Presentation is loading. Please wait.

Presentation is loading. Please wait.

Web Security and Regulations Unit 23. Assessment Objective One Research and describe current and past security risks.

Similar presentations


Presentation on theme: "Web Security and Regulations Unit 23. Assessment Objective One Research and describe current and past security risks."— Presentation transcript:

1 Web Security and Regulations Unit 23

2 Assessment Objective One Research and describe current and past security risks

3 Pass Candidates research and provide a basic description, supported with few examples, of: three security breaches, two examples of fraudulent use of ecommunications, one hazard through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They describe, in basic terms, the vulnerability of WLANs (wireless local area networks).

4 Merit Candidates research and provide a detailed description, supported with appropriate examples, of: three security breaches, two examples of fraudulent use of ecommunications, two hazards through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They clearly describe the vulnerability of WLANs.

5 Distinction Candidates research and provide a comprehensive description, supported with a variety of well chosen examples, of: three security breaches, two examples of fraudulent use of e- communications, two hazards through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They evaluate the vulnerability of WLANs.

6 Three Security Breaches House Analogy Three Teams Three Questions Three Minutes How is your house protected How are your belongings protected What is the worst case scenario is your house security is breached

7 School Security

8 Security Not just hacking! Gaining information through any means

9 Three Famous Breaches! Labour Party Photo Gallery Data Leak from a University Careers site USA theft of credit card details from an eCommerce enterprise

10 Other Breaches

11 Merit Candidates research and provide a detailed description, supported with appropriate examples, of: three security breaches, two examples of fraudulent use of ecommunications, two hazards through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They clearly describe the vulnerability of WLANs.

12 Fraudulent use of E- Communications E-Mail Scams are the most common The “Nigerian Scam” is the most common

13 Fraudulent use of E- Communications Phishing Scams http://www.youtube.com/watch?v=3DN17A NbGdU

14 Outcomes Two Scams – How they worked – The outcomes – How it could have been stopped – Why are these two noticeable – Quote sources – Start of Thursdays lesson.

15 Task Three One hazard through site overload (DoS Attacks) Two examples of hardware or software being contaminated or ruined through e-communications.

16 Homework They clearly describe the vulnerability of WLANs.

17 Submission Work due in at the start of Mondays Lesson


Download ppt "Web Security and Regulations Unit 23. Assessment Objective One Research and describe current and past security risks."

Similar presentations


Ads by Google