SlideShare a Scribd company logo
1 of 20
Keeping Websites
Secure
What are the top 3 security
dangers for websites?
(in your opinion!)
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Objectives
• explain the security risks and
protection mechanisms involved in
website performance (P3)

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
To achieve a pass grade the
To achieve a merit grade the
evidence must show that the evidence must show that, in
learner is able to:
addition to the pass
criteria, the learner is able
to:

To achieve a distinction
grade the evidence must
show that, in addition to the
pass and merit criteria, the
learner is able to:

P1 outline the web architecture
and components which enable
internet and web Functionality

M1 explain the role of web
architecture in website
communications

D1 explain the role of the TCP/IP
protocol and how it links to
application layer protocols

P4 using appropriate design
tools, design an interactive
website to meet a client need

M2 explain the tools and
techniques used in the creation
of an interactive website

D2 discuss the techniques that
can be used on web pages to aid
user access to information

P5 create an interactive website
to meet a client need.

M3 improve the effectiveness of
a website on the basis of a client
review.

P2 explain the user side and
server side factors that
influence the performance of a
website
P3 explain the security risks and
protection mechanisms involved
in website Performance

D3 demonstrate that a created
website meets the defined
requirements and achieves the
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
defined purpose.
P3 – Assignment 3
• You have 3 tasks to complete, each of
which will require some research and
may well take more than 1 hour each
BUT:
• If we are going to learn the skills
necessary for the other 2 pass marks we
have a lot to learn!
• We cannot spare more than 1 hour next
week for either U1,2,3 catch up or
U28A3
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Task 1 - Dangers:
You should research each of the following terms –
hacking, viruses, identity theft – and produce a
definition of each in your own words in a leaflet
suitable for distribution to a small business that
intends to develop an online presence.
You should also find examples of organisations or
websites that have experienced these threats and
identify how the threats were dealt with and any
consequences. You should add these case studies
to your leaflet.
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
How it might look…
ima
ge
ima
ge

ima
ge
image

ima
ge

ima
ge
ima
ge

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Hacking means – unauthorised
access to computer systems
• While there may not be intent to
commit another crime, this access
often damages files such as logs and
operating systems
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Viruses are programs that are
designed to spread and infect other
computers
• They may be used to allow other
criminal access to a computer
• This could include taking copies of
confidential data or destroying files
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Identity theft is a form of fraud where a
criminal can impersonate someone else,
usually for financial gain
• Phishing is a form of identity theft
where convincingly designed emails and
websites are sent to convince users to
enter their usernames and passwords
into fake sites so criminals can use them
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Create your leaflet!
• Use your own words, especially for
definitions!
• Aim it at small business owners who do
not necessarily have good technical
knowledge
• Prompt questions are on the brief
• Share resources like case studies that
could be useful to others
• Reference the source of those things
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Task 2 – Protection:
• You should research each of the
following terms – firewalls, SSL,
strong passwords and CAPTCHA –
and produce a short information
leaflet or a poster suitable for issuing
to YellowZebra clients.
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
How it might look…
• Separate leaflet, please!
• If you decide on a poster, don’t
skimp on detail – make it A3 if you
need to fit more information on!

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• Firewalls use rules to allow or block
data to/from different IPs & ports
based on rules
• Legitimate HTTP requests will be on
port 80, HTTPS on 25 – other access
might be suspicious/hacking
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• SSL means Secure Socket Layer and
it’s a way of encrypting data between
webserver & browser so passwords,
personal information etc. is more
secure
• If an address starts https:// and if
you have a little lock on your
browser it’s using HTTPS
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• A good password takes longer for a
hacker to guess or crack
• More letters are more difficult, use
of numbers & characters on
keyboard is even better – more
complexity, more possible options
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Check basic understanding:
• CAPTCHA (and others too) is a puzzle
that only a human should be able to
do
• They stop hackers using scripts to
automatically set up thousands of
new accounts e.g. on email for spam
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Make your leaflet/poster!
• Use your own words, especially for
definitions!
• Aim it at small business owners who do
not necessarily have good technical
knowledge
• Prompt questions are on the brief
• Share resources if they’re especially
good
• Reference sources
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
Task 3 - DPA
• Choose one website from following list and
describe in a short report (with the use of
screen shots) how that organisation complies
with this law.
• For example, you could include the data
collection and privacy policy, the registration
and purchase/transaction process, and
permission to use the data collected.
• You should look for areas on the website where
information is given to the user covering, at
least, some parts of the Data Protection Act.
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
How it might look…
• Report typed in Word
• Screenshots should
be small enough not
to dominate your text
but big enough to
make them clear to
read

How Amazon UK complies
with the Data Protection Act

Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
About the DPA
• Check out the links on the VLE
• Look back at older work!
• Start your report with a summary of
the law, its principles
• Then show what your chosen site
does to comply
Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20

More Related Content

What's hot

Unit 28 Week 13
Unit 28 Week 13Unit 28 Week 13
Unit 28 Week 13MrJRogers
 
Unit 28 Week 1
Unit 28 Week 1Unit 28 Week 1
Unit 28 Week 1MrJRogers
 
Unit 28 Week 6
Unit 28 Week 6Unit 28 Week 6
Unit 28 Week 6MrJRogers
 
Unit 28 Week 15
Unit 28 Week 15Unit 28 Week 15
Unit 28 Week 15MrJRogers
 
Unit 28 Week 12
Unit 28 Week 12Unit 28 Week 12
Unit 28 Week 12MrJRogers
 
Unit 28 Week 11
Unit 28 Week 11 Unit 28 Week 11
Unit 28 Week 11 MrJRogers
 
Web developers (austin ramer)
Web developers (austin ramer)Web developers (austin ramer)
Web developers (austin ramer)guest2b37bb5
 
Sallie Goetsch: Making the Events Calendar Sit Up and Beg
Sallie Goetsch: Making the Events Calendar Sit Up and BegSallie Goetsch: Making the Events Calendar Sit Up and Beg
Sallie Goetsch: Making the Events Calendar Sit Up and BegEast Bay WordPress Meetup
 
CTurner PPP Final Project Week 4 (Edited)
CTurner PPP Final Project Week 4 (Edited)CTurner PPP Final Project Week 4 (Edited)
CTurner PPP Final Project Week 4 (Edited)Caresha Turner
 
WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)Stephanie Leary
 

What's hot (11)

Unit 28 Week 13
Unit 28 Week 13Unit 28 Week 13
Unit 28 Week 13
 
Unit 28 Week 1
Unit 28 Week 1Unit 28 Week 1
Unit 28 Week 1
 
Unit 28 Week 6
Unit 28 Week 6Unit 28 Week 6
Unit 28 Week 6
 
Unit 28 Week 15
Unit 28 Week 15Unit 28 Week 15
Unit 28 Week 15
 
Unit 28 Week 12
Unit 28 Week 12Unit 28 Week 12
Unit 28 Week 12
 
Unit 28 Week 11
Unit 28 Week 11 Unit 28 Week 11
Unit 28 Week 11
 
Web developers (austin ramer)
Web developers (austin ramer)Web developers (austin ramer)
Web developers (austin ramer)
 
Pofo – Creative Portfolio and Blog WordPress Theme
Pofo – Creative Portfolio and Blog WordPress ThemePofo – Creative Portfolio and Blog WordPress Theme
Pofo – Creative Portfolio and Blog WordPress Theme
 
Sallie Goetsch: Making the Events Calendar Sit Up and Beg
Sallie Goetsch: Making the Events Calendar Sit Up and BegSallie Goetsch: Making the Events Calendar Sit Up and Beg
Sallie Goetsch: Making the Events Calendar Sit Up and Beg
 
CTurner PPP Final Project Week 4 (Edited)
CTurner PPP Final Project Week 4 (Edited)CTurner PPP Final Project Week 4 (Edited)
CTurner PPP Final Project Week 4 (Edited)
 
WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)WordPress Tips and Tricks (DFW Meetup)
WordPress Tips and Tricks (DFW Meetup)
 

Viewers also liked

L6 diary management
L6   diary managementL6   diary management
L6 diary managementMrJRogers
 
Unit 43 - Multimedia Design PowerPoint.
Unit 43 - Multimedia Design PowerPoint. Unit 43 - Multimedia Design PowerPoint.
Unit 43 - Multimedia Design PowerPoint. CPalmer16
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Informationmrcox
 
P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3bambers11
 
Ethics AS OCR
Ethics AS OCREthics AS OCR
Ethics AS OCRhazzahurd
 
Modernism & Post Modernity
Modernism & Post ModernityModernism & Post Modernity
Modernism & Post Modernitysmccormac7
 
21st Century Practices and Integration of ICT in Primary Education
21st Century Practices and Integration of ICT in Primary Education21st Century Practices and Integration of ICT in Primary Education
21st Century Practices and Integration of ICT in Primary EducationChole Richard
 
Personal hygiene ppt
Personal hygiene pptPersonal hygiene ppt
Personal hygiene pptps24ctt
 
10 Steps of Project Management in Digital Agencies
10 Steps of Project Management in Digital Agencies 10 Steps of Project Management in Digital Agencies
10 Steps of Project Management in Digital Agencies Alemsah Ozturk
 
All About Beer
All About Beer All About Beer
All About Beer Ethos3
 

Viewers also liked (13)

L3 cookies
L3   cookiesL3   cookies
L3 cookies
 
L6 diary management
L6   diary managementL6   diary management
L6 diary management
 
L4 proofs
L4   proofsL4   proofs
L4 proofs
 
Unit 43 - Multimedia Design PowerPoint.
Unit 43 - Multimedia Design PowerPoint. Unit 43 - Multimedia Design PowerPoint.
Unit 43 - Multimedia Design PowerPoint.
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Information
 
Btec spec
Btec specBtec spec
Btec spec
 
P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3P7_P8_P9_M4_M5_D3
P7_P8_P9_M4_M5_D3
 
Ethics AS OCR
Ethics AS OCREthics AS OCR
Ethics AS OCR
 
Modernism & Post Modernity
Modernism & Post ModernityModernism & Post Modernity
Modernism & Post Modernity
 
21st Century Practices and Integration of ICT in Primary Education
21st Century Practices and Integration of ICT in Primary Education21st Century Practices and Integration of ICT in Primary Education
21st Century Practices and Integration of ICT in Primary Education
 
Personal hygiene ppt
Personal hygiene pptPersonal hygiene ppt
Personal hygiene ppt
 
10 Steps of Project Management in Digital Agencies
10 Steps of Project Management in Digital Agencies 10 Steps of Project Management in Digital Agencies
10 Steps of Project Management in Digital Agencies
 
All About Beer
All About Beer All About Beer
All About Beer
 

Similar to Unit 28 Week 3

IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games TextMartineMccracken314
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games TextSilvaGraf83
 
Copyright 101 Fair Use
Copyright 101 Fair UseCopyright 101 Fair Use
Copyright 101 Fair UseBrian Rowe
 
CIS 534 Education Specialist / snaptutorial.com
 CIS 534 Education Specialist / snaptutorial.com CIS 534 Education Specialist / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.comstevesonz129
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0Dinis Cruz
 
Cis 534 Education Organization -- snaptutorial.com
Cis 534   Education Organization -- snaptutorial.comCis 534   Education Organization -- snaptutorial.com
Cis 534 Education Organization -- snaptutorial.comDavisMurphyB71
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Harry McLaren
 
Cis 534 Effective Communication / snaptutorial.com
Cis 534 Effective Communication / snaptutorial.comCis 534 Effective Communication / snaptutorial.com
Cis 534 Effective Communication / snaptutorial.comStokesCope34
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentationdarryl_lehmann
 
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityDrupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityMediacurrent
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comsholingarjosh62
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comStephenson05
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSPINKESH PATEL
 

Similar to Unit 28 Week 3 (20)

IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
Copyright 101 Fair Use
Copyright 101 Fair UseCopyright 101 Fair Use
Copyright 101 Fair Use
 
CIS 534 Education Specialist / snaptutorial.com
 CIS 534 Education Specialist / snaptutorial.com CIS 534 Education Specialist / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.com
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
Cis 534 Education Organization -- snaptutorial.com
Cis 534   Education Organization -- snaptutorial.comCis 534   Education Organization -- snaptutorial.com
Cis 534 Education Organization -- snaptutorial.com
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
 
Cis 534 Effective Communication / snaptutorial.com
Cis 534 Effective Communication / snaptutorial.comCis 534 Effective Communication / snaptutorial.com
Cis 534 Effective Communication / snaptutorial.com
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentation
 
Drupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal SecurityDrupal Camp Atlanta 2011 - Drupal Security
Drupal Camp Atlanta 2011 - Drupal Security
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
 
Butler
ButlerButler
Butler
 

More from MrJRogers

L2 identifying photos
L2   identifying photosL2   identifying photos
L2 identifying photosMrJRogers
 
L1 intro & hardware
L1   intro & hardwareL1   intro & hardware
L1 intro & hardwareMrJRogers
 
Image reflections intro
Image reflections introImage reflections intro
Image reflections introMrJRogers
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project IntroductionDame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project IntroductionMrJRogers
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework ProjectDame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework ProjectMrJRogers
 
Unit 3 assessment 3 lesson
Unit 3 assessment 3 lessonUnit 3 assessment 3 lesson
Unit 3 assessment 3 lessonMrJRogers
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 ComputingMrJRogers
 
Types & sources of info
Types & sources of infoTypes & sources of info
Types & sources of infoMrJRogers
 
Databases & spreadsheets
Databases & spreadsheetsDatabases & spreadsheets
Databases & spreadsheetsMrJRogers
 

More from MrJRogers (13)

L2 identifying photos
L2   identifying photosL2   identifying photos
L2 identifying photos
 
L1 intro & hardware
L1   intro & hardwareL1   intro & hardware
L1 intro & hardware
 
Image reflections intro
Image reflections introImage reflections intro
Image reflections intro
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project IntroductionDame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
Dame Elizabeth Cadbury Year 8 ICT Homework Project Introduction
 
Dame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework ProjectDame Elizabeth Cadbury Year 8 ICT Homework Project
Dame Elizabeth Cadbury Year 8 ICT Homework Project
 
Unit 3 assessment 3 lesson
Unit 3 assessment 3 lessonUnit 3 assessment 3 lesson
Unit 3 assessment 3 lesson
 
Types of Software - Y9 Computing
Types of Software - Y9 ComputingTypes of Software - Y9 Computing
Types of Software - Y9 Computing
 
Types & sources of info
Types & sources of infoTypes & sources of info
Types & sources of info
 
Databases & spreadsheets
Databases & spreadsheetsDatabases & spreadsheets
Databases & spreadsheets
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Lesson 5
Lesson 5Lesson 5
Lesson 5
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Unit 28 Week 3

  • 1. Keeping Websites Secure What are the top 3 security dangers for websites? (in your opinion!) Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 2. Objectives • explain the security risks and protection mechanisms involved in website performance (P3) Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 3. To achieve a pass grade the To achieve a merit grade the evidence must show that the evidence must show that, in learner is able to: addition to the pass criteria, the learner is able to: To achieve a distinction grade the evidence must show that, in addition to the pass and merit criteria, the learner is able to: P1 outline the web architecture and components which enable internet and web Functionality M1 explain the role of web architecture in website communications D1 explain the role of the TCP/IP protocol and how it links to application layer protocols P4 using appropriate design tools, design an interactive website to meet a client need M2 explain the tools and techniques used in the creation of an interactive website D2 discuss the techniques that can be used on web pages to aid user access to information P5 create an interactive website to meet a client need. M3 improve the effectiveness of a website on the basis of a client review. P2 explain the user side and server side factors that influence the performance of a website P3 explain the security risks and protection mechanisms involved in website Performance D3 demonstrate that a created website meets the defined requirements and achieves the Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20 defined purpose.
  • 4. P3 – Assignment 3 • You have 3 tasks to complete, each of which will require some research and may well take more than 1 hour each BUT: • If we are going to learn the skills necessary for the other 2 pass marks we have a lot to learn! • We cannot spare more than 1 hour next week for either U1,2,3 catch up or U28A3 Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 5. Task 1 - Dangers: You should research each of the following terms – hacking, viruses, identity theft – and produce a definition of each in your own words in a leaflet suitable for distribution to a small business that intends to develop an online presence. You should also find examples of organisations or websites that have experienced these threats and identify how the threats were dealt with and any consequences. You should add these case studies to your leaflet. Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 6. How it might look… ima ge ima ge ima ge image ima ge ima ge ima ge Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 7. Check basic understanding: • Hacking means – unauthorised access to computer systems • While there may not be intent to commit another crime, this access often damages files such as logs and operating systems Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 8. Check basic understanding: • Viruses are programs that are designed to spread and infect other computers • They may be used to allow other criminal access to a computer • This could include taking copies of confidential data or destroying files Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 9. Check basic understanding: • Identity theft is a form of fraud where a criminal can impersonate someone else, usually for financial gain • Phishing is a form of identity theft where convincingly designed emails and websites are sent to convince users to enter their usernames and passwords into fake sites so criminals can use them Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 10. Create your leaflet! • Use your own words, especially for definitions! • Aim it at small business owners who do not necessarily have good technical knowledge • Prompt questions are on the brief • Share resources like case studies that could be useful to others • Reference the source of those things Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 11. Task 2 – Protection: • You should research each of the following terms – firewalls, SSL, strong passwords and CAPTCHA – and produce a short information leaflet or a poster suitable for issuing to YellowZebra clients. Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 12. How it might look… • Separate leaflet, please! • If you decide on a poster, don’t skimp on detail – make it A3 if you need to fit more information on! Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 13. Check basic understanding: • Firewalls use rules to allow or block data to/from different IPs & ports based on rules • Legitimate HTTP requests will be on port 80, HTTPS on 25 – other access might be suspicious/hacking Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 14. Check basic understanding: • SSL means Secure Socket Layer and it’s a way of encrypting data between webserver & browser so passwords, personal information etc. is more secure • If an address starts https:// and if you have a little lock on your browser it’s using HTTPS Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 15. Check basic understanding: • A good password takes longer for a hacker to guess or crack • More letters are more difficult, use of numbers & characters on keyboard is even better – more complexity, more possible options Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 16. Check basic understanding: • CAPTCHA (and others too) is a puzzle that only a human should be able to do • They stop hackers using scripts to automatically set up thousands of new accounts e.g. on email for spam Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 17. Make your leaflet/poster! • Use your own words, especially for definitions! • Aim it at small business owners who do not necessarily have good technical knowledge • Prompt questions are on the brief • Share resources if they’re especially good • Reference sources Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 18. Task 3 - DPA • Choose one website from following list and describe in a short report (with the use of screen shots) how that organisation complies with this law. • For example, you could include the data collection and privacy policy, the registration and purchase/transaction process, and permission to use the data collected. • You should look for areas on the website where information is given to the user covering, at least, some parts of the Data Protection Act. Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 19. How it might look… • Report typed in Word • Screenshots should be small enough not to dominate your text but big enough to make them clear to read How Amazon UK complies with the Data Protection Act Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20
  • 20. About the DPA • Check out the links on the VLE • Look back at older work! • Start your report with a summary of the law, its principles • Then show what your chosen site does to comply Image from: http://antiqueradios.com/forums/viewtopic.php?f=1&t=188309&start=20