Saturday 12 July 2014

Security protection mechanisms

Introduction:
In order to keep your information and your desktop machine safe, there are several security protection mechanisms that will help minimize the risks a crime occuring such as identity theft but most importantly all the information you input into your websites or onto your desktop machine will be kept safe! On this page you will find ways in which you can help prevent yourself from security risks and be aware of what steps you can take to ensure you have a high level of security on your machine.

Firewall:
Firewall is part of a network  which is designed purely to block unauthorized access (this could be done through hacking)  Firewall is a device, which is used to reject or allow network  transmissions; if someone was to have there own web company it is crucial that they have firewall as this will help prevent a virus spreading throughout the network;  so if one computer is to become infected it won’t spread to the rest.

Secure socket layers (SSL):
A SSL provides communications security over the internet, one main function which Secure Socket Layers encrypt are different sections of network connections, this is done by using a keyed message authentication code to ensure message reliability. In order to make customers feel secure when giving there details, websites should have a certificate to ensure customers that they are a secure website.

Digital certificate:
A digital certificate is basically a electronic passport, that allows a computer, person or a organization to swap information over the internet securely.  In the same way of how a passport provides identifying information, so does a digital certificate, the certificate contains several pieces of information – such as:
  • The name of the certificate holder
  • A serial number 
  •  Expiration dates 
  • A digital signature - so that a recipient can verify that the certificate is real.
Legal Considerations:
Data Protection Act:

The Data Protection Act 1998 provides a structure to ensure that when personal information is captured it is stored and handled correctly. This also means that individuals have the right to know about any information that is store about them; the Data Protection Act 1998 works in two ways; any individual that provides personal information must register with the DPA registrar and meet the terms of the eight principles.


Computer Misuse Act: 
The Computer Misuse Act was introduced in 1990; under this law there are offences that are stated, these offences can not be broken by any individual as that certain individual would be in breach of the Computer Misuse Act. This act involves the use of computers; one of the offences that is stated under this act is that no one can use unauthorised access to gain access into a computer or private data – one way in which people do tend to gain access is through using someone else’s user ID and password. For anyone to gain unauthorized access this is seen as a serious crime. The Computer Misuse Act 1990, was basically mainly introduced to protect people who have had there information hacked/damaged or stolen by people who misuse the purpose of computers for personal use or fun.

No comments:

Post a Comment