• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Passwords Data Encryption

Extracts from this document...


Using Passwords Should use a mixture of random numbers and letters. Don't make it hard to remember. Don't use names as they are too easy to search for and relate. Don't write it down on paper - lose it or someone may find it. Could use a mixture of "jumbled" initials and date of birth. If you forget password, it may not be possible to access work. How else can we protect against unauthorised access? Limit access to computers - only allow read or write access to certain individuals. Add a bio recognition device. Use a firewall. Securing Data accessed over Internet Fear of fraud if personal details are intercepted by someone. ...read more.


Encryption does not stop a hacker getting into a system it stops the hacker from understanding the data, one type of encryption is to jumble letters in the wrong order or to change letters to numbers. Recognise that a site is secure - message on screen or padlock - means any data sent to or from the site is encrypted and secure. How is data secured on the internet? Secure websites (padlock); Use encryption to transfer data; Check for HTTPS's (hyper text transfer protocol over socket layer) at the beginning of the URL (universal resource locator); Your browser software will encrypt any data being transferred from that page and it will be decoded. ...read more.


(Pupils could check how up to date the information is.); Updates: the most recent update of the site can be found in the site information or from clues in the text, such as dated news items. Advertisements: the number of adverts and their level of prominence can reveal how much the site depends on income from advertising. Pupils should remember that some sites sell advertising space as a means of maintaining their presence on the web. Some charities do the same but their prime objective may be to publicise their charity and to raise money. ; Web access - depends on connections you have got. Could be slow because of - fast access speeds; large amounts of memory used on web page; data access could be slow as you have to wait whilst website loads. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Software section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, I would grade the report as 'Pass'. This is the lowest mark within ICT. The report states a number of technical terms relating to data encryption, and explains these toughly. However the process of how these are used ...

Read full review

Response to the question

In summary, I would grade the report as 'Pass'. This is the lowest mark within ICT. The report states a number of technical terms relating to data encryption, and explains these toughly. However the process of how these are used within websites lack detail. The report shows basic understanding of how people should protect their accounts with using passwords and a number of measures to prevent unlawful access. It's quite difficult to understand the thinking behind the student throughout the report. The report states 'Secure Websites (padlock), it's not clear what is meant by this. I'm assuming that this is the padlock symbol displayed on the internet browser to tell the user that the website is safe. However the report doesn't explain this or give any screenshot of this in practice.

Level of analysis

The report is lacking analysis, which is required for either an Merit/Distinction in ICT. There are points, which could be explained in-depth, although the report doesn't go further enough to be granted these marks. For example the report states 'Use a firewall', however what is a firewall? The student could research what this is, and explain how this protects unlawful access.

Quality of writing

The writing style is almost as bullet-points, which doesn't allow the student to give an in-depth answer. For either a Merit/Distinction, the report should be in a paragraph format to give an detailed answer. On the flip side, the report states the term 'Encryption' and gives a detailed answer. This part would be awarded with high marks, however other areas of the report are needed to be of the same high standard. In addition, terms such as 'HTTP' are described and gives an in-depth answer. The report does mention a number of other technical terms and these are explained. The quality of the answer regrading technical terms, would grant the student high marks of this aspect of the report.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 19/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Software essays

  1. OCR National - Evaluation of Website

    say, Times New Roman, yet still being standard; it is also easy to read for some people who require more viewing assistance (accessibility). Arial Narrow is used for normal text as it looks different, smaller than most other fonts (therefore more flexible when 'stretched' to fit a box)

  2. Free essay

    Logo Evaluation

    It has all the right buttons so you can do everything you need to do on it. I also feel comfortable using this package as it is so easy to use. Explain why you think your logo is suitable for use on wage payslips, letter headings and posters.

  1. ICT GCSE Coursework - Documentation.

    > Rover and blue (a list of blue Rovers) > Ford Escorts (a list of Ford Escorts) > Ford ( a list of Ford cars) The sorts I did were: > Alphabetical > Numerical Once I had done these searches I checked if they were correct and that the computer

  2. What is a computer registry?

    Windows originally used INI files - text files organised in a simple format that could be read and written using special routines available to Windows programs. Windows had one configuration file, SYSTEM.INI, which was used for all the internal settings plus another, WIN.INI, for user preferences.

  1. AQA GCSE ICT Specification B

    I will chose fonts, layouts and colours to make the system clear and easy to use. Finally I shall write the code for the new system, incorporating all the requirements outlined in previous sections. Implementation I will decide upon the best method of implementation, e.g.

  2. Database Evaluation.

    * It must be able to work on mail merge so that letters etc can be created quickly.

  1. Youth Club Database Solution

    It reads: =Q#+T#+W#+Z#+AC#+AF#+AI#+AL# etc... Unfortunately, there is no quick way of doing this as both the 'Paid' and 'Owe' Fields contain values so it's difficult to do it any other way except adding up every third cell. The final formula appears firstly in Column Q, and all of the 'Owe'

  2. Documentation of a database for a sports centre.

    - Number * Date of Birth - Validation Checks - Number * Postcode - Validation (e.g. mix of 6 numerals or letters) , Text * Membership Type - Text * Email - Text * Doctor Number - Validation (e.g. 11 numerals)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work