Page 1

24/09/10

P2 & P3

Mitchell Dodd

Introduction Within the following E-Book I shall be attempting to explain the user side and server side factors that influence the performance of a website and also explain the security risks and protection mechanisms involved in website performance. This document was created for the use of 13lueMedia Productions and has been uploaded onto issuu for their use and now that of the public.

Content    

Page 1: Introduction & Content Page 3-4: User Side & Server Side factors. Page 6-8: Security Risks & Protection Page 9: Summery

1|Page


24/09/10

P2 & P3

Mitchell Dodd

2|Page


24/09/10

P2 & P3

User Side

User Side explanations

Internet Connection

The strength of the user’s internet connection can have a strong affect on the quality of the website, from causing it to just load very slowly to not loading at all and crashing. The type of connection can affect how badly the connection degrades, for example a wireless network can be, to a degree, more temperamental than a wired connection as the signal must travel to the computer receiver and weakens the more obstructions are in the way. The User-Side hardware allows the user to access the internet and the server’s hosting different websites. Without it the user would not be able to access it at all. The bandwidth available to the user is what allows them transfer data, when the bandwidth limit is met the user may not transfer any more data or will be charged for every future transfer.

Hardware

Bandwidth

Mitchell Dodd

Server Side

Server Side explanations

Internet Traffic

The amount of people accessing the website at the time can impact how fast it loads, or if it just crashes from the strain, for people. Many people from around the world might be accessing that one website at any single time and the server provider’s hardware and software (see below) must be able to handle this influx of people.

Hardware

The Server-Side hardware is what contains and maintains the servers and keeps the website, or websites, running.

Software

Java, JavaScript, Silverlight and Flash. These are three of the many types of software the server-side would use. The server itself could also be considered software to a degree. Without the software the server uses it may not be able to host, create or maintain the websites it has stored in the hardware. 3|Page


24/09/10

Software

Malware

File Size

Cache

P2 & P3

Flash and Java are some of the most common software the user-side would use to access websites.

Viruses, worms and key loggers. Just to name a few of the types of malware out there, malware can affect heavily on the speed websites load and even if they load at all (and that’s not the worst of your problems!). Malware must be kept an eye out for at all times. The size of the files being downloaded from the web server can affect how fast the webpage opens, though usually this is a server side concern if the user has multiple web pages open at once it can drastically affect how fast others load. Cache will build up over time with how much and how often you surf the internet, generally cache comes from the history building up from the websites you have visited. The cache gets added to the memory which will slow down your computer and the speed of which a website loads gradually.

Mitchell Dodd

Maintenance

Web Server Capacity.

File Size

Malware

If the hosting server has poor maintenance then the website could be damaged and refuse to load or at the least be incredibly slow loading and any pictures may refuse completely to load. The web server capacity is the amount of bandwidth the web server can put out and allow for the many uses that use it. Once the capacity is reached it may not allow certain users to continue using the bandwidth.

The size of the files that the web pages make can make the server slower once uploaded onto it, this in turn makes the web page load slower on browsers and can annoy users, or even make them turn away from the website in some cases. Malware affecting the server can be a large danger to all the websites hosted on it, and all the people connected to it. For example, a worm could attach itself to a website and use that to spread itself to every computer that accesses that website. Another example is a virus that could just destroy the servers completely, destroying all the data contained in the hardware.

4|Page


24/09/10

P2 & P3

Mitchell Dodd

5|Page


24/09/10

Security Risks Viruses

Hackers

P2 & P3

Mitchell Dodd

Explanation

Protection

Explanation

Viruses can access a computer via a download under a false name. When on a computer the virus will seek out an area to hide and then wait, after some time it will activate and then start attacking and destroying key points of the hardware it is on. Some will act instantly after being downloaded. Hackers may try and force their way into a computer system with the intent to alter, steal or destroy the information contained within. The reasons they do this can range from the intent to use the information for their own purposes, a form of revenge on a person or company or even just boredom. Most of the time it is for personal gain, but sometimes they just destroy for the heck of it. Malicious hackers are more often called “Crackers� by other hackers, as being a hacker does not mean you have sinister intent.

Anti-Virus

Anti-Virus software is designed to search for and eliminate viruses and worms. It also, to a degree, prevents viruses, worms and other malware from accessing the computer it is on. Some even come with their own Firewalls.

Firewall

A firewall is designed to prevent unauthorized access onto a computer that the firewall is installed on. It shall also attempt to prevent any suspicious software trying to access the computer.

6|Page


24/09/10

Key Loggers

P2 & P3

Keyloggers are programs that record websites visited and what keys are pressed while on that website, this malware is used with the intent to find out passwords.

Secure Socket Layers (SSL)

Mitchell Dodd

SSL uses an encrypted system with two keys that in turn encrypt data; there is one public key that will be known to everyone and one secret key that will only be known to the user of the computer or creator of a website. Many websites use SSL to protect sensitive information being sent to them, such as a customer’s credit card details. (information from http://www.webopedia.com/TER M/S/SSL.html)

Identity Theft

Worms

Identity Theft can accrue from a computer that was affected by a worm, spyware or keylogger not being found soon enough. When it happens, the party that was gathering your information will assume your identity for their own gains. Causing great amount of stress for you. Worms are much like viruses, but much more dangerous. Whereas a virus requires you to download it for it to infect the computer, worms latch onto and infect a computer as soon as the webpage, spam mail or whatever other source that is infected with them is opened.

Strong Passwords

Strong passwords can help in preventing outside access to an account or computer. It can also, to some degree, confuse keyloggers or at least make finding out your password more difficult.

AntiSpyware

Anti-Spyware functions on much the same level as AntiVirus, though it is designed to defend against Spyware rather than Viruses.

7|Page


24/09/10

Trojans

Spyware

P2 & P3

A Trojan, put very simply, is a very well made disguise for viruses, spyware, keyloggers or worms. The Trojan will disguise itself as software that looks completely safe and completely legit. This could be a small flash game created to fool the downloader and while the game shall still be part of the download, the game itself will be a virus, worm or other such malware. Spyware gathers information from the system it has infected and sends it back to the third party, the party that created the spyware, for their use. This can lead to stolen money and identity theft.

Mitchell Dodd

Delete Spam Email

Spam emails often contain worms to infect your computer, it is best to delete most things that end up in the spam box most email sites have. Unless of course you know it is, and you are 110% sure it is, legit and ended up there by mistake.

Update the Computer System

Simply by allowing the necessary updates to happen on the computer system will help to defend against malware, causing malware that is out-dated to have a harder time getting onto the system. Or even preventing it entirely in some cases.

8|Page


24/09/10

P2 & P3

Mitchell Dodd

Summery   

Page 1: Introduction & Content Page 3-4: User Side & Server Side factors. Page 6-8: Security Risks & Protection

9|Page

User Side, Server Side and Security Issues E-Book  

An E-Book created to explain the user side, server side and security issues involved in website performance.

Read more
Read more
Similar to
Popular now
Just for you