Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.
-
Upload
peregrine-franklin -
Category
Documents
-
view
232 -
download
0
Transcript of Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.
![Page 1: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/1.jpg)
Mr C JohnstonICT Teacher
www.computechedu.co.uk
BTEC IT Unit 28 - Lesson 05
Security Risks and Protection
![Page 2: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/2.jpg)
Session Objectives
Know different security threats which could compromise a web host,
Understand measures which can be taken to prevent security threats from striking,
Be able to apply a range of different laws to the setting up and running of a website for ecommerce purposes.
![Page 3: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/3.jpg)
Security Risks Interception of data
Hacking
Viruses
Identity theft
![Page 4: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/4.jpg)
Prevention Methods Firewalls SSL Certificates HTTPS Strong Passwords Captcha
![Page 5: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/5.jpg)
Website Security
![Page 6: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/6.jpg)
Prevention Methods Data Protection Act (1998) Computer Misuse Act (1990) Trade Descriptions Act (1968), Consumer Protection Act (1987), Price Marking
Order (2004) Electronic Communications Act (2000) Electronic Commerce Regulations (2002)
![Page 7: Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.](https://reader036.fdocuments.us/reader036/viewer/2022081723/56649f175503460f94c2e4c3/html5/thumbnails/7.jpg)
Topic Exercise Produce a report which explains the different security threats to a website and some of the measures which can be
taken to try and prevent attacks. Add a table to your report which defines the laws laws on slide 6 and explains how they affect ICE Arena once the
website is up and running.
• For P3, as well as discussing the general security risks which threaten the integrity of data, you should define the laws and guidelines that a particular website has to adhere to. This could include, for instance, a website that stores users’ details, it will be legally required to comply with the Data Protection Act (DPA).
• You should write a short report, with the use of screen grabs, to evidence their understanding.
P3 – Explain the security risks and protection mechanisms involved in website performance.P3 – Explain the security risks and protection mechanisms involved in website performance.
Remember to apply your points to ICE Arena and its customers… Don’t just copy out of the book