Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

7
Mr C Johnston ICT Teacher www.computechedu.co.uk BTEC IT Unit 28 - Lesson 05 Security Risks and Protection

Transcript of Mr C Johnston ICT Teacher BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Page 1: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Mr C JohnstonICT Teacher

www.computechedu.co.uk

BTEC IT Unit 28 - Lesson 05

Security Risks and Protection

Page 2: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Session Objectives

Know different security threats which could compromise a web host,

Understand measures which can be taken to prevent security threats from striking,

Be able to apply a range of different laws to the setting up and running of a website for ecommerce purposes.

Page 3: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Security Risks Interception of data

Hacking

Viruses

Identity theft

Page 4: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Prevention Methods Firewalls SSL Certificates HTTPS Strong Passwords Captcha

Page 5: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Website Security

Page 6: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Prevention Methods Data Protection Act (1998) Computer Misuse Act (1990) Trade Descriptions Act (1968), Consumer Protection Act (1987), Price Marking

Order (2004) Electronic Communications Act (2000) Electronic Commerce Regulations (2002)

Page 7: Mr C Johnston ICT Teacher  BTEC IT Unit 28 - Lesson 05 Security Risks and Protection.

Topic Exercise Produce a report which explains the different security threats to a website and some of the measures which can be

taken to try and prevent attacks. Add a table to your report which defines the laws laws on slide 6 and explains how they affect ICE Arena once the

website is up and running.

• For P3, as well as discussing the general security risks which threaten the integrity of data, you should define the laws and guidelines that a particular website has to adhere to. This could include, for instance, a website that stores users’ details, it will be legally required to comply with the Data Protection Act (DPA).

• You should write a short report, with the use of screen grabs, to evidence their understanding.

P3 – Explain the security risks and protection mechanisms involved in website performance.P3 – Explain the security risks and protection mechanisms involved in website performance.

Remember to apply your points to ICE Arena and its customers… Don’t just copy out of the book