Mr C Johnston ICT Teacher

Slides:



Advertisements
Similar presentations
E-Commerce: Security LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Mr C Johnston ICT Teacher
BTEC Unit 29 – Lesson 02 Preparing to Change
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Mr C Johnston ICT Teacher
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Unit 28- Website Development Assignment 1- THEORY P3
Higher Administration
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
Mr C Johnston ICT Teacher
Mr C Johnston ICT Teacher
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
OCR Nationals Technological Innovation and E-Commerce Unit 8.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Website on Computer Security By: Brittany Freeman.
BTEC IT Unit 02 Lesson 07 Utility Software Mr C Johnston ICT Teacher
G041: Lecture 16 Section B Revision Questions
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Internet Security for Small & Medium Business Week 6
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 15 Network Tools and Utilities.
Computer Legislation The need for computer laws Go to Contents.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
G053 - Lecture 08 Hosting Websites Mr C Johnston ICT Teacher
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 06 Peer-to-Peer VS Client-Server.
Mr C Johnston ICT Teacher
Mr C Johnston ICT Teacher
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Mr C Johnston ICT Teacher
Mr C Johnston ICT Teacher
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
G042 – Lecture 4 Task G Briefing Notes Mr C Johnston ICT Teacher
G053 - Lecture 18 Uploading Your Site Mr C Johnston ICT Teacher
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 08 Emerging Technologies.
Mr C Johnston ICT Teacher BTEC IT Unit 03 - Lesson 07 Information System Case Studies.
BTEC Unit 06 – Lesson 06 Evidencing P3 Mr C Johnston ICT Teacher
G053 - Lecture 05 Analysis Documentation Mr C Johnston ICT Teacher
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 01 Introduction to Computer Networking.
Mr C Johnston ICT Teacher G041: How Organisations Use ICT Introduction To The Unit.
Mr C Johnston ICT Teacher G055 - Lecture 01 Introduction and Benefits of Computer Networks.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 04 Application Layer Protocols.
BTEC IT Unit 02 Lesson 07 Utility Software Mr C Johnston ICT Teacher
Policies and Security for Internet Access
BTEC ICT Level 3 Unit 8 E-Commerce. Session 12 – Costings for an E- Commerce Site What is web hosting?
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Mr C Johnston ICT Teacher BTEC IT Unit 08 - Lesson X P6 – Plan an E-commerce Strategy.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Unit 12: Topic 03 Organisational Structures Mr C Johnston ICT Teacher
What is this called and why is it there?. What is this called and why is it there?
BTEC ICT Level 3 Unit 8 E-Commerce
TB2 Lesson 5 Data Protection
Understand mechanisms to control organisational IT security
Data Protection.
BTEC ICT Level 3 Unit 8 E-Commerce
Presentation transcript:

Mr C Johnston ICT Teacher www.computechedu.co.uk BTEC IT Unit 28 - Lesson 05 Security Risks and Protection Mr C Johnston ICT Teacher www.computechedu.co.uk

Session Objectives Know different security threats which could compromise a web host, Understand measures which can be taken to prevent security threats from striking, Be able to apply a range of different laws to the setting up and running of a website for ecommerce purposes.

Security Risks Interception of data Hacking Viruses Identity theft

Prevention Methods Firewalls SSL Certificates HTTPS Strong Passwords Captcha

Website Security

Legislation Data Protection Act (1998) Computer Misuse Act (1990) Trade Descriptions Act (1968), Consumer Protection Act (1987), Price Marking Order (2004) Electronic Communications Act (2000) Electronic Commerce Regulations (2002)

Remember to apply your points to ICE Arena and its customers… Don’t just copy out of the book Topic Exercise Produce a report which explains the different security threats to a website and some of the measures which can be taken to try and prevent attacks. Add a table to your report which defines the laws on slide 6 and explains how they affect ICE Arena once the website is up and running. BTEC book unit 28 section 2.3 / 2.4 p11/12 BTEC book unit 08 section 2.4 / 2.5 p17-21 P3 – Explain the security risks and protection mechanisms involved in website performance. For P3, as well as discussing the general security risks which threaten the integrity of data, you should define the laws and guidelines that a particular website has to adhere to. This could include, for instance, a website that stores users’ details, it will be legally required to comply with the Data Protection Act (DPA). You should write a short report, with the use of screen grabs, to evidence their understanding.