Unit 28- Website Development Assignment 1- THEORY P3

Slides:



Advertisements
Similar presentations
TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
Advertisements

How Many Ways Can You Connect To The Internet?
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Mr C Johnston ICT Teacher
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
HIPAA Security Standards What’s happening in your office?
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Website on Computer Security By: Brittany Freeman.
Internet Security for Small & Medium Business Week 6
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Protecting Students on the School Computer Network Enfield High School.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
 Introduction to Computing  Computer Programming  Terrorisom.
BTEC National Level 3 Website Production. Lesson objectives To understand factors that influence website performance To understand factors that influence.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Mr C Johnston ICT Teacher
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
Securing Information Systems
Chapter 40 Internet Security.
Setting and Upload Products
Chapter 5 Electronic Commerce | Security Threats - Solution
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Chapter 5 Electronic Commerce | Security Threats - Solution
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Security.
Unit 4 IT Security Kerris Davies.
Unit 8 Network Security.
G061 - Network Security.
INTERNET SECURITY.
Presentation transcript:

Unit 28- Website Development Assignment 1- THEORY P3

Overview Of The Unit Fancy That! is a business selling fancy dress costumes. They want to create a website to advertise their business with a catalogue the customers can look through. They hope in the future to sell their products online. They have asked you to produce a series of reference guides to help them understand the technical work and the security work that needs to be completed.

Summary Of P3 For P3, as well as discussing the general security risks which threaten the integrity of data, learners should define the laws and guidelines that a particular website has to adhere to. This could include, for instance, a website that stores users’ details, it will be legally required to comply with the Data Protection Act (DPA). Learners should write a short report, with the use of screen grabs, to evidence their understanding. Overview of security protection mechanisms: firewalls; Secure Socket Layers (SSL); adherence to standards eg strong passwords

Completing P3 Create a report or presentation Add the title “The security risks and protection mechanisms involved in website performance” Introduce and summarise your work Cover these areas: Risks Different site types different risks (hacking, viruses, spam, denial of service). Social networks & blogs vs E-Commerce Examples of websites that have been compromised e.g. Sony Security Solutions Server security (e.g. Firewalls / SSL) Good guidance / technology on stopping hacking / malware in organisation On site / page security (e.g. encryption, passwords, captcha, authentication, E-Commerce verification of payment) Legal & Public Perception Protection Data Protection Act- are you within the law? CDPA Act- are you within the law? Public Perception- are you ethical in your business practices / political allegiances- could this cause unwanted attention?

What Is A Firewall? A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings. A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.

How Does It Work? The following illustration shows how a firewall works: A firewall isn't the same thing as an antivirus program. To help protect your computer, you need both a firewall and an antivirus and anti-malware program.

What Is SSL? SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.

VIDEO: Explaining SSL https://www.youtube.com/watch?v=SJJmoDZ3il8