Presentation is loading. Please wait.

Presentation is loading. Please wait.

Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.

Similar presentations


Presentation on theme: "Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which."— Presentation transcript:

1 Report task

2 Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which websites have to adhere to such as Data Protection Act (DPA), equality act 2010, copyright act The current methods of sharing information and movement such as web 2.0 Explain the application layer protocol in relation to TCP/IP

3 Hackers Viruses Identity Theft IMPACT THESE HAVE ON WEBSITES!

4 Firewalls Secure Socket Layers Passwords.

5 DATA PROTECTION ACT Think about how 8 rules + how to apply them to websites

6 Equality act 2010 - http://www.rnib.org.uk/professionals/webacces sibility/lawsandstandards/Pages/uk_law.aspx http://www.rnib.org.uk/professionals/webacces sibility/lawsandstandards/Pages/uk_law.aspx For instance, it may be unlawful for a website to: have links on that are not accessible to a screen reader have application forms (for instance, for bank accounts or job application forms) in a PDF format that cannot be read by a screen reader have core service information (for instance, timetables on a public transport website) that is not in a format accessible to screen readers. use text, colour contrasting and formatting that make the website inaccessible to a partially sighted service user change security procedures (for instance, on an e-commerce website) without considering the impact of blind and partially sighted customers that use screen readers.

7 Copyright act See unit 30 – how this impacts web developers

8 http://www.services- online.co.uk/regulations.shtml The Data Protection Act 1998 The Privacy and Electronic Communications Regulations The Privacy and Electronic Communications Regulations Accessibility - The Disability Discrimination Act 1995 (DDA) Accessibility - The Disability Discrimination Act 1995 (DDA) E-Commerce Regulations 2002 W3C Validation (World Wide Web Consortium) W3C Validation The Companies Act 2008

9 Web 2.0 With Web 2.0… Users own the data Users control the data There is a climate of participation Users value add as their needs evolve The interface is friendly

10

11 Application layer. On the Application layer you will find Application protocols such as SMTP (for e- mail), FTP (for file transfer) and HTTP (for web browsing). Each kind of program talks to a different Application protocol, depending on the program purpose After processing the program request, the protocol on the Application layer will talk to another protocol from the Transport layer, usually TCP. Application Layer This layer makes the communication between programs and the transport protocols. There are several different protocols that work on the Application layer. The most known are HTTP (HyperText Transfer Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol) When you ask your e-mail program (called e-mail client) to download e-mails that are stored on an e-mail server, it will request this task to the TCP/IP Application layer, being served by the SMTP protocol. When you type in a www address on your web browser to open a web page, your browser will request this task to the TCP/IP Application layer, being served by the HTTP protocol (that is why web pages start with “http://”). And so on. The Application layer talks to the Transport layer through a port. Ports are numbered and standard applications always use the same port. For example, SMTP protocol always use port 25, HTTP protocol always use port 80 and FTP protocol always use ports 20 (for data transmission) and 21 (for control). The use of a port number allows the Transport protocol (typically TCP) to know which kind of contents is inside the packet (for example, to know that the data being transported is an e-mail) allowing it to know, at the reception side, to which Application protocol it should deliver the received data. So, when receiving a packet target to port 25, TCP protocol will know that it must deliver data to the protocol connected to this port, usually SMTP, which in turn will deliver data to the program that requested it (the e-mail program).

12


Download ppt "Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which."

Similar presentations


Ads by Google