1 / 16

E-Commerce: Security

E-Commerce: Security. LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2. Guess the key terms……. A malicious piece of code.

jerrod
Télécharger la présentation

E-Commerce: Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-Commerce: Security • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  2. Guess the key terms…….. A malicious piece of code Software that protects workstations or servers from unauthorised access The act of stealing someone’s personal details. • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  3. Guess the key terms…….. A malicious piece of code Virus Software that protects workstations or servers from unauthorised access The act of stealing someone’s personal details. • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  4. Guess the key terms…….. A malicious piece of code Virus Software that protects workstations or servers from unauthorised access The act of stealing someone’s personal details. Identity theft • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  5. Guess the key terms…….. A malicious piece of code Virus Software that protects workstations or servers from unauthorised access The act of stealing someone’s personal details. Identity theft Firewall • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  6. How are they linked? Virus Identity theft Firewall • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  7. How are they linked? Viruses Can cause Identity theft Firewall • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  8. How are they linked? Viruses Can cause Identity theft Which can be prevented by Firewall • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  9. Knowledge means merits! • To begin progression towards M2 you need to be able to give examples of security issues and then describe them. • Using the three examples, describe each in a paragraph • Viruses • Identity theft • Firewall • You have 10 minutes to complete this task • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  10. How confident are you? Give yourself a mark out of ten for how well you feel you understand each of the three terms 10 – “This is easy, let me at the assignment” 5 – “I’m not quite ready to do the assignment” 1 – “Yeah a virus…..the doctor said I had one of them once” • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  11. Prevention • Using the key terms explain how viruses and identity theft can be prevented. • What role does a firewall play? Does it stop viruses? • Find some examples in the news where viruses have caused major problems, what happened? How was the problem solved? • Find some examples of identity theft. Which companies were involved? What effect did it have on the companies? If you rated any of your confidence in any of the terms lower than 7, move to the area towards the back of the room OR 25 minutes to work on this • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  12. Testing your knowledge! Think of a question about one of today’s key terms. • LO: Create a leaflet discussing security issues • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  13. Define the following terms: • Secure sockets layer • HTTPS • RSA Certificates • Strong password • Digital Signatures • LO: To explain methods of security used in e-commerce • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  14. Key Terms: • Secure sockets layer – a cryptographic layer which provides secure communication over the internet. • HTTPS – A protocol used by websites to identify an encrypted connection. • RSA Certificates – A method of coding information which can be used to confirm the identity of the sender or recipient. • Strong password – A password combining letters, numbers, upper case, lower case, symbols and containing more than eight characters. • Digital Signatures – The process of authenticating something over the internet (similar to a traditional signature) • LO: To explain methods of security used in e-commerce • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

  15. automobile aut0m0bile aUt0m0bile aUt0m0b!le autOmOb1@

  16. Tick next to any terms which you are not able to explain. • Virus • Hacking • Identity Theft • Secure sockets layer (SSL) • HTTPS • RSA Certificates • Strong password • Digital Signatures • LO: To explain methods of security used in e-commerce • Give examples of security issues • Illustrate how businesses/individuals can protect themselves from security issues • BTEC Criteria: M2

More Related