Skip to main content
Get your brand new Wikispaces Classroom now
and do "back to school" in style.
BTEC UNITS 28 & 8
BTEC UNITS 28 & 8
Pages and Files
* Unit 28 Assignments (old)
* Unit 8 Assignments (new)
* Unit 28 Feedback LOs (old)
* Unit 8 Tracking (new)
28. M2 Tools & Techniques
28.D1 Role of TCP IP protocol
28.1.1 What is an ISP?
28.1.2 What is web hosting?
28.1.3 What is a domain?
28.1.4 What is the WWW?
28.1.5 What is a router?
28.1.6 What are web, proxy & mail servers?
28.1.7 What are browser & email software?
28.2.1 What are user side factors?
28.2.2 What are server side factors?
28.3.1 What are security risks?
28.1.8 What is cloud computing?
28.3.2 What is security protection?
28.3.3 What legislation?
Add "All Pages"
8.M2 Overcoming security issues
Support notes from class textbooks p.__ & the following dictionaries & search engines:
Overcoming security issues
For M2, extend your report for P3 by discussing the security aspects of e-commerce, including both the benefits & drawbacks of potential solutions.
Secure Socket Layers (SSL), HTTPS & RSA Certificates
What is a SSL?
What does SSL do? What is its purpose?
hat is encryption?
hat does encryption do? What is its purpose?
What is SSL used for and what security issue does it overcome?
Which browsers (name several) understand and work with SSL?
What does HTTPS stand for?
What does the HTTPS protocol do? What is its purpose?
What is the port number given to the HTTPS protocol?
What does a HTTPS webpage contain? How does a user know if the e-commerce webpage is secure?
What protocol does the browser use to connect to the web server when credits cards details are ready to be transmitted at checkout?
What technology is used to return valid identification details back to the web browser?
Who does the browser contact after receiving the RSA digital certificate?
What happens if the check is successful?
What happens if the check is unsuccessful?
What are the potential risks if these technologies don’t work together well?
What are strong passwords?
Why is it important for customers to use strong passwords?
What simple rules can your e-commerce website set to ensure that customers use strong passwords?
What are the advantages of using strong passwords?
What are the disadvantages of using strong passwords?
Alternative Authentication Methods
What are the four other possible alternative authentication methods?
What are the advantages of using these methods?
What are the disadvantages of using these methods?
help on how to format text
Turn off "Getting Started"