P3 explain the security risks and protection mechanisms involved in website performance Security Risks A security risk is when a person or situation which poses a possible threat to the security of something. Hacking: The risks of having your website hacked are that it can become non-operational for an extended period of time. The risk of this is that customers won’t be able to access your website and won’t be able to buy your products or services. Another risk is that your website could end up on the Google blacklist, which will lower your chances of appearing on Google’s search results. If your website is hacked, people won’t buy from you. People will not take the risk of also being hacked and having their credit card details stolen. For example if your website has malware, people will not browse your website.

Viruses: The risks of having a virus on your website, is that not only will your website will be infected but your computer too and this will severely harm your computer, files and programs. A virus can have the risk of simply causing your internet connection fail or as complicated as a spyware that sends personal information about you back to its creator. Another risk is that the virus will infect the boot sector of the hard drive and the boot information and this will allow the virus to clone itself when your computer boots up and therefore make it more difficult to remove. A very dangerous risk that a virus can cause is a complete destruction your computer.

Identity Theft: The risks of identity theft is that your personal information will be stolen and can lead the perpetrator to register for credit cards, mobile phones and other services as your identity and can cause financial loss. Another risk is that the information gained will be used to log in to existing accounts and perform transaction in your name. Risk like this happen because of viruses and hacking, and if they have access to your email they can send you links to malicious websites or websites will have you wright more information about yourself.

Protection Mechanisms A Protection mechanism is built into the computer architecture and is the process that helps support the enforcement of security policies.

Firewall: A Firewall is a program or device that acts as a security and that helps protect your computer from viruses and malicious websites. Firewalls work as a filter between your computer and the Internet. You can decide on what types of emails you want being sent to you and what types of websites you can access e.g. social networking sites. Trojan horse programs and spyware are a common cause for identity theft. A Firewall can prevent your computer from harbouring such programs by either allowing all traffic to pass through except a specific type of data, or it can prohibit all traffic unless it meets it too is a certain type.

Secure Socket Layers: The Secure Socket Layer or SSL is a protocol where devices communicate over the Internet in a secure fashion. The problems with communicating over the internet is that you don’t know that the person you’re talking to is who they are and you don’t know who could be watching the conversation, SSL helps prevent this. When securing web communications on a website, a public key is first established, and this is the SSL certificate. This verifies that they are who they say they are. Once the verification is complete, a new public key is obtained. When someone wants to communicate to this website they will do so on its SSL-secured port.

Adherence to Standards – Strong Passwords Adherence to standards is the act of following to the rules of a website or web browser with the web standards of the World Wide Web Consortium. When owning an account on a website it’s key to have a strong password that only you will know so that it ensures the safety and security of your personal information. For example if you have an account on a shopping website the information on there is typically your email, a registered card and your zip code. When making sure you have a strong password, include lower case letters, uppercase letters and numbers. Strong passwords help protect you from financial loss and identify theft.

Laws and Guidelines That a Particular Website Has to Adhere To: The particular website that I will be defining the laws and guidelines of is the social networking website Facebook. Facebook has to legally comply with the Data Protection Act of 1998 because it stores the data of its millions of users. Facebook is not allowed to share any of your information on any other websites or even anywhere for that matter without your consent or permission. When the you have allowed Facebook to share your information it has to be used fairly and lawfully, being for limited purposes as well as being kept for no longer than necessary. When that information is shared to another website, then that other website has to now follow the Data Protection Act and keep it safe and secure. The last of the rules its Facebook has to abide by is to not transfer the information outside of the UK unless it has an acceptable protection.

P3 explain the security risks and protection mechanisms involved in ...

virus can have the risk of simply causing your internet connection fail or as ... Facebook has to legally comply with the Data Protection Act. of 1998 ... P3 explain the security risks and protection mechanisms involved in website performance.pdf.

303KB Sizes 0 Downloads 211 Views

Recommend Documents

P3 explain the security risks and protection mechanisms involved in ...
P3 explain the security risks and protection mechanisms involved in website performance.pdf. P3 explain the security risks and protection mechanisms involved ...

P3 Security risks and protection mechanisms involved in website ...
Page 3 of 3. P3 Security risks and protection mechanisms involved in website performance.pdf. P3 Security risks and protection mechanisms involved in website ...

DNA protection mechanisms are not involved in the ...
system (Bio-Rad) at 6.5 V/cm2 for 24 h at 16°C, with a linear pulse ramp of 15±70 s and a switching angle of 120°C. The gels were stained with water containing ...

Diversification and Energy Security Risks: The ...
The 1973 Arab–Israeli war and the subsequent oil crisis had a significant impact on Japanese energy policy. In response to increased oil prices and concerns about the availability of oil, Japan institutionalised a policy which had two pillars designe

Neural mechanisms involved in the detection of our first ...
Received 3 October 2003; received in revised form 29 April 2004; accepted 2 July 2004. Abstract. In everyday social interactions, hearing our own first name captures our ... sleep could evoke behavioural responses (Oswald, Taylor,. & Treisman, 1960),

Epub Critical Infrastructure Protection in Homeland Security ...
Security: Defending a Networked Nation, pdf Ted G. Lewis Critical Infrastructure .... While the emphasis is on the development of policies that lead to successful ... nation s most valuable physical assets and infrastructure sectors as networks of.

The data protection act website page(P3).pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. The data ...

Diversification and Energy Security Risks: The ...
than seeking to define energy security comprehensively and while ..... index models in terms of ease of calculating the enormous number of co-variances.

Data Security Model and Data Protection - HackInBo
Oct 29, 2016 - Credit Card Number DE_CCN. Tokenize. (expose first 6, last 4). Payments, CSR. 9 – 5,. M -F. EDW,. Hadoop. Unauthorized. Authorized. E-mail Address. DE_EMAIL. Tokenize All. HR, CSR,. DS_Haddop. EDW,. Hadoop. Unauthorized. Authorized.

Overlapping and distinct brain regions involved in estimating the ...
Overlapping and distinct brain regions involved in esti ... l position of numerical and nonnumerical magnitudes.pdf. Overlapping and distinct brain regions ...

On using fuzzy data in security mechanisms
nerable to insider attacks [2, 20]; proprietary encryption methods relying on keeping the .... We propose an efficient solution: Anonymous Veto Network (AV-net). The .... the engraved patterns to cheat the fingerprint scanner [35, 36]. This kind of.

The security risks of AJAX/web 2.0 applications
Mar 2, 2007 - that handles calls between the client and server. Typically this would be a library of. Javascript functions included on the page. While this is a ...

The security risks of AJAX/web 2.0 applications
Mar 2, 2007 - familiar with Javascript and HTML can explain the ... tice where a PHP file is set as required ... the site employed one Javascript include file for ...

is the left hippocampal formation involved in the ...
(2) head direction, which is processed in the head direction cell system and (3) place, which is processed at ..... was recorded using a magnetic tracking system.

Secure the Cloud Storage and Recovery of Security Risks and ... - IJRIT
of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. ... In order to define cloud computing, it is first necessary to explain what is ... Software as a Service provides software or application which can be