Report task. Security risks such as hacking, viruses and id theft Security prevention such as...

12
Report task

Transcript of Report task. Security risks such as hacking, viruses and id theft Security prevention such as...

Page 1: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Report task

Page 2: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

• Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards

• The laws which websites have to adhere to such as Data Protection Act (DPA), equality act 2010, copyright act

• The current methods of sharing information and movement such as web 2.0

• Explain the application layer protocol in relation to TCP/IP

Page 3: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Hackers

Viruses

Identity Theft

IMPACT THESE HAVE ON WEBSITES!

Page 4: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

• Firewalls

Secure Socket Layers

• Passwords

• .

Page 5: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

DATA PROTECTION ACT

• Think about how 8 rules + how to apply them to websites

Page 6: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Equality act 2010 - http://www.rnib.org.uk/professionals/webaccessibility/lawsandstandards/Pages/uk_law.aspx

•For instance, it may be unlawful for a website to: have links on that are not accessible to a screen reader

• have application forms (for instance, for bank accounts or job application forms) in a PDF format that cannot be read by a screen reader

• have core service information (for instance, timetables on a public transport website) that is not in a format accessible to screen readers.

• use text, colour contrasting and formatting that make the website inaccessible to a partially sighted service user

• change security procedures (for instance, on an e-commerce website) without considering the impact of blind and partially sighted customers that use screen readers.

Page 7: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Copyright act

• See unit 30 – how this impacts web developers

Page 9: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Web 2.0

• With Web 2.0… • Users own the data • Users control the data • There is a climate of participation • Users value add as their needs evolve • The interface is friendly

Page 10: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Page 11: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

• Application layer. On the Application layer you will find Application protocols such as SMTP (for e-mail), FTP (for file transfer) and HTTP (for web browsing). Each kind of program talks to a different Application protocol, depending on the program purpose

• After processing the program request, the protocol on the Application layer will talk to another protocol from the Transport layer, usually TCP.

• Application Layer• This layer makes the communication between programs and the transport protocols. There are several

different protocols that work on the Application layer. The most known are HTTP (HyperText Transfer Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol)

• When you ask your e-mail program (called e-mail client) to download e-mails that are stored on an e-mail server, it will request this task to the TCP/IP Application layer, being served by the SMTP protocol. When you type in a www address on your web browser to open a web page, your browser will request this task to the TCP/IP Application layer, being served by the HTTP protocol (that is why web pages start with “http://”). And so on.</p>

• The Application layer talks to the Transport layer through a port. Ports are numbered and standard applications always use the same port. For example, SMTP protocol always use port 25, HTTP protocol always use port 80 and FTP protocol always use ports 20 (for data transmission) and 21 (for control).

• The use of a port number allows the Transport protocol (typically TCP) to know which kind of contents is inside the packet (for example, to know that the data being transported is an e-mail) allowing it to know, at the reception side, to which Application protocol it should deliver the received data. So, when receiving a packet target to port 25, TCP protocol will know that it must deliver data to the protocol connected to this port, usually SMTP, which in turn will deliver data to the program that requested it (the e-mail program).</p>

Page 12: Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.