makes it so it's illegal to perform the following acts without the consent of the owner * Copy the work * Rent, lend or sell copies of the work to the public * Perform, broadcast or show copies of the work to the public * Adapt the work and pass it off as your own However acts that are allowed * Using the material for private research and study * Performance, copies or lending the material for educational purposes * Criticism and news reporting of the material * Copies of the material that is lent by the librarian * Recording broadcasts to be viewed at a more convenient time * Producing a backup copy of the material for personal use of the computer program ?? ?? ?? ?? Charlotte Gallichan Unit 21 Assignment 1 Page 1 of 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Street Address, Town, County, Nationality, Sex, Postcode, Telephone Number, Mobile Number, E-mail Address, Date of Birth, Age, Date of Membership, Date of last Rental. Data collection: - The customer's details will be collected from the customer when they want to rent their first vehicle.

  2. BTEC Unit 8: The Theory of Data Communications

    Data Circuit-terminating Equipment (DCE) DCE and DTE work together by the DTE connecting to the Internet or network service offered by the DCE. This is network equipment which controls the communication. Some examples of these are: * A Bluetooth dongle in a PC, which is sued to synchronise a mobile phone or PDA.

  1. Internet and Internet Activities

    Video content was impossible to access but after the development, Broadband connections enable data to be transferred much faster than narrow band and there is also a permanent connection that does not tie up the normal phone line as the user can choose to get online connection by an ADSL

  2. Database Coursework on a Rental System: Design

    For example, one teacher can have one classroom and this classroom can have the one teacher. In a one-to-many relationship, for every occurrence of entity A, there are many occurrences of entity B. For example, one manufacturer produces many vehicles, but each vehicle has one manufacturer.

  1. Network Security

    Server: The server or the host computer houses all the data and the software that is to be accessed by the clients. Client: A client can be referred to as an input/output hardware device that lies at the other end of the communication circuit.

  2. COMPUTER VIRUSES

    swap space and kernel table entries, preventing login to even see what was going on! The virus also "cleans" up after itself. If you reboot an infected machine (or it crashes), the /tmp directory is normally cleaned up on reboot.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    This also means meeting deadlines on time and bringing work in when it is due. Not coming on time will get the employer annoyed and also affect the business this will make an employee unreliable and make the work harder for others.

  2. Describe the future of the Internet.

    Because of new smart phones they can connect to the internet on the move, and is much faster than previously, making the internet a part of there daily lives, they can use it while travelling to work to catch up or check emails etc.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work