P3 Explain The Security Risks And Protection Mechanisms Involved In Website Performance

Improved Essays
P3: Explain the security risks and protection mechanisms involved in website performance.

Security risk
There are a lot of security risks on websites, for examples there are risks like viruses and hacker, these risks are extremely dangerous for electronic commerce website where hackers can steal other user’s personal details. The web designer should build up a protection mechanism when making a website, this can support the enforcement of security policies which the users can feel safe when browsing the website.

Hacking
A hacker is someone who gains access into a computer system or data without permission of the owner. They can achieve this by cracking codes and passwords. Usually a hacker hacks into your computer to access important data such as customer payment details, date of birth, bank details and other personal information, they can also damage your computer
…show more content…
For example when a hacker gained access to the user private information such as bank account, the hacker will use the bank details to purchase items.

Security protection mechanisms
There are many possible security protections mechanisms to protect our own computer and website from viruses and hackers such as firewalls, SSL and passwords.

Firewalls
Firewall is a security system that controls the incoming and outgoing traffic based on applied rule set. It constructs a barrier around networks or computers which protects them from unauthorised programs to access such as viruses, this happens by the opening and closing the ports, these ports connect protocols and IP address together. For a web server, it is better to close all the ports that are not being used because the hackers can take advantage and easily get into the system. Here are some examples of Firewalls Software: McAfee, BullGuard , Paretologic etc.

Secure Socket Layers

Related Documents

  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Firewalls: Firewall acts as a defense weapon against hacking into your network. There are lot of software’s are available in the market but the best and highly recommended would be Zone Alarm. It sets you for individual Internet access for individual programs and allows automatic programs. It also blocks intrusion if anyone trying to hack into your system. Virus scanner and removal: Virus scanner and removal are included with our antivirus software’s because antivirus software will be running in background, your computer is protected from new viruses.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    " This information security challenge is why Gartner predicted that micro-segmentation technologies will be one of the must-haves for enterprise security in 2016. The research firm explained that by cryptographically isolating workloads and encrypting network traffic end-to-end, organizations can prevent lateral "east/west" hacker movement, contain breaches and better secure…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Sox Act Pros And Cons

    • 1311 Words
    • 6 Pages

    Once they have accessed the computer network they steal information to obtain a profit, or some hackers just do it for the challenge (). There are multiple different types of hackers. In basic terms there are the good guys and the bad guys. The good guys are known as white-hat hackers and they help companies find loose ends in their security systems. Then there are the bad guys and they are called black-hat hackers.…

    • 1311 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    “A recent Government Accountability Office (GAO) report found the number of information-security incidents in which personal information was involved has more than doubled over the last few years, exceeding 25,000 in fiscal 2013” (“Privacy”). That means that every day there are approximately 68.5 incidents where personal information is stolen from major holders of sensitive data, such as credit card information, social security numbers, and usernames and passwords. So through the use of a virus, bug (a flaw in the software being used), and malware, thieves are able to gain access to…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    With interconnected systems, it is imperative that a collaborative effort is the best defense. Efforts to protect and safeguard from unlawful digital intrusion ensuring that all transmission is not interrupted and communication is…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Decent Essays

    Hacking can lead to theft of important information which can be sold to other competitors. References: globalriskinsights.com 2. Viruses Viruses and worms spread across computers and networks by making copies of themselves, usually without the knowledge of the computer user. Risks can also come from popular social networking sites.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    According to the Merriam-Webster Dictionary website, hacking, in technological terms, is the “act or instance of gaining or attempting to gain illegal access to a computer hardware…

    • 866 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Gamblebet Fraud Case Study

    • 1717 Words
    • 7 Pages

    3. Impact determination and quantification – Once risk is analysed with the help of matrix, effects on circumstances should be established and they should be measured with the help of quantification. It is mentioned in above table where impacts and consequences are mentioned on the business of GambleBet. 4. Control design and evaluation – Mandatory steps should be executed to minimize the risks of vulnerabilities on the business of GambleBet.…

    • 1717 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ebay Research Paper

    • 2029 Words
    • 9 Pages

    Hackers try to invade websites by disclosing denial service attacks to prevent users from accessing systems. There is a new technology for safe guarding the e-commerce website which is known as the “adaptive security”. This development by the adaptive network security alliance constructs an interference prevention framework and combines other delicate tools such as firewall switch to prevent invasion attempts. On the other hand credit card details are guarded by enacting a secure socket layer to safe guard credit information stored in the database. Besides this, to guarantee privacy as well as verification, the secure electronic transaction standards code online merchant accounts from invaders who browse for credit card details.…

    • 2029 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    Even with things that are password protected hackers still seem to gain access to personal information. Hackers use different kinds of malware to cause damage to their victims. There are many kinds of malware in this world. However, there are…

    • 2066 Words
    • 9 Pages
    Improved Essays