UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
TS 313 Multimedia Applications Welcome to TS 313 Multimedia Applications There is no audio lecture associated with this set of introduction slides Refer.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Pennsylvania’s Protection From Abuse Database
Introduction to Computers. Michael R. Izzo
Information Processing Lecture 3A Information Technology and The Law.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Unit 28- Website Development Assignment 1- THEORY P3
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Computer Training Session Use of Online Resources and Communication Tools for Promoting ILS/FOA A : Training for GUFs (5-10 July 2004: Bangkok)
CPS Acceptable Use Policy Day 2 – Technology Session.
OCR Nationals Technological Innovation and E-Commerce Unit version.
Technical Writing Li Xin. Definition History Types Capabilities of technical writer Capabilities of translator.
Education with E-portfolio E-portfolio is now an important element of the Touro College Graduate Education and Special Education program. Introduced in.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
G041: Lecture 16 Section B Revision Questions
UNIT 1 DOMAIN NAMES Cambridge Technicals. Domain names You are going to prepare a presentation for a group of small business owners. They are interested.
Being Ecommerce Sophon Thanasrivilai #100485
By Vanessa F Small Business Internet Guide. start-up Website address and logo or screenshot.
Connecticut History Online A digital library? By Todd Vandenbark.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Computer Legislation The need for computer laws Go to Contents.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
Chapter 6 FINDING AND APPLYING FOR A CAREER. USING TECHNOLOGY AT WORK Information Technology (IT) refers to the creation and installation of computer.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Purpose of Treatment plans Communicate the purpose of a given treatment to all parties involved in the process; including patients, counselors, referral.
Certifications for the Electronics Field. Introduction This lesson covers the following topics: The basis for certification The requirements for various.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
 Introduction to Computing  Computer Programming  Terrorisom.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
UNIT 1 WEB DESIGN SOFTWARE Cambridge Technicals. Web design software You have been asked for advice about the different software which is available for.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Mr C Johnston ICT Teacher
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
PUBLISHING & COLLABORATION. SOCIAL NETWORKING ▪ Web sites such as Facebook, Twitter and LinkedIn are generally the first names people associate with social.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Exam Briefing COMP1205. About the exam Format Two parts Timing 90 minutes Extended time (special circumstances) You can go back and forth through part.
Acceptable Use Policy (Draft)
To the ETS – Accounts Setup and Preferences Online Training Course
Objectives Understand legal aspects of software
Section 12.1 Section 12.2 Discuss the functions of a Web site
Pima Medical Institute Online Education
Unit# 5: Internet and Worldwide Web
QQI Quality Assurance Guidelines Website
Pima Medical Institute Online Education
To the ETS – Accounts Setup and Preferences Online Training Course
The Computer as a Medium for Sharing Knowledge
Internet Vocabulary Terms
LO1 - Know about aspects of cyber security
A Look Ahead to The Project
Presentation transcript:

UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals

P3 – the outcome of this section Research each of the topics on the following slides and produce a report entitled “Security protection mechanisms”. Begin the report with a short introduction about how you are going to explain how different methods can be used to enhance the security of web sites. Try to include examples wherever possible.

P3 Firewalls What is the purpose of a firewall? Can a firewall be software and/or hardware based? Can you find an example of a software program which acts as a firewall?

P3 – Secure Socket Layers What is a secure socket laer? You need to explain this in simple terms. This document will provide yo with the basic information. There are three separate pages for you to use. Secure socket layers It is particularly important that you write this section in your own words.

P3 Digital certificates What is meant by a digital certificate and how does this help security? This document will provide you with useful information. Look particularly at page 5 for information on how to view a certificate for a web site. Digital certificates

P3 Use of passwords What guidelines could you suggest for the creation of a secure password? There are plenty of sites offering advice online about how to do this. Carry out a web search and come up with your own list of rules for people to follow when creating passwords.

P3 Legal considerations There are a number of Acts covering the use of computers for communication. Research each of them and give a BRIEF account of how they are intended to promote security. The Data Protection Act (possible link)possible link Privacy and Electronic Communications Regulations (possible link). You just need to summarise the areas covered by these regulations.possible link The Computer Misuse Act (possible link – concentrate on slides 7-9)possible link