100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Essay

Unit 28 Website Production - Assignment 1 PART 3 (P3) - Threats & Security

Beoordeling
-
Verkocht
3
Pagina's
2
Cijfer
Distinction
Geüpload op
03-01-2020
Geschreven in
2018/2019

Assignment 1 PART 3!! - Covers Threats and Security in Website Design| BTEC Level 3 Unit 16 Procedural Programming | Criteria Covered: P3 - CRITERIA WAS MET

Instelling
Vak








Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Gekoppeld boek

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
3 januari 2020
Aantal pagina's
2
Geschreven in
2018/2019
Type
Essay
Docent(en)
Onbekend
Cijfer
Distinction

Onderwerpen

Voorbeeld van de inhoud

Viruses Hacking Identity Theft

A computer virus is malicious software that will Hacking is when someone gains access of a system Identity Theft is when a hacker or a person steals
replicate itself when executed by changing pro- or a network without having authority. The person personal information or something used to identi-
grams on the computer. When the replication is that carries out this attack is referred to as a hack- fy you in order for them to use your identity. The
complete and the virus has added its own code to er. Once the hacker has access they can alter the hacker can steal things such as online banking in-
the programs on the computer or network then system and security features so they have full con- formation, bank cards, passwords, tax letters etc.
these areas are considered “infected” with a vi- trol of it. They gain access by finding vulnerabilities They are then able to use your identity to commit
rus. Infected programs can be things such as data and breaking passwords and system code. The crimes such as dealing drugs in your name or
files or the “boot sector” of your hard drive. Vi- hacker is then able to gain access to personal in- cause financial fraud by transferring money from
ruses can come from a lot of different places such formation, business data, corrupt your files and your bank or paying for things using your money.
as websites you visit on the internet, USB sticks, damage your computer. It is very important hack- A lot of people don’t even realise their infor-
Email attachments, unsafe downloads etc. They ers don’t get access to any information that may mation has been stolen until the fraud has hap-
can cause programs to malfunction and data loss/ help them crack a password or get access to a sys- pened. So it is very important that websites and
corruption. tem. systems that may contain personal information
are secure.



Daily Motion Hack Instagram eBay Data Breach
Millions of "daily motion", which is one of the biggest One of the largest social media, Instagram was hacked In may 2014 one of the largest selling companies in
video sharing platforms in the whole world, accounts due to a bug on their website which exposed a large the world was hacked and their user’s information
were stolen. A hacker extracted 85.2 million emails amount of their accounts. This included many famous was exposed. The cyber-attack exposed full names,
and usernames from daily motion, but roughly 18.3 celebrities accounts and contact information. The addresses, dates of birth and encrypted passwords.
million had associated passwords. The hack was car- hacker was then able to sell the contact information of Customers were asked to change their password but
ried out 20th of October. All of these attacks show users for $10 per search. This is a financial fraud which bank card details were safe. This resulted in the com-
that even the largest companies and websites in the was caused due to a vulnerability in their system that pany loosing customers which for a big company is
world get hacked and it is very important it doesn’t wasn’t sorted out in time. very expensive.
happen as it can cause losses.
Gratis
Krijg toegang tot het volledige document:
Downloaden

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Boyan67 PEARSON
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
132
Lid sinds
6 jaar
Aantal volgers
109
Documenten
9
Laatst verkocht
2 jaar geleden

3,3

36 beoordelingen

5
11
4
5
3
10
2
5
1
5

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen