• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Passwords Data Encryption

Extracts from this document...

Introduction

Using Passwords Should use a mixture of random numbers and letters. Don't make it hard to remember. Don't use names as they are too easy to search for and relate. Don't write it down on paper - lose it or someone may find it. Could use a mixture of "jumbled" initials and date of birth. If you forget password, it may not be possible to access work. How else can we protect against unauthorised access? Limit access to computers - only allow read or write access to certain individuals. Add a bio recognition device. Use a firewall. Securing Data accessed over Internet Fear of fraud if personal details are intercepted by someone. ...read more.

Middle

Encryption does not stop a hacker getting into a system it stops the hacker from understanding the data, one type of encryption is to jumble letters in the wrong order or to change letters to numbers. Recognise that a site is secure - message on screen or padlock - means any data sent to or from the site is encrypted and secure. How is data secured on the internet? Secure websites (padlock); Use encryption to transfer data; Check for HTTPS's (hyper text transfer protocol over socket layer) at the beginning of the URL (universal resource locator); Your browser software will encrypt any data being transferred from that page and it will be decoded. ...read more.

Conclusion

(Pupils could check how up to date the information is.); Updates: the most recent update of the site can be found in the site information or from clues in the text, such as dated news items. Advertisements: the number of adverts and their level of prominence can reveal how much the site depends on income from advertising. Pupils should remember that some sites sell advertising space as a means of maintaining their presence on the web. Some charities do the same but their prime objective may be to publicise their charity and to raise money. ; Web access - depends on connections you have got. Could be slow because of - fast access speeds; large amounts of memory used on web page; data access could be slow as you have to wait whilst website loads. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Software section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, I would grade the report as 'Pass'. This is the lowest mark within ICT. The report states a number of technical terms relating to data encryption, and explains these toughly. However the process of how these are used ...

Read full review

Response to the question

In summary, I would grade the report as 'Pass'. This is the lowest mark within ICT. The report states a number of technical terms relating to data encryption, and explains these toughly. However the process of how these are used within websites lack detail. The report shows basic understanding of how people should protect their accounts with using passwords and a number of measures to prevent unlawful access. It's quite difficult to understand the thinking behind the student throughout the report. The report states 'Secure Websites (padlock), it's not clear what is meant by this. I'm assuming that this is the padlock symbol displayed on the internet browser to tell the user that the website is safe. However the report doesn't explain this or give any screenshot of this in practice.

Level of analysis

The report is lacking analysis, which is required for either an Merit/Distinction in ICT. There are points, which could be explained in-depth, although the report doesn't go further enough to be granted these marks. For example the report states 'Use a firewall', however what is a firewall? The student could research what this is, and explain how this protects unlawful access.

Quality of writing

The writing style is almost as bullet-points, which doesn't allow the student to give an in-depth answer. For either a Merit/Distinction, the report should be in a paragraph format to give an detailed answer. On the flip side, the report states the term 'Encryption' and gives a detailed answer. This part would be awarded with high marks, however other areas of the report are needed to be of the same high standard. In addition, terms such as 'HTTP' are described and gives an in-depth answer. The report does mention a number of other technical terms and these are explained. The quality of the answer regrading technical terms, would grant the student high marks of this aspect of the report.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 19/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Software essays

  1. Database Evaluation.

    This was done very well but yet again the organiser of the squad found it difficult to the hang of and again once the skill was mastered it could be done very well. It was a simple task but was found hard so for future reference I will keep in

  2. Free essay

    Logo Evaluation

    It has all the right buttons so you can do everything you need to do on it. I also feel comfortable using this package as it is so easy to use. Explain why you think your logo is suitable for use on wage payslips, letter headings and posters.

  1. Documentation of a database for a sports centre.

    11 numerals) , Number * Medical Problems (e.g. asthma) , Text * Date Member Joined - Validation (e.g. should fill in the following with only numerals _ _/_ _/_ _) , Number * Expiry Date - Validation (e.g. should fill in the following with only numerals _ _/_ _/_ _)

  2. GCSE IT Evaluation of word processing template documents for the Extreme Sports Club.

    This objective was very successful. All data was entered into the correct place and all the end user had to do was type in the data. * The payment reminder should be easy to personalise with the ability to enter specific details in specific places by having the same layout as the payment reminder template but with different information.

  1. Selecting the best software for a theatre business.

    Microsoft Access Microsoft access offers my user: 1. Mail merge, Microsoft access allows Bob to save the addresses and have them automatically send to that address. 2. Access contains Wizards that walk Bob through each step of the way. Bob does not need to have database experience in order to use it.

  2. What is a computer registry?

    Windows originally used INI files - text files organised in a simple format that could be read and written using special routines available to Windows programs. Windows had one configuration file, SYSTEM.INI, which was used for all the internal settings plus another, WIN.INI, for user preferences.

  1. Reviewing different multimedia presentations.

    Screen shot How does the text/image relate to the aim(s) of the product? What this screen shot is showing is that it shows the way that the Multimedia Presentations is showing the different car parts and this is what it shows.

  2. Spreadsheet Technical report. My task was to produce a grade book for primary ...

    When the "Insert Function" box appeared, I found the "IF" function and clicked on it. 3)A "Function Argument" box then appeared. In the space next to the words, "Logical_test" I started to create the formula I needed. I wanted to create a function which told me, if the person

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work