Essay about P3 Security Risks and Protection Mechanisms

Submitted By Imran3696
Words: 948
Pages: 4

Over the years, Internet has become very popular for those of all ages and as a result, criminals and hackers have created many techniques to affect web servers. In the past few years, there have been a number of high profile hackings taken place, for example, Sony and their PlayStation 3 records were hacked in which personal details from almost 77 million people were stolen which prevented users from playing online through the service. This essay has been produced to identify some of the main threats to web servers and what steps can be taken by website hosts and website owners to protect them against these threats in order to maintain good website performance and keep data secure.
There are mechanisms put in place on computer systems and web servers as accessing any sort of information over the internet involves many risks. When packets are transmitted between users and a server when connecting to a website, they are easily tracked as users exchange important details such as banking details or emails. This is done through registrations on websites or subscribing to emails of newsletters or other types of subscriptions. They ask for personal details such as names and numbers which can then result in users being exposed to hackers. If a website does not have a strong server supporting its facilities, it will be easier for hackers to access the data behind the website.
Secure Socket Layers – SSL is an internet security protocol that allows for protection of connections from one user to another via the Internet. This is carried out on many websites especially those that have shopping facilities such as clothing businesses as they have to make sure that their website is protected from hackers. Hackers are able to steal information of banking details, personal identity and other forms which can cause harm and danger to people therefore by having SSL, websites have encryption placed on their websites to prevent mischievous users to gain access to the sensitive systems.
Firewalls are put in place to block access to software or to the Internet when a user does not have the correct ports in their settings. When downloading or installing software, ports are automatically adjusted to allow users to be able to use the software. However, commonly, experienced administrators have to change the ports so that they can be connected to the software that uses Internet connections. This is done as a security measure to protect users from attracting any forms of risks such as viruses and hackers. Firewalls make it harder for hackers due to the fact that firewall is a network security system that manages incoming and outgoing traffic that are based upon ports that are set up. It is used as a barrier between a secure network such as the Internet and a connection that is not trusted and secure such as one from hackers.
Viruses have always existed upon on the Internet as they are the biggest risks when accessing Internet. Hackers place viruses on websites, emails and other methods such as phishing where hackers can gain personal information such as usernames, passwords and bank details. Phishing is carried mainly throughout emails that look professional and legal, part of a website that a user may have used in the past however they can affect web hosts. If an owner of a website has been part of phishing system deployed against them, they would be vulnerable to the information of their own and their customers to be accessed by hackers. This can cause