• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security - BTEC IT Unit 21

Extracts from this document...


Internet security Security Risks Viruses - A virus is a computer program that copies itself and infects the computer without out the user knowing or giving permission. The name virus is used, but wrongly, to refer to malware, adware and spyware which are programs which do not have the reproductive capability. Hackers - Hackers are people who break into computers, usually by attaining access to administrative controls. Hackers can do various annoying things from deleting, stealing and modifying files to placing various malicious programs and changing settings. Spyware - Spyware are programs that use your computer to access the internet to send information from your computer to another computer without your knowledge or permission. ...read more.


However on the internet browser sites you need to make sure that you are putting your details into the right site otherwise your username and password may be stolen. Security Assessor IDS - IDS or Intrusion detection system is both a software and hardware which is designed to detect unwanted attempts at accessing, manipulating and or disabling the computer system through the internet or other similar networks. Attempts may take the form of malware or employees trying to hack the system however an IDS cannot detect an attack in a properly encrypted line of traffic. Legal Constraints Data protection act - An act which declares the protection of personal data. ...read more.


Copyright law - Copyright law makes it so it's illegal to perform the following acts without the consent of the owner * Copy the work * Rent, lend or sell copies of the work to the public * Perform, broadcast or show copies of the work to the public * Adapt the work and pass it off as your own However acts that are allowed * Using the material for private research and study * Performance, copies or lending the material for educational purposes * Criticism and news reporting of the material * Copies of the material that is lent by the librarian * Recording broadcasts to be viewed at a more convenient time * Producing a backup copy of the material for personal use of the computer program ?? ?? ?? ?? Charlotte Gallichan Unit 21 Assignment 1 Page 1 of 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    These details are then entered into the system by the vehicle controller. The Manufacturer Code or name typed into the query is determined by the staff member operating the system at that time. Processes: - The staff member types a particular manufacturer code or name into the system and a

  2. Marked by a teacher

    Ecommerce Case Study

    The ability to hide behind a computer screen seems to invoke the criminal side of people. The thought of the other person being hundreds of miles away on the other side of the world and never going to see them seems to encourage buyers to use fake credit cards and fraudulent information.

  1. System Analysis and Design Assignment

    The report can either be listed on screen, or printed out for convenience. The fields in this report will be sorted by Year. Output 2 Title Members report by particular Class Who needs this The staff Fields Needed MemberID, FirstName, Surname, Street, Town, Postcode, Class Output Format List on screen

  2. BTEC Unit 8: The Theory of Data Communications

    Types of mobile commutation devices would be third (3G) and fourth (4G) generation cellular phones, wireless laptops and wireless PDAs. Wireless networks use the 802.11x standard. This is the IEEE standard (Institute of Electrical and Electronics Engineers) which defines the speed of the network and its range.

  1. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    to their gain such as downloading illegal files on your internet and then it will look like you have done this and not the piggybacker. You can prevent this by putting security on your internet, such as a password. There are other types of malicious damage which could include the

  2. Internet and Internet Activities

    Video content was impossible to access but after the development, Broadband connections enable data to be transferred much faster than narrow band and there is also a permanent connection that does not tie up the normal phone line as the user can choose to get online connection by an ADSL

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    The employee maintains the work quality and doesn?t let out of work factors affect their work quality. Legislation The Equality Act This act protects people from protected characteristics. These characteristics can protect many people such as disability, age, race etc.

  2. Describe the future of the Internet.

    use the webs tie for free advertising promoting there website of these websites. The development of mobile phones and new smart phones being released in the current day has had a major impact on the way many use the internet.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work