• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Solving and Reducing Internet Problems

Extracts from this document...


(M1) Solving and Reducing Internet Problems (M1) Introduction: This report was produced by undertaking research into the ways of solving and reducing some of the problems associated with different types of business activities. I have identified the problems and what solutions would be. The report was produced by Haroon Sheikh and requested by Websters Supermarket. The report was compiled and submitted on 25th FBY 2008. Findings: I have found that less than one-third of Internet users have any idea what phishing is, and less than four percent have changed their online habits, despite most users being the target of numerous phishing scam attacks. Phishing scams are criminal attempts to steal users' personal information by masquerading as a trustworthy business, such as a bank or auction site, in emails or other electronic communications. Any personal data captured is used for identity theft, credit card fraud, and other crimes. Risks of Internet Connection A business with only physical premises to look after still needs to consider security, a business that presents it self on the Internet immediately has many other forms of threats. There are some issues that can affect e-commerce businesses at any time and these must be considered and monitored. These include: Spam - Not-required rubbish or junk mails, which can be blocked through easily installed filters on email accounts. Spyware - uses different methods to get installed on your PC and attempt to sell you things or in some cases scam money from you by hacking your password/ card details. ...read more.


This method is rarely used because most customers are reluctant to email credit or debit card details, despite the fact that their internet browsers will SSL encryption as standard. 2. Pay a Payment Service Provider (PSP) to collect and process payments on its behalf. This is very useful small businesses. In this case, when the customer makes a payment, it is captured on the secure site belonging to the PSP. PSPs charge a fee for this service. They also hold on to the money for between 30 and 60 days as a precaution against fraud. Only then they will pass it on to the suppliers. Examples include World Pay and NetBanx. 3. Arrange with their bank to operate their own merchant service and process their own payments on a secure website. Banks will only agree to this if they are convinced of the financial status of the business, the security arrangements in place and are satisfied with the terms and conditions of online trading. 1. Ebay is a target for fraudsters as they can easily create pop ups allowing the user to save their password and in return they will steal all your personal details. However there is a solution to this problem as instead of using passwords to log on to your page on ebay then finger print could be used. The reason for this is passwords not the solution for identity theft as they can be inconvenient to memorise and they are impractical to safe guard. ...read more.


Standard security practices dictate a "default-deny" firewall rule set, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" rule set, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely. I have also found out that to help reduce the risks to computer security, organisations can implement sensible procedural precautions, such as IT technicians switching off features that automatically open attachments to email, ensuring that operating system updates are always installed and instructing staff about the danger of opening email attachments from unknown senders, In addition to this Anti-virus software needs also to be installed as A computer program designed to detect and respond to malicious software, such as viruses and worms. Basic Protection Systems Install a firewall on the computer. This software acts as a protective barrier and regulates access to the computer. Install Anti-virus software which is regularly updated by the Software Provider. Install software which routinely checks the hard drive to find out and repair and breaches. Download and protective patches or other recommended updates available on the Microsoft Website. Never open email attachments from unknown senders or delete them. Never tell anyone your password. Check that any young children in the family are protected by the installation of parental control software and know how to use the computer safely. ?? ?? ?? ?? BTEC National Certificate Unit 29: Introduction to Internet and e-Business 1 H.Sheikh ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Processes: - The staff member enters a Customer ID or name into the system, and a query is performed in which the customer's record with that particular ID or name will be displayed onscreen. 20. Details of a particular vehicle displayed onscreen Inputs: - Vehicle ID, Model, Manufacturers Code, Registration Number, Current Mileage, Daily Rental Price, Class, Colour, Availability.

  2. ict as level coursework

    Also any data that is saved on the hard drive should be backed up via a reliable medium like re-writable CDs. Data that has been backed up should be on the premises in a safe and another copy at another location.

  1. IT Security Threats to Users and Businesses.

    Things like forgetting to back-up data or not putting data in a secure located place can all big mistakes to the business if anything was to go wrong and someone had forgetten to back-up the data. It also could be a big mistake if for example someone hadn't had the

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    After the Ok button has been pressed the macro will run the four queries which will first put the data from the main form and the sub form into two make tables. The macro will then run the two update queries which will transfer this data into the main form table and the sub form table Test Plan Test No.

  1. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    1971 - Email Ray Tomlinson a BBN employee devised the first electronic mail for APRANET, while trying to develop the TENEX operating system in the early 1970s, with the local email programs called SNDMSG and READMAIL. In late 1971, Tomlinson created the first APRANET email application by adding a program called CPYNET to the SNDMSG when he updated it.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    practice to flag up the information that is in dispute, but this is not required by the Data Protection Act. If you do then find out the information is inaccurate then you will then be covered by the act. When recording opinions, it just be stated that they are opinions and if necessary, must be stated whose opinions they are.

  1. Task A Internet and Intranet use

    This helps meet the objectives because It well help them to get good results in future as they would have the knowledge then to perform well in exams and complete coursework to a good standard. The staff can use the internet to look at the progress of other schools and

  2. Describe the future of the Internet.

    Academic impact on the internet Technology has changed the academic environment largely. Before the internet students in higher education had to access knowledge using libraries and books, and may have had to pay for books they required, this has been the traditional way many student got there information for many years.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work