Friday, 16 May 2014

Task 2 p3

Security risks


Hacking
When a computer system is hacked it is normally due to there being a weakness on said system. The 'hacker' then takes advantage of this weakness to gain access to the computer and alter or delete files.
Identity theft
To steal an identity you must have all of the victim's personal information and data. This can be done by creating a false website which requires these details to gain access. 
Viruses
These can be found mainly in downloadable files and emails, as the user does not know these contain viruses, they open them and are then infected. They are capable of destroying your computer system or just affecting the speed of the computer.
Firewalls
Firewalls act as your computer's shield against potential threats. You can toggle the access for specific software. Devices such as routers would have hardware firewalls and its own set of firewall rules. Software firewalls should be in place in case a threat makes its way past the first firewall.
Passwords
Passwords are widely used by most websites that require user accounts. The password is needed to access the data and information stored in the account.
SSL
SSL stands for 'secure socket layer'. This encodes the data from the internet on the site's network connection. Any site that uses SSL has a certificate to show users that they are a safe and protected site. 

Reasons why Play.com will collect and store your data

Reasons why Play.com would share and protect your data

1 comment:

  1. www: P3 achieved. You have explained the security risks and protection mechanisms involved in website performance and given a good example to illustrate the report.
    ebi. You had an introduction

    ReplyDelete