Friday 16 May 2014

Task 2 - Unit 28



P3


The Data Protection Act
This is in place to ensure that the user's data is not given to third parties if they don't wish, also there is a security for them. The DPA 1998 is parliament law on the processing of data for living people.
Things such as;

  • Name
  • Address
  • DOB
  • Contact information
  • Convictions
  • Bank details
Plus many more.
Due to the databases being stored online, it left the door open for data to be taken by hackers or transferred by companies and this is why the DPA came into place to try and give the customers some confidence that the information they give can be trusted not to be abused (given away or stole).

Security Risks
Hackers - They pose serious threats to both businesses and civilians that use the web. Hackers target vital information such as passwords, account names and email address in order to steal identities, they do this through either spyware or the internet itself.
Viruses - Hackers create these infected files that are then put onto websites or in files and when the website or file is accessed/downloaded the virus is transferred to your device. Once infected the hackers can use the program to access your device and/or steal information stored on it.
Identity Theft - This is when someone obtains enough information about the person that they can pretend to be the person. Things such as DOB, name, address, past addresses, contact information etc. A database with all data stored online would be a target for people wanting to take information for this purpose. It is vital that there is security in place to stop this happening.

Security Protection
Firewall - A wall that only lets authorised data pass through, unauthorised data is blocked and thus makes the risk a lot smaller for viruses to get onto your device. Hardware or software are the two forms that it comes in. Hardware would be the router as most have it built in. Software would be things like Norton.
Secure Socket Layers (SSL) - This protocol allows for information to be transferred safely around the internet. Sites that require users to sign in and out tend to use this protocol. These include Email, banking and gambling sites, this is so that when you are entering you username and password, no third party can be looking in and viewing the transmitted data.

3 comments:

  1. www: You have explained the security risks and protection mechanisms involved in website performance
    ebi. You give a good example to illustrate the report, in the form of annotated screenshots..

    ReplyDelete
  2. www.P2.Well done, You cover the user side and server side factors very well, and have explained the effect that they can have upon the performance of websites.

    ReplyDelete
  3. www: P3 achieved. You have explained the security risks and protection mechanisms involved in website performance and given a good example to illustrate the report.

    ReplyDelete