Explain the security risks and protection mechanisms involved in website performance
Task 2.2 To meet Pass criterion P3:
All web sites have the potential of being ‘Hacked’ and even the possibility of criminals creating a “look alike” site to "phish" for information which could lead to identity theft or theft of other data such as credit card details.
Research each of these terms (hacking, phishing, identity theft and viruses) and explain each in your own words in pamphlet/report/presentation, suitable for any business that intends to develop an on-line presence. You must also explain the importance of security protection mechanisms such as firewalls, SSL and strong passwords. You must also include the principles of the Data Protection Act (DPA), and why websites are legally required to comply with the act.[P3]
Hacking-This is where another computer user gains unauthorized access to your PC or Laptop, this can be for many reasons stealing personal data information. Hackers can use a PC system for many different reasons for using your hard-drives as more storage to legal activity such as a D dos attack if a hacker has control over many systems distributing pornography can be a problem for you and make the polices job allot harder.
Viruses-These come in many forms designed to attack a personal computer and steal password emails personal information or in some cases damage the computer itself by deleting important files. A virus has to be coded and in the coding of the virus it duplicates itself over and over again this can cause many problems such as stopping programs from actually working but not all viruses are designed to cause your system to become so unstable that the computer will not work anymore some viruses are just really annoying as they bring up unwanted sounds text images but the main pain with a virus is they take up storage which could be used for more files and programs.
Phishing-This is a really big problem in the computer world as emails are distributed to people hoping they will submit their personal information mainly banking information. What basically happens is you will receive an email from a look a like bank they could fill in the information style it exactly the same way as an original bank email then it would say such and such like your details need updating with a link sometimes it will be a word hyper linked to the site or it will be a link that looks official but when you click it you end up on the phishers site
Identity theft-This is where other computer users will get as much information as possible on you and pretend to be you. This is very bad if this happens to you as the thief could run you up a load of bills or commit a crime as you this happens more now because the lack of human interaction with sites and protection. You can prevent this from occurring companies will help with this such as the Federal Trade Commission they offer tips and advice to help secure you from identity theft.
Security protection-This is the most essential piece of software you would need this is firewalls antivirus anti piracy, anti phishing, secure banking allot basically if you are in a high business or company you will need high security. Security this is a major part to a business having high security passwords this means using uppercase lowercase numbers and special characters. SSL is a small padlock that appears on websites when information that is personal or like banking information the padlock represents that the website is secure and is safe.
Data protection act- This was implemented in 1988 to help protect personal information therefore meaning your information cannot be sold or sent to other countries.This applies to websites because sites that store personal records and data have to have full security so that no damage or data loss can occur.
Data protection act- This was implemented in 1988 to help protect personal information therefore meaning your information cannot be sold or sent to other countries.This applies to websites because sites that store personal records and data have to have full security so that no damage or data loss can occur.
Quick points on the DPA act
.Data must not be acquired and processed unless there a lawful reason to do so.
.Data must be processed within the rights of the person supplying the data.
.Data must only be used for specific and lawful purposes.
.Personal data must be accurate and up-to-date .
.Provision must be made for the correction of data held.
.Suitable measures should be taken to ensure the safety of the personal data.
.Data held should be the minimum required for the purpose and should not be kept longer than is reasonable.
Data is not be transferred to countries outside of the European Economic area.
.