100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 28 Website Production - Assignment 1 PART 3 (P3) - Threats & Security

Rating
-
Sold
3
Pages
2
Grade
Distinction
Uploaded on
03-01-2020
Written in
2018/2019

Assignment 1 PART 3!! - Covers Threats and Security in Website Design| BTEC Level 3 Unit 16 Procedural Programming | Criteria Covered: P3 - CRITERIA WAS MET

Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
January 3, 2020
Number of pages
2
Written in
2018/2019
Type
Essay
Professor(s)
Unknown
Grade
Distinction

Subjects

Content preview

Viruses Hacking Identity Theft

A computer virus is malicious software that will Hacking is when someone gains access of a system Identity Theft is when a hacker or a person steals
replicate itself when executed by changing pro- or a network without having authority. The person personal information or something used to identi-
grams on the computer. When the replication is that carries out this attack is referred to as a hack- fy you in order for them to use your identity. The
complete and the virus has added its own code to er. Once the hacker has access they can alter the hacker can steal things such as online banking in-
the programs on the computer or network then system and security features so they have full con- formation, bank cards, passwords, tax letters etc.
these areas are considered “infected” with a vi- trol of it. They gain access by finding vulnerabilities They are then able to use your identity to commit
rus. Infected programs can be things such as data and breaking passwords and system code. The crimes such as dealing drugs in your name or
files or the “boot sector” of your hard drive. Vi- hacker is then able to gain access to personal in- cause financial fraud by transferring money from
ruses can come from a lot of different places such formation, business data, corrupt your files and your bank or paying for things using your money.
as websites you visit on the internet, USB sticks, damage your computer. It is very important hack- A lot of people don’t even realise their infor-
Email attachments, unsafe downloads etc. They ers don’t get access to any information that may mation has been stolen until the fraud has hap-
can cause programs to malfunction and data loss/ help them crack a password or get access to a sys- pened. So it is very important that websites and
corruption. tem. systems that may contain personal information
are secure.



Daily Motion Hack Instagram eBay Data Breach
Millions of "daily motion", which is one of the biggest One of the largest social media, Instagram was hacked In may 2014 one of the largest selling companies in
video sharing platforms in the whole world, accounts due to a bug on their website which exposed a large the world was hacked and their user’s information
were stolen. A hacker extracted 85.2 million emails amount of their accounts. This included many famous was exposed. The cyber-attack exposed full names,
and usernames from daily motion, but roughly 18.3 celebrities accounts and contact information. The addresses, dates of birth and encrypted passwords.
million had associated passwords. The hack was car- hacker was then able to sell the contact information of Customers were asked to change their password but
ried out 20th of October. All of these attacks show users for $10 per search. This is a financial fraud which bank card details were safe. This resulted in the com-
that even the largest companies and websites in the was caused due to a vulnerability in their system that pany loosing customers which for a big company is
world get hacked and it is very important it doesn’t wasn’t sorted out in time. very expensive.
happen as it can cause losses.
Free
Get access to the full document:
Download

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Boyan67 PEARSON
Follow You need to be logged in order to follow users or courses
Sold
132
Member since
6 year
Number of followers
109
Documents
9
Last sold
2 year ago

3.3

36 reviews

5
11
4
5
3
10
2
5
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions