Preview

Explain the security risks and protection mechanisms involved in web performance.

Satisfactory Essays
Open Document
Open Document
555 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Explain the security risks and protection mechanisms involved in web performance.
P3 explain the security risks and protection mechanisms involved in website performance
Security Risks Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.
Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.
Phishing: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity from Amazon.
Identity theft: Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
Website defacement: Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own.
Degradation of performance: Machines make our life easier, and technology makes it luxurious. But even technology is bounded by certain barriers. Busy network, with heavy traffic is a common problem. Hardware and software can also cause you troubles at any time. Your processor speed and data storage might also pose as a problem for degradation of your system’s performance.
Solutions for Security Risks

Hiring efficient employees: Your human resource management need to be expert in choosing good business analysts, system administrator, programmers, database administrator,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Akamai Case

    • 1562 Words
    • 7 Pages

    a. First-mile infrastructure having to cope with heavy traffic loads as a Web site’s audience grew.…

    • 1562 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    Identity theft happens when someone takes "personally identifying information" such as a Social Security number, a driver's license number, or other information, and uses that information to commit fraud or other crimes.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Throughout the years, identity theft has become extremely prevalent and has affected many people. It’s important for everyone to know why identity theft began and the importance of it. There are many causes of identity theft that lead to negative effects. Identity theft is a serious problem that should not be taken lightly. Many people have gotten their wallet stolen or their purse and this is very common. Often times, people put their information on the internet when they do not know exactly who this information is going to. There are thousands of people out there who are out to get your money and/or identity. The things we frequently wonder are why these people take all our information and money. We do not fully understand the causes of…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Risk of Insecure System

    • 378 Words
    • 2 Pages

    Gain information about the Web server's host machine that will allow them to break into the system.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 7 Notes

    • 1579 Words
    • 7 Pages

    Certified hackers – the ones that are trained to hack but normally follow procedure. Hired by companies to see whether they are secure or not. Paid good amount of money. Ex. Guy walks into the company, receptionist gives him a badge and he says I have to check my flight, can I check something on your computer? She stands to the side and goes around her desk due…

    • 1579 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Phishing : Phishing attacks uses electronic communication medias such as email and websites to induce computer users into revealing confidential/personal information such as usernames, passwords, or credit card by masquerading as a trustworthy entity. Mostly the objective of phishing is to steal personal identification information relating to financial…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    - a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. A computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or interfere normal operation of your computer.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In computer technology, viruses are vicious software programs, a form of malware. Viruses exist on local disk drives and spread from one computer to another through the sharing of the infected files. Regular methods for spreading viruses include floppy disks, FTP file transfers, and copying files between shared network drives. Once installed on a computer, a virus may change or remove application and system files. Some viruses can leave a computer inoperable; others just display startling screen messages to innocent users.…

    • 430 Words
    • 2 Pages
    Good Essays