We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Security Issues and Legal Constraints of Websites Essay Sample

The whole doc is available only for registered users OPEN DOC
  • Pages:
  • Word count: 815
  • Category: internet

Get Full Essay

Get access to this section to get all the help you need with your essay and educational goals.

Get Access

Security Issues and Legal Constraints of Websites Essay Sample

How might someone obtain information about another person on the internet? Identify a website where this may happen.

Users can easily obtain information from unknown people online such as by viewing at their profile where their contact details are sometimes their bank details are too.

These websites are MySpace and Facebook which are all popular for the users because they are social network group. When people give information about them self online, they make it easier for hackers to find people offline. So people should think carefully about who they give out their address to, what their phone number is or which school / job they go to.

What potential security issues could this access cause?

The potential security issue caused are that they can see people details which may include their full name, date of birth, address and even their bank account. When hackers steal information about the person they often target steal money of that person. For example if the hacker gets enough details about the person, the hacker may be able to apply for credit card or a loan the name of the owner. After the hackers have taken off with the money, this could result to the person left with bill and bad credit rating. Another example is, a person is a planning a party and post details on his MySpace page which includes his address. On the day, a stranger shows up uninvited, gatecrashes the party and destroys his house. This could happen when person gives full details about themselves online.

Which law is in place in the UK to enforce how personal data is used?

The current UK legislation covering data held about living individual people is the data protection 1998. This Act is a law designed protect people privacy so that data cannot be misuse.

Organisations that stores personal data must take by certain rules:

– They must protect the data from unauthorised access.

– -they must not pass on the data to other organisations without the individual’s permission.

– The data they hold must be accurate and up to date, and must not be held for longer than needed.

What must a site like www.hsbc.co.uk do to comply with this law?

HSBC must comply with the law data person act 1998 such as they keep personal details secure, in all circumstances. This means that organisations cannot use the data people give to them and used it for themselves. For e.g. a member of HSBC send an email to them. The company cannot use email but replying to person who bellowing to.

By what methods could a hacker infiltrate a commercial web site like www.hsbc.co.uk?

Hacker can infiltrate HSBC website by using other people user name as they have their information. Hacker can send key locker to users by email which is a program that tracks what users do on their computer. E.g. when user’s log into their HSBC website account this will automatically transfers to the hacker’s computer with all bank details of the user’s.

How can websites minimise security risks to their users and data?

Before Companies design websites they have to make sure that their computer’s system is install security software. Which prevent hackers accessing the pc network so that they cannot steal people’s data such as credit cards.

Firewall: Helps to keep computer more secure. It restricts information that comes to company pc, from other pc users by network. This will give company pc more control over data on their pc and providing a line of defence against hackers or unwanted software that try to connect to companies’ pc by network and stealing data.

The company should use a strong password on their network so that hackers cannot easily guess the password.

The companies need use encrypted which is a way of making data unreadable to expect the receiver.

What can users do to minimise security risks when online?

Users should use software protections before going online to prevent attacks from hackers or unwanted viruses which could result the PC stop responding.

Antivirus: Is a software helps protect users against viruses. Anti virus scan hidden viruses in an email messenger or web page which could damage the computer system. Anti virus helps disable the virus and prevent it from damaging user’s computer. So that users can surf the website safely without worrying about fraud or being attack by viruses or other threats.

Spyware: Is software that hides itself somewhere on pc users collecting information about users and what they do on the internet. Users can remove spyware by installing software like Adware that will scan user’s pc can remove the unwanted spyware.

Firewall: Is software that prevents unauthorised come into user’s network. So that cannot steal people privacy.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Internet Security Cameras

What features mentioned in 1984 have become true in our present day society? George Orwell wrote a dystopia which in that time (1949) may have seemed like pure fantasy. Nonetheless, present time has proven to be scarier than fiction itself for the line which separates reality from the fictional world Orwell created is uncertain now. Among some of the most deliberated parts of the novel...

The most common social networks

Facts:  Acquisition accelerated Facebook’s ability to bring connectivity and utility to the world;  Leading mobile messaging company operated independently and retain its brand;  WhatsApp co-founder and CEO Jan Koum to join Facebook Board of Directors. Facebook, MENLO PARK, CALIF, on February 19, 2014, announced that it has reached a definitive agreement to acquire WhatsApp, a rapidly growing cross-platform mobile messaging company, for...

London Knights Situation analysis

In order to find out an in depth information about the London Knights so I've decided to carry out a secondary and primary research. I used the Internet as part of my secondary research. The Internet was very important because I've got a lot of competitors' corporate information, which I can present in this report and they were very relevant. I also used the London...

Using the Internet

What I want to find out:- 1. What is the process of cloning? 2. Disadvantages of cloning? 3. Types of cloning? 4. Materials needed for cloning? Search engines which I will use:- www.ixquick.com Ixquick search results are more comprehensive and more accurate. Ixquick's unique capabilities include a Universal Power Search, a global search and power refinement. As you search, it has stars which give a...

Phorm and its Webwise Scheme

Phorm is an American company which is working with British internet service providers (ISP)[1], to introduce a new scheme called ‘Webwise’, where it would collect information on an individual’s web browsing behaviour. This information would be used to deliver targeted advertising to the end users. The system would collect information by deep packet inspection which would inspect the contents of each webpage requests by a...

Get Access To The Full Essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member