Preview

Explain the security risks and protection mechanisms involved in web performance.

Satisfactory Essays
Open Document
Open Document
555 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Explain the security risks and protection mechanisms involved in web performance.
P3 explain the security risks and protection mechanisms involved in website performance
Security Risks Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.
Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.
Phishing: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity from Amazon.
Identity theft: Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
Website defacement: Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own.
Degradation of performance: Machines make our life easier, and technology makes it luxurious. But even technology is bounded by certain barriers. Busy network, with heavy traffic is a common problem. Hardware and software can also cause you troubles at any time. Your processor speed and data storage might also pose as a problem for degradation of your system’s performance.
Solutions for Security Risks

Hiring efficient employees: Your human resource management need to be expert in choosing good business analysts, system administrator, programmers, database administrator,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Akamai Case

    • 1562 Words
    • 7 Pages

    a. First-mile infrastructure having to cope with heavy traffic loads as a Web site’s audience grew.…

    • 1562 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    Identity theft happens when someone takes "personally identifying information" such as a Social Security number, a driver's license number, or other information, and uses that information to commit fraud or other crimes.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A virus is a type of malware that can damage your computer system. A virus can damage your manufactures computer system by destroying it and change how it works. A Trojan is a hacking program and can damage your manufactures computer system by using executable files/programs which once opened will perform certain 'actions' to damage your system. Another example of a virus is a worm, which is a small program that moves through a computer system randomly altering or overwriting pieces of data as it moves.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Viruses: A computer virus is code that replicates by inserting itself into other programs. A program that a virus has inserted itself into is infected, and is referred to as the virus’ host. A virus needs an existing host program in order to cause harm.…

    • 10251 Words
    • 42 Pages
    Good Essays
  • Good Essays

    Phishing : Phishing attacks uses electronic communication medias such as email and websites to induce computer users into revealing confidential/personal information such as usernames, passwords, or credit card by masquerading as a trustworthy entity. Mostly the objective of phishing is to steal personal identification information relating to financial…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 7 Notes

    • 1579 Words
    • 7 Pages

    Certified hackers – the ones that are trained to hack but normally follow procedure. Hired by companies to see whether they are secure or not. Paid good amount of money. Ex. Guy walks into the company, receptionist gives him a badge and he says I have to check my flight, can I check something on your computer? She stands to the side and goes around her desk due…

    • 1579 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In computer technology, viruses are vicious software programs, a form of malware. Viruses exist on local disk drives and spread from one computer to another through the sharing of the infected files. Regular methods for spreading viruses include floppy disks, FTP file transfers, and copying files between shared network drives. Once installed on a computer, a virus may change or remove application and system files. Some viruses can leave a computer inoperable; others just display startling screen messages to innocent users.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Good Essays

    - a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk of Insecure System

    • 378 Words
    • 2 Pages

    Gain information about the Web server's host machine that will allow them to break into the system.…

    • 378 Words
    • 2 Pages
    Good Essays