SlideShare a Scribd company logo
1 of 20
Keeping Websites
Secure
What are the top 3 security
dangers for websites?
(in your opinion!)
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Objectives
• explain the security risks and
protection mechanisms involved in
website performance (P3)

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
To achieve a pass grade the
To achieve a merit grade the
evidence must show that the evidence must show that, in
learner is able to:
addition to the pass
criteria, the learner is able
to:

To achieve a distinction
grade the evidence must
show that, in addition to the
pass and merit criteria, the
learner is able to:

P1 outline the web architecture
and components which enable
internet and web Functionality

M1 explain the role of web
architecture in website
communications

D1 explain the role of the TCP/IP
protocol and how it links to
application layer protocols

P4 using appropriate design
tools, design an interactive
website to meet a client need

M2 explain the tools and
techniques used in the creation
of an interactive website

D2 discuss the techniques that
can be used on web pages to aid
user access to information

P5 create an interactive website
to meet a client need.

M3 improve the effectiveness of
a website on the basis of a client
review.

P2 explain the user side and
server side factors that
influence the performance of a
website
P3 explain the security risks and
protection mechanisms involved
in website Performance

D3 demonstrate that a created
website meets the defined
requirements and achieves the
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
defined purpose.
P3 – Assignment 3
• You have 3 tasks to complete, each of
which will require some research and
may well take more than 1 hour each
BUT:
• If we are going to learn the skills
necessary for the other 2 pass marks we
have a lot to learn!
• We cannot spare more than 1 hour next
week for either U1,2,3 catch up or
U28A3
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Task 1 - Dangers:
You should research each of the following terms –
hacking, viruses, identity theft – and produce a
definition of each in your own words in a leaflet
suitable for distribution to a small business that
intends to develop an online presence.
You should also find examples of organisations or
websites that have experienced these threats and
identify how the threats were dealt with and any
consequences. You should add these case studies
to your leaflet.
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
How it might look…
ima
ge
ima
ge

ima
ge
image

ima
ge

ima
ge
ima
ge

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Hacking means – unauthorised
access to computer systems
• While there may not be intent to
commit another crime, this access
often damages files such as logs and
operating systems
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Viruses are programs that are
designed to spread and infect other
computers
• They may be used to allow other
criminal access to a computer
• This could include taking copies of
confidential data or destroying files
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Identity theft is a form of fraud where a
criminal can impersonate someone else,
usually for financial gain
• Phishing is a form of identity theft
where convincingly designed emails and
websites are sent to convince users to
enter their usernames and passwords
into fake sites so criminals can use them
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Create your leaflet!
• Use your own words, especially for
definitions!
• Aim it at small business owners who do
not necessarily have good technical
knowledge
• Prompt questions are on the brief
• Share resources like case studies that
could be useful to others
• Reference the source of those things
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Task 2 – Protection:
• You should research each of the
following terms – firewalls, SSL,
strong passwords and CAPTCHA –
and produce a short information
leaflet or a poster suitable for issuing
to YellowZebra clients.
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
How it might look…
• Separate leaflet, please!
• If you decide on a poster, don’t
skimp on detail – make it A3 if you
need to fit more information on!

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Firewalls use rules to allow or block
data to/from different IPs & ports
based on rules
• Legitimate HTTP requests will be on
port 80, HTTPS on 25 – other access
might be suspicious/hacking
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• SSL means Secure Socket Layer and
it’s a way of encrypting data between
webserver & browser so passwords,
personal information etc. is more
secure
• If an address starts https:// and if
you have a little lock on your
browser it’s using HTTPS
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• A good password takes longer for a
hacker to guess or crack
• More letters are more difficult, use
of numbers & characters on
keyboard is even better – more
complexity, more possible options
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• CAPTCHA (and others too) is a puzzle
that only a human should be able to
do
• They stop hackers using scripts to
automatically set up thousands of
new accounts e.g. on email for spam
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Make your leaflet/poster!
• Use your own words, especially for
definitions!
• Aim it at small business owners who do
not necessarily have good technical
knowledge
• Prompt questions are on the brief
• Share resources if they’re especially
good
• Reference sources
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Task 3 - DPA
• Choose one website from following list and
describe in a short report (with the use of
screen shots) how that organisation complies
with this law.
• For example, you could include the data
collection and privacy policy, the registration
and purchase/transaction process, and
permission to use the data collected.
• You should look for areas on the website where
information is given to the user covering, at
least, some parts of the Data Protection Act.
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
How it might look…
• Report typed in Word
• Screenshots should
be small enough not
to dominate your text
but big enough to
make them clear to
read

How Amazon UK complies
with the Data Protection Act

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
About the DPA
• Check out the links on the VLE
• Look back at older work!
• Start your report with a summary of
the law, its principles
• Then show what your chosen site
does to comply
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20

More Related Content

What's hot

Unit 28 Week 13
Unit 28 Week 13Unit 28 Week 13
Unit 28 Week 13
MrJRogers
 
Unit 28 Week 15
Unit 28 Week 15Unit 28 Week 15
Unit 28 Week 15
MrJRogers
 
Unit 28 Week 12
Unit 28 Week 12Unit 28 Week 12
Unit 28 Week 12
MrJRogers
 
Unit 28 Week 11
Unit 28 Week 11 Unit 28 Week 11
Unit 28 Week 11
MrJRogers
 
WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)
Stephanie Leary
 

What's hot (11)

Unit 28 Week 13
Unit 28 Week 13Unit 28 Week 13
Unit 28 Week 13
 
Unit 28 Week 1
Unit 28 Week 1Unit 28 Week 1
Unit 28 Week 1
 
Unit 28 Week 6
Unit 28 Week 6Unit 28 Week 6
Unit 28 Week 6
 
Unit 28 Week 15
Unit 28 Week 15Unit 28 Week 15
Unit 28 Week 15
 
Unit 28 Week 12
Unit 28 Week 12Unit 28 Week 12
Unit 28 Week 12
 
Unit 28 Week 11
Unit 28 Week 11 Unit 28 Week 11
Unit 28 Week 11
 
Web developers (austin ramer)
Web developers (austin ramer)Web developers (austin ramer)
Web developers (austin ramer)
 
Pofo – Creative Portfolio and Blog WordPress Theme
Pofo – Creative Portfolio and Blog WordPress ThemePofo – Creative Portfolio and Blog WordPress Theme
Pofo – Creative Portfolio and Blog WordPress Theme
 
Sallie Goetsch: Making the Events Calendar Sit Up and Beg
Sallie Goetsch: Making the Events Calendar Sit Up and BegSallie Goetsch: Making the Events Calendar Sit Up and Beg
Sallie Goetsch: Making the Events Calendar Sit Up and Beg
 
CTurner PPP Final Project Week 4 (Edited)
CTurner PPP Final Project Week 4 (Edited)CTurner PPP Final Project Week 4 (Edited)
CTurner PPP Final Project Week 4 (Edited)
 
WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)
 

Viewers also liked

P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3
bambers11
 
Modernism & Post Modernity
Modernism & Post ModernityModernism & Post Modernity
Modernism & Post Modernity
smccormac7
 
Personal hygiene ppt
Personal hygiene pptPersonal hygiene ppt
Personal hygiene ppt
ps24ctt
 

Viewers also liked (13)

L3 cookies
L3   cookiesL3   cookies
L3 cookies
 
L6 diary management
L6   diary managementL6   diary management
L6 diary management
 
L4 proofs
L4   proofsL4   proofs
L4 proofs
 
Unit 43 - Multimedia Design PowerPoint.
Unit 43 - Multimedia Design PowerPoint. Unit 43 - Multimedia Design PowerPoint.
Unit 43 - Multimedia Design PowerPoint.
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Information
 
Btec spec
Btec specBtec spec
Btec spec
 
P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3
 
Ethics AS OCR
Ethics AS OCREthics AS OCR
Ethics AS OCR
 
Modernism & Post Modernity
Modernism & Post ModernityModernism & Post Modernity
Modernism & Post Modernity
 
21st Century Practices and Integration of ICT in Primary Education
21st Century Practices and Integration of ICT in Primary Education21st Century Practices and Integration of ICT in Primary Education
21st Century Practices and Integration of ICT in Primary Education
 
Personal hygiene ppt
Personal hygiene pptPersonal hygiene ppt
Personal hygiene ppt
 
10 Steps of Project Management in Digital Agencies
10 Steps of Project Management in Digital Agencies 10 Steps of Project Management in Digital Agencies
10 Steps of Project Management in Digital Agencies
 
All About Beer
All About Beer All About Beer
All About Beer
 

Similar to Unit 28 Week 3

1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
MartineMccracken314
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
SilvaGraf83
 
Copyright 101 Fair Use
Copyright 101 Fair UseCopyright 101 Fair Use
Copyright 101 Fair Use
Brian Rowe
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
fangjiafu
 

Similar to Unit 28 Week 3 (20)

IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
Copyright 101 Fair Use
Copyright 101 Fair UseCopyright 101 Fair Use
Copyright 101 Fair Use
 
CIS 534 Education Specialist / snaptutorial.com
 CIS 534 Education Specialist / snaptutorial.com CIS 534 Education Specialist / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.com
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
Cis 534 Education Organization -- snaptutorial.com
Cis 534   Education Organization -- snaptutorial.comCis 534   Education Organization -- snaptutorial.com
Cis 534 Education Organization -- snaptutorial.com
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
 
Cis 534 Effective Communication / snaptutorial.com
Cis 534 Effective Communication / snaptutorial.comCis 534 Effective Communication / snaptutorial.com
Cis 534 Effective Communication / snaptutorial.com
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentation
 
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityDrupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal Security
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
 
Butler
ButlerButler
Butler
 

More from MrJRogers

Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project IntroductionDame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
MrJRogers
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework ProjectDame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework Project
MrJRogers
 
Unit 3 assessment 3 lesson
Unit 3 assessment 3 lessonUnit 3 assessment 3 lesson
Unit 3 assessment 3 lesson
MrJRogers
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 Computing
MrJRogers
 
Databases & spreadsheets
Databases & spreadsheetsDatabases & spreadsheets
Databases & spreadsheets
MrJRogers
 

More from MrJRogers (13)

L2 identifying photos
L2   identifying photosL2   identifying photos
L2 identifying photos
 
L1 intro & hardware
L1   intro & hardwareL1   intro & hardware
L1 intro & hardware
 
Image reflections intro
Image reflections introImage reflections intro
Image reflections intro
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project IntroductionDame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework ProjectDame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework Project
 
Unit 3 assessment 3 lesson
Unit 3 assessment 3 lessonUnit 3 assessment 3 lesson
Unit 3 assessment 3 lesson
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 Computing
 
Types & sources of info
Types & sources of infoTypes & sources of info
Types & sources of info
 
Databases & spreadsheets
Databases & spreadsheetsDatabases & spreadsheets
Databases & spreadsheets
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Lesson 5
Lesson 5Lesson 5
Lesson 5
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Unit 28 Week 3

  • 1. Keeping Websites Secure What are the top 3 security dangers for websites? (in your opinion!) Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 2. Objectives • explain the security risks and protection mechanisms involved in website performance (P3) Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 3. To achieve a pass grade the To achieve a merit grade the evidence must show that the evidence must show that, in learner is able to: addition to the pass criteria, the learner is able to: To achieve a distinction grade the evidence must show that, in addition to the pass and merit criteria, the learner is able to: P1 outline the web architecture and components which enable internet and web Functionality M1 explain the role of web architecture in website communications D1 explain the role of the TCP/IP protocol and how it links to application layer protocols P4 using appropriate design tools, design an interactive website to meet a client need M2 explain the tools and techniques used in the creation of an interactive website D2 discuss the techniques that can be used on web pages to aid user access to information P5 create an interactive website to meet a client need. M3 improve the effectiveness of a website on the basis of a client review. P2 explain the user side and server side factors that influence the performance of a website P3 explain the security risks and protection mechanisms involved in website Performance D3 demonstrate that a created website meets the defined requirements and achieves the Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20 defined purpose.
  • 4. P3 – Assignment 3 • You have 3 tasks to complete, each of which will require some research and may well take more than 1 hour each BUT: • If we are going to learn the skills necessary for the other 2 pass marks we have a lot to learn! • We cannot spare more than 1 hour next week for either U1,2,3 catch up or U28A3 Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 5. Task 1 - Dangers: You should research each of the following terms – hacking, viruses, identity theft – and produce a definition of each in your own words in a leaflet suitable for distribution to a small business that intends to develop an online presence. You should also find examples of organisations or websites that have experienced these threats and identify how the threats were dealt with and any consequences. You should add these case studies to your leaflet. Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 6. How it might look… ima ge ima ge ima ge image ima ge ima ge ima ge Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 7. Check basic understanding: • Hacking means – unauthorised access to computer systems • While there may not be intent to commit another crime, this access often damages files such as logs and operating systems Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 8. Check basic understanding: • Viruses are programs that are designed to spread and infect other computers • They may be used to allow other criminal access to a computer • This could include taking copies of confidential data or destroying files Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 9. Check basic understanding: • Identity theft is a form of fraud where a criminal can impersonate someone else, usually for financial gain • Phishing is a form of identity theft where convincingly designed emails and websites are sent to convince users to enter their usernames and passwords into fake sites so criminals can use them Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 10. Create your leaflet! • Use your own words, especially for definitions! • Aim it at small business owners who do not necessarily have good technical knowledge • Prompt questions are on the brief • Share resources like case studies that could be useful to others • Reference the source of those things Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 11. Task 2 – Protection: • You should research each of the following terms – firewalls, SSL, strong passwords and CAPTCHA – and produce a short information leaflet or a poster suitable for issuing to YellowZebra clients. Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 12. How it might look… • Separate leaflet, please! • If you decide on a poster, don’t skimp on detail – make it A3 if you need to fit more information on! Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 13. Check basic understanding: • Firewalls use rules to allow or block data to/from different IPs & ports based on rules • Legitimate HTTP requests will be on port 80, HTTPS on 25 – other access might be suspicious/hacking Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 14. Check basic understanding: • SSL means Secure Socket Layer and it’s a way of encrypting data between webserver & browser so passwords, personal information etc. is more secure • If an address starts https:// and if you have a little lock on your browser it’s using HTTPS Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 15. Check basic understanding: • A good password takes longer for a hacker to guess or crack • More letters are more difficult, use of numbers & characters on keyboard is even better – more complexity, more possible options Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 16. Check basic understanding: • CAPTCHA (and others too) is a puzzle that only a human should be able to do • They stop hackers using scripts to automatically set up thousands of new accounts e.g. on email for spam Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 17. Make your leaflet/poster! • Use your own words, especially for definitions! • Aim it at small business owners who do not necessarily have good technical knowledge • Prompt questions are on the brief • Share resources if they’re especially good • Reference sources Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 18. Task 3 - DPA • Choose one website from following list and describe in a short report (with the use of screen shots) how that organisation complies with this law. • For example, you could include the data collection and privacy policy, the registration and purchase/transaction process, and permission to use the data collected. • You should look for areas on the website where information is given to the user covering, at least, some parts of the Data Protection Act. Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 19. How it might look… • Report typed in Word • Screenshots should be small enough not to dominate your text but big enough to make them clear to read How Amazon UK complies with the Data Protection Act Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 20. About the DPA • Check out the links on the VLE • Look back at older work! • Start your report with a summary of the law, its principles • Then show what your chosen site does to comply Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20