• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet Security - BTEC IT Unit 21

Extracts from this document...

Introduction

Internet security Security Risks Viruses - A virus is a computer program that copies itself and infects the computer without out the user knowing or giving permission. The name virus is used, but wrongly, to refer to malware, adware and spyware which are programs which do not have the reproductive capability. Hackers - Hackers are people who break into computers, usually by attaining access to administrative controls. Hackers can do various annoying things from deleting, stealing and modifying files to placing various malicious programs and changing settings. Spyware - Spyware are programs that use your computer to access the internet to send information from your computer to another computer without your knowledge or permission. ...read more.

Middle

However on the internet browser sites you need to make sure that you are putting your details into the right site otherwise your username and password may be stolen. Security Assessor IDS - IDS or Intrusion detection system is both a software and hardware which is designed to detect unwanted attempts at accessing, manipulating and or disabling the computer system through the internet or other similar networks. Attempts may take the form of malware or employees trying to hack the system however an IDS cannot detect an attack in a properly encrypted line of traffic. Legal Constraints Data protection act - An act which declares the protection of personal data. ...read more.

Conclusion

Copyright law - Copyright law makes it so it's illegal to perform the following acts without the consent of the owner * Copy the work * Rent, lend or sell copies of the work to the public * Perform, broadcast or show copies of the work to the public * Adapt the work and pass it off as your own However acts that are allowed * Using the material for private research and study * Performance, copies or lending the material for educational purposes * Criticism and news reporting of the material * Copies of the material that is lent by the librarian * Recording broadcasts to be viewed at a more convenient time * Producing a backup copy of the material for personal use of the computer program ?? ?? ?? ?? Charlotte Gallichan Unit 21 Assignment 1 Page 1 of 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    and a query is performed in which the record of the vehicle of that particular ID or model is displayed onscreen. 21. Details of a particular manufacturer displayed onscreen Inputs: - Manufacturer Code, Manufacturer Name, Name of Contact, Contact Telephone Number, Contact Mobile Number, Contact E-mail Address, Manufacturer Description.

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    to their gain such as downloading illegal files on your internet and then it will look like you have done this and not the piggybacker. You can prevent this by putting security on your internet, such as a password. There are other types of malicious damage which could include the

  1. BTEC Unit 8: The Theory of Data Communications

    Data Circuit-terminating Equipment (DCE) DCE and DTE work together by the DTE connecting to the Internet or network service offered by the DCE. This is network equipment which controls the communication. Some examples of these are: * A Bluetooth dongle in a PC, which is sued to synchronise a mobile phone or PDA.

  2. Internet and Internet Activities

    Video content was impossible to access but after the development, Broadband connections enable data to be transferred much faster than narrow band and there is also a permanent connection that does not tie up the normal phone line as the user can choose to get online connection by an ADSL

  1. Database Coursework on a Rental System: Design

    For example, one teacher can have one classroom and this classroom can have the one teacher. In a one-to-many relationship, for every occurrence of entity A, there are many occurrences of entity B. For example, one manufacturer produces many vehicles, but each vehicle has one manufacturer.

  2. Network Security

    Server: The server or the host computer houses all the data and the software that is to be accessed by the clients. Client: A client can be referred to as an input/output hardware device that lies at the other end of the communication circuit.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    This includes not having out of work talks with others and doesn?t have visitors in the work place which affects their quality of work. Stress tolerance- Here the employee must be able to work under pressure but still be able to have the quality of work.

  2. Describe the future of the Internet.

    It has become more accessible as many people can use there mobile phones to access these websites. These social networking websites allows the users to follow popular celebrity?s and follow news using these websites, they have become a part of many peoples daily lives, companies take advantage of this and

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work