Thursday, April 4, 2019
Security And Confidentiality On The Internet Information Technology Essay
harborive c everywhereing And Confidentiality On The net in shine Information Technology EssayOn 9th of November 2009 The meshing teacher requested 3000 word handle related to the FETAC Internet module. This report was to be submitted by 14th of January2010. The topic of the report is Security and Confidentiality on the Internet with reference to cookies, vir personas, engraveion, digital signatures, firewalls, filtering softw ar and personal privy(p)iveness.Recommendations were requested.2. Method of ProcedureI found roughly of the randomness on the internet. In order to obtain the relevant teaching, I put ond Google Search railway locomotive with signalisewords in English Internet Security, Privacy on the Internet, Malw ar, Computer Viruses, Cookies, Firewalls, Filtering Softw be, encoding, Digital Signatures, Computer Protection, Threats on the Internet. drawwords in Lithuanian Privatumas Internete, Saugumas Intenete, Kompiuteriniai Virusai, Ugniasien-s, Filtravimo P rgramin- ranga, ifravimas, Skaitmeninis paraas, Pavojai Internete.Also, some printed sources of culture such as books and a periodical press in English and Lithaunian were adopted.Several pages for each topic were directed to confirm that the instruction was correct and fully understud. That hepled me to ferment conclusions and to give recommendations.3. Findings3.1 Importance of SubjectWith the progress of affordable technology to a greater extent of us store much and more of our life in situations and bytes. By the end of 2009 there was more than 1,5 billion Internet users in 260 countries on every continent. The Internet is non a single net, still a vast army of connected net plant situated all over the world, easily accessible by personal calculating machines, notebooks, netbooks, smartphones, PDAs, game consoles, forward-looking TVs, same photo cameras or even kitchen appliances as hi-tech f disengageges and microwaves in a variety of ways.Today, the Internet uses gateways, routers, broadband connections, Wi-Fi spots and Internet gain providers (ISPs) to make itself available at all ms. Individuals and organizations worldwide preempt reach almost either point on the network without regard to national or geographic boundaries or time of day, there is some exceptions regarding to Internet censorship. now, it chasten about hard to contract the contrast without any connection to the Internet, because of its excellent source of marketing, convenience, high speed, low cost, and almost unlimited possibilities. Institutions of education, hospitals, commits, institutions of usual service, providers of mobile service and internet, utility companies and of course our government has our personal reading on their ready reckoners and they argon connected to the Internet.With the birth of accessible Networking Sites such as Bebo, Facebook, MySace, Twitter ect., we sharing our pictures, personal details, our thoughts and lives with friends and if we argon not tutorshipful with everybody on the Internet. dependable Facebook on its own has more than 400 million users.Even more, with new generation of Internet- Cloud Computing, individuals and business users are storing less entropy on their hard drives and more in the cloud- remote servers, operated by giants standardised Google and virago. notwithstanding, while using the Internet, along with the convenience and speed of access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the reckoner strategys will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on opus and locked in a file cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They stinkpot slew or tamper with information without touching a piece of paper or a photocopi er. They set up create new electronic files, run their own programs, and even hide all evidence of their un veritable body process.So if we are climax and locking the door in our house to prevent criminals gain access to our valuables, we must take care of our house and life in the digital world and use all possible auspices and privacy on the Internet measures against the threats.WORLD INTERNET USAGE AND POPULATION STATISTICSWorld RegionsPopulation( 2009 Est.)Internet UsersDec.31,2000Internet UsersLatest DataPenetration(%Population)Growth2000-2009Users %of TableAfrica991,002,3424,514,40067,371,7006.8 %1,392.4%3.9 %Asia3,808,070,503114,304,000738,257,23019.4 %545.9 %42.6 %Europe803,850,858105,096,093418,029,79652.0 %297.8 %24.1 %Middle East202,687,0053,284,80057,425,04628.3 %1,648.2%3.3 %North the States340,831,831108,096,800252,908,00074.2 %134.0 %14.6 %Latin America/Caribbean586,662,46818,068,919179,031,47930.5 %890.8 %10.3 %Oceania / Australia34,700,2017,620,48020,970,49060.4 %175.2 %1.2 %WORLD TOTAL6,767,805,208360,985,4921,733,993,74125.6 %380.3 %100.0 %Copyright 2001 2009, Miniwatts Marketing Group3.2 Personal Privacy supply privacy does not exist on the Internet, but it is possible to minimize the risks. Most protection breaches are not done by technology, but by social engineering. In surety, plurality is the most raving mad factor of all, yet its the one thing thats often forgotten. A company may bentup firewalls, security packet, locks and fingerprint s keepners, but if they forget to establish and enforce a well designed security policy, they cave in forgotten the most important part.The easiest way to get a password from someone is just to conduct In more likely situations, an attacker may entirely call random people and profess they are a tech support person trying to fix a problem, and ask for secret information as part of the diagnostic.PretextingPretexting is the way of stealing information by providing just a subaltern bit of known information, and pretending to be someone youre not. Thats how identity thieves female genital organ call banks and, after a few tries, by simply providing canonical information somewhat the target, get all the data they want.PhishingPhishing is when you beget an email that looks like its from your bank, Paypal, online shop or another secure site you use, and asking you to login to confirm your information.It works in this way the criminals sets up a sacksite which looks like the genuine one and then sends phishing email to thousands of people, until they find somebody. Then when the person tries to login, his login information is intercepted by the bad guys and used to steal valuable information.MalwareMalicious programs, especially Key loggers crapper record what keys on the keyboard you are pressing when login to secure websites, to obtain your username and password. Often Key loggers are incorporated together with Trojan Viruses, programs which pretends to be utile bundle i.e. anticomputer virus or computer livelihood programs, to send stolen information to the criminals.Privacy threats on Social Networking SitesInternet users perplex to be very deliberate with the offstage information that they share on the web. Internet is becoming very popular way to relegate with people. Most people who give too much of private information about themselves arent aware about the risks they taking. There are people who can pretend to be your friends, gain information and use this information against you for blackmailing, psychological terror or for access to secure private pages.Conclusions and RecommendationsThe offenders are always inventing new methods to steal private information. We have to be aware about that, constantly refresh our knowledge about security and existing scam schemes and take all possible security measures by using trusted up to date security software. Never click a link in an email from unknown sender, never download from an untru sted source, and always type in the address of your financial sites to access them. Need to avoid to expose sensitive information online especially to the people we dont know very well.Also we have to remember that these attacks kindredly can be done offline. Most identity thefts are done by people simply going through rubbish bins and getting confidential data that was thrown out, like a bank statements, invoices, payslips ect. We cant do much to secure our personal data collected and stored by businesses and institutions which can as well be stolen or misused, just hope that they will take same hefty care as we do.3.3 CookiesWhat are Cookies?Cookies are a piece of text that a web server sends to web browser and are stored on a users hard disk. Main purpose of cookies is to help prepare customized web pages with our settings, interests, shop habits. It works in similar way to loyalty cards i.e. if we bought a book in Amazon internet shop, next time when we come back to Amazo n first it will offer similar books to our purchase.Cookies do not act maliciously on computer systems. They are text files that can be deleted at any time. Cookies cant be used to spread viruses. But because any personal information that we gave to a web site will be stored in a cookie some people can accept it as a threat to privacy and anonymity. To prevent misuse of information in the cookie if its stolen, information in the cookie is encrypted.How do They Work?When we visit a site that uses cookies, it can ask the browser to place one or more cookies on the visitors hard drive. It will watch to it our name and password, fill in form i.e. delivery addresses and basically what we do in the page. Next time, when we come back to the site the web browser sends back the cookies that belong to the site and then we will see personalized Web page with our details. Generally cookies help us to save a little bit of time. And we always have possibility to switch it off, however internet shopping web pages requires cookies to accesses them.How Could I retard/Manage Cookies?If we want to delete cookies we have to follow these stepsInternet Explorer Tools /Internet options/Security /Set security level to high or custom level/Cookies/Disable.Mozilla Firefox Tools/Options/Privacy/Cookies/Uncheck/Allow sites to set cookiesOther options are to use designated Cookie Managing software or to use advanced Antivirus programs which in addition have the option to control cookies, to block cookies that we dont want and save only the cookies that we want.Conclusions and RecommendationsI think that cookies are useful because we can get personalized information to read, do not spend time on security questions where it is necessary to enter a password, we dont have to spend time filling up same forms. Cookies do not collect information saved in the computer, it can contain only private data that we give to a website on our own free will. And if we dont want some cookies we are able to finish them from computer when we want. Some websites such as internet banking, e-shops and similar are impossible to use the right way without allowing the cookies.3.4 VirusesWhat is a Virus?Computer viruses are small malicious program codes, which are designed by using various techniques to hide themselves inside the executable files. Their aim is to replicate, spread between the computers using dismissible media or network and to interfere with computer operation slowing down computer, damaging or deleting data, distressing users and wasting time by showing annoying massages.Virus can be classified by several characteristic depend on the origin, on the way how they contaminate computer, on the place where they hide, on the damage that they can cause However, the computer virus is only one type of the malicious software or malware, but majority of computer users referring to all malicious programs (Trojan horses, worms, rootkits, spyware and so on) as the viruses.Type of Virus divers(prenominal) viruses can have many common characteristics and constantly appearing viruses with new specifications or combinations.Resident Virus. load the replication module into RAM memory when is executed, after this virus can infect all files that are accessed by user or direct system. If the antivirus program fails to spot the virus in the RAM it can infect all scanned files.FAT Virus. The File Allocation Table is a fundamental element in the system it works like an index, keeping information where is the files stores on the hard disk drive (HDD), which sectors are empty etc. If this vital index is repealed by virus, it makes impossible for computer to locate files. It withal can overwrite the files or entire directories corrupting them permanently. Sometimes the only solution to fix the computer affected by FAT virus is to format hard disk drive. Huge downside of this is that all information on HDD will be permanently erased.Virus of Direct-Action. Sometimes r eferred as Non-Resident Virus, they are unlike to resident virus, not loading in to RAM memory. They try to infect the programs and cause damage at the importee of execution of septic file. Most of viruses are Resident.Overwriting Virus. Most destructible type of virus, it overwrites the information in the infected files corrupting them permanently. If you dont have the back-up copy of your files its a bad news because the only way to get rid of this type of virus is to delete infected files.Boot Virus. Also known as System Virus. These viruses infect critical section with boot code on hard disk or another bootable media store that helps to start computer. When the computer starts up and the boot virus is launched, it can take complete control over infected computer and does everything it wants (steal private information, delete system files etc.) Clean bootable antivirus software required to cleanse the system. However depend on the virus this solution is not enough to clean bo otable sector.Macro Virus. Macros are micro-programs associated with a file that serve to automate joint complexes of operation. Macro virus expand from applications which use macro, word memorial (file with extension .doc),Excel (file with extension .xls) data of Access (file with extension .mdb), Power point (file with extension .pps). When we open a file containing a virus of this type of macros are automatically loaded causing the transmission. Most applications that use macros have, but many macro viruses easily circumvent this protection.Multipartite Virus.Very advanced type of virus that can perform multiple infections combining different techniques. These viruses are considered very dangerous, for its ability to combine many techniques of infection and libellous effects of their actions.File Virus. Infect programs or executable files (files with extension .ex and .com) when run the infected program, the virus becomes active, producing different effects. The majority of ex iting viruses are of this type.Logic Bombs.Neither virus is considered strictly as they do not reproduce. They are not separate programs, but hides in an unmarked segment within another program.They aim to destroy the data on a computer or cause other significant damage on it when certain conditions are met. While this does not happen, no one notices the presence of the logic bomb. Its action can be extremely destructive.Trojan Virus.Trojan arent considered virus, because they dont replicate themselves. Trojans are commonly hidden in the programs that appliers to be useful, but instead opens unauthorized access to users computer. Trojans also can be installed thorough web pages with executable subject (ActiveX control), email attachements.The effects of the Trojan can be very dangerous, allowing remote control from other computer (downloading, uploading, modifying or deleting files), installing key loggers and other malware, connecting computer to botnet (sending SPAM messages, per form network DDos attacks).How can computers become infected and what damage can cause?Viruses can infect computers throughInternet (email attachments, infected web pages, downloading infected files)Computer networksRemovable Media DrivesVirus SymptomsThe computer runs very slowReduces the available memoryThe computer shuts down or freeze frequentlyThere are programs which do not work or malfunctionThere is less free space on your hard diskComputer files fellStrange messages appear on the screen.Some file are renamed or extendedConclusions and RecommendationsNot everything that affects the approach pattern functioning of a computer is a virus. Is very important to have means to detect and disinfect viruses use an antivirus program and update daily (use default settings). Scan all removable disks before use it and scan computer periodically at least once a week.3.5 FirewallA firewall is a system that protects a computer or computer networks blocking unauthorized network access whil e permitting authorized communications. Firewall can be implemented in software, hardware or combination of both. Firewall is placed between saved and unprotected networks and acts as a gate to protect network or single computer, by inspecting network traffic, applying rules and allowing or denying connection.Firewall can use different techniques to do soPacket filter (inspects every information packet passing through the network)Application gateway (applies rules to specific applications such as FTP, Telnet servers.)Circuit-level gateway(applies rules to TCP or UDP connections, when are made there is no further inspection.)Proxy Server (checks all network activity passing through network.)Conclusions and RecommendationsEveryone should use a firewall against network intruders to protect computer and private information. Most of the antivirus programs and operating systems have integrated firewall software. Minor disadvantage of firewall, it can slow down Internet traffic and can be tricky for not advanced users to set-up it properly (not blocking traffic for useful programs).3.6 Filtering SoftwareThe filtering software is designed to control what contents are allowed to be accessed on Internet. Often its installed on the computers of educational, government organizations, private companies. Filtering software is commonly used by parents to prevent their children from having access to certain web places unsuitable for minors. It also can be used as the mean of censorship in some countries.How does it work?Nowadays on the market there are many options of filtering software with various techniques and content filtering to prevent from harmful online material.The filtering programs works like thatAddress blocking websites containing such contentControlling access times evaluate default address listPossible to establish your own list of addressesAssigning different profiles or different days and times(work, leisure, etc.)Controlling which services can be used at an y time and for each user (mail, chat, etc.)Advantages and disadvantages of Filtering Software.Advantage of filtering software is that does not allow minor to access pages of violence, pornography, racism. In a work place it prevents employees of wasting their time and resources for personal proposes (chatting online, social network pages, etc.).Main disadvantage is over-zealous filtering. Par example, in some filters attempts to block the word sex would block words such as Essex and Sussex and etc.Internet censorship in some countries limits freedom of speech for different reasons and that is not a good thing.Some Filtering Software examples.Netnanny, Mobicop, DansGuard, CleanFeed,Web Sence3.7 EncryptionIts a method to convert the characters of a text that can not be understood unless it is read with the corresponding key. Used to protect the integrity of secret information if it is intercepted. Encryption is also used when data is sent via secure intranet (VSPN). Encryption is used for electronic commerce to protect credit card information.How does it work?The keys are the heart of the encryption. The keys are complex numerical formulas (algorithms) used to encrypt and decrypt information. If someone encrypts a message, only one with the appropriate key can decrypt the message. Algorithms are used to perform a hash function. This process produces a unique MD5 for this message. The MD5 is encrypted with the senders private key resulting in a fingerprint.Conclusions and RecommendationsEveryone who has and important or secret information (banks, hospitals, government, universities, e-commerce sites) they have to keep this information in secret from fraudsters.In recent years, it was few cases when portable computers of government organizations with secret information were lost or stolen. Laptops (portable computers) became more and more popular and most of us have some kind of personal information on our computers. So it is very important to have that informatio n encrypted, in case of losing it.3.8 Digital SignaturesA set of data in electronic form attached to or associated with others which are used to identify the signatory, which allows you to check the provenance, authenticity and integrity of messages ex removed over the Internet.There are two types of electronic signatures basic and advanced. The basic does not guarantee the identity of the signer, neither the veracity of information received since the sending does not attend that the issuer has made it known to us, while the advanced signature identifies the signer and detect any subsequent change of data that could occur.The digital signature is a specific techology signature and created by the so-called System unsymmetric key cryptography and it works like that The holder has two keys public key and private key ,private key is only known to the issuer and is associated to the information you send .while the person who received only know their public key .Two keys are needed and complement each other to get the encrypted message appears as the original .When we want sent private information the information is encrypted by system which use mathematical operations so the information becames encripted ( strange numbers and letters) so the message only can be deciphered by the people who know the instruction and have a public keyConclusions and RecommendationsIt should be used by the organitations which have an important or secret information as banks, universities, hospitals, etc., these organitations should use digital signatures in order to avoid the risk of fraud .they have to be sure about the authenticy of the sender.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment