Table of contents:
Internet Security and Confidentiality: 4
User authentication: 4
Anti-virus protection: 4
Fire walls: 5
The range of service offered by ISPs: 6
The cost of the different packages: 6
Internet Connection and Access Methods: 7
Three broadband packages: 9
Vodafone simply broadband: 10
Unlimited 70Mb & Talk (Anytime) 10
My aims are to require my evidence that will show me to understand of broad range of my learning outcomes in my project brief.
I will have to show the use of the software browser package. I will do my research using search engines to find out about:
• Security and confidentiality on the Internet
• Range of services are offered by ISPs
• Methods of the Internet connection for home and business users
• Based on my analysis of the findings, I will recommend the methods of connecting to Internet.
I will produce a report of the findings including the details of my Methodology, findings and URLs of websites used in the bibliography.
For this research, I used primary and secondary sources to carry out my report for this information.
Then I asked used primary sources to ask people, shops about the broadband packages, in the meanwhile, when I was asking about broadband packages, I used secondary sources to look up more website on broadband packages.
My secondary research was some websites on where I got my information, also I listed the websites.
The internet can sometimes be wrong, so don’t believe in everything, but most of the time the internet is the best method of researching but you will have to be careful with the resources like (e.g. BBC or News Channels).
Internet Security and Confidentiality:
What you know:
Authentication methods are password; you have to keep the password and codes secret, don’t be telling no one what is you pin numbers.
The cost is very low and easy to carry out of this information systems.
What you have:
Most people in business would have keys for security reason for doors or drawers; also they might have swipe cards or USB tokens. Each one would have individual cards, tokens or keys. If they are lost, stolen or even damaged, they will not be able to use them.
Compare these methods with passwords it cost nothing to issue a new password or a pin.
What you are:
A person who verified a security identity like a fingerprint or eye scanner so another person will not be able to get in without you.
Some people would also have set for security is a voice recorder or a signature.
How can I protect my computer against virus when people is online, make sure don’t click on anything if you don’t know what it about because that might cause a virus. Fortunately, preventing or getting rid of computer viruses is usually...