• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the security risks and protection mechanisms involved in website performance.

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐Hacking is when somebody gains unauthorised access to data in a system or computer. A hacker will break codes and passwords to get into the computer system which can cause a lot of damage to the system. Unfortunately, even with firewalls preventing hacking it still has occurred to many popular websites including Facebook, Microsoft and Twitter. Twitters systems were hacked early February 2013. The hackers were able to gain access to over 250,000 user accounts including their usernames together with their encrypted and randomised passwords. Phishing is when somebody tries to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organisation but contains a link to a fake website that replicates the real one where information is stolen. Many banks are the target of phishing. ...read more.

Middle

Its purpose is to prevent hacking from occurring. Internet data is transferred between the internet and to the computer through different ports. A firewall manages these ports and controls which programs have access to them. Another way to protect websites is Secure Socket Layers (SSL). Secure Sockets Layer is a computing protocol that ensures the security of data sent via the internet by using encryption. This is done by public key encryption and certificate-based authentication. Key encryption is a random string of numbers created for scrambling and unscrambling data. Encryption keys are designed with algorithms intended to ensure that every key is unpredictable and unique. The longer the key, the harder it is to crack the encryption code. They are used to make sure that hackers cannot understand the data if they are trying to steal personal information. Certificate-based authentication is a digital certificate which is obtained to a system for electronic commerce transactions. ...read more.

Conclusion

1. Personal data shall be adequate, relevant and not excessive. 1. Personal data shall be accurate and where necessary, kept up to date. 1. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary. 1. Personal data shall be processed in accordance with the rights of data subjects under the Act. 1. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country outside the European Economic Area unless that country ensures an adequate level of protection. Amazon must abide by the Data Protection Act when dealing with their customer?s information. They explain a lot of their policies regarding data protection on their website. They follow the act by allowing information to be updated or removed, allowing customers to provide some but not all information, data will be processed according to different data acts and to not give information to third parties without purpose. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    Protects work such as: 1. Art 2. Music 3. Programming code 4. Writing 5. Websites Once they are in a tangible form. For example the idea behind a website would not be subject to copyright and other individuals could produce a website using the same idea as somebody else ?

  2. Topshop Transactional website

    If a customer receives a faulty item and wishes to return it, it clearly states that you can return it to Topshop using the freepost returns label and process detailed in the return section. It also states that if a customer receives a faulty item Topshop will then refund the

  1. IT Security Threats to Users and Businesses.

    Things like forgetting to back-up data or not putting data in a secure located place can all big mistakes to the business if anything was to go wrong and someone had forgetten to back-up the data. It also could be a big mistake if for example someone hadn't had the

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    The ways that they are connected include if you no do update your information (Principle 4) it becomes inadequate (Principle 3) and if information is kept is kept longer than necessary (Principle 5), it may become irrelevant and excessive (Principle 3).

  1. Threats to Data

    Perhaps printing paper copies of each transaction would help but these would probably be the first things destroyed in a fire or a flood. This is why sensitive items like external backups and documents within a business or company is kept on the top floors if possible, this would meant

  2. Wjec alevel ict creating a website

    The fourth webpage Warley Training demonstrates to users of the website the importance that Warley Painters puts in its employees and show the training schemes that it offers it contains an Excel Spreadsheet showing the training schemes and places where they are run and the cost.

  1. Role of different departments at Bedrooms4U, personnel involved. Main processes carried out by Bedrooms4U,inputs, ...

    customers: -Public, Hotels, -House Builders Types of suppliers: -The company supplies the above in a large range of colours and sizes the finishes and styles are manufactored in the companys factory. -Stocks of handles, clothes rails and other internal fittings, such as shoe racks, are stored in the warehouse.

  2. The different aspects of the design of my website for Hatch end cars.

    Even though these changes were optional, they were strongly taking into consideration and the changes were made. These are shown below: MAIN MENU New buttons have been included in the MAIN MENU called FUNCTIONALITIES and EXIT as highlighted in the previous page.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work