Wednesday, June 5, 2019
Security And Confidentiality On The Internet Information Technology Essay
Security And Confidentiality On The profits Information Technology EssayOn 9th of November 2009 The earnings t from each oneer requested 3000 word report related to the FETAC ne devilrk module. This report was to be submitted by 14th of January2010. The topic of the report is Security and Confidentiality on the Internet with reference to cookies, computer vir handlings, encryption, digital signatures, firewalls, filtering softw atomic number 18 and personal c at a timealing.Recommendations were requested.2. Method of ProcedureI found most of the instruction on the internet. In order to obtain the pertinent randomness, I utilize Google Search Engine with makewords in English Internet Security, Privacy on the Internet, Malwargon, Computer computer viruses, Cookies, Firewalls, Filtering Softwargon, Encryption, Digital Signatures, Computer Protection, Threats on the Internet.Keywords in Lithuanian Privatumas Internete, Saugumas Intenete, Kompiuteriniai Virusai, Ugniasien-s, Fil travimo Prgramin- ranga, ifravimas, Skaitmeninis Paraas, Pavojai Internete.Also, some printed sources of development such(prenominal) as books and a periodical press in English and Lithaunian were adopted.Several pages for each topic were checked to actualise that the information was correct and fully understud. That hepled me to make conclusions and to give recommendations.3. Findings3.1 Importance of SubjectWith the progress of affordable technology more(prenominal) than of us store more and more of our life in bits and bytes. By the end of 2009 there was more than 1,5 billion Internet users in 260 countries on e really continent. The Internet is not a angiotensin transforming enzyme vane, but a vast array of connected net plant life situated all over the world, easily accessible by personal electronic computers, notebooks, netbooks, smartph atomic number 53s, PDAs, game consoles, advanced TVs, homogeneous photo cameras or even kitchen appliances as hi-tech fridges and mic rowaves in a variety of ways.Today, the Internet uses gateways, routers, broadband connections, Wi-Fi separates and Internet service providers (ISPs) to make itself functional at all times. Individuals and organizations worldwide toilette reach close any point on the network without regard to national or geographic boundaries or time of day, there is some exceptions regarding to Internet censoring.Nowadays, it become hard to find the business without any connection to the Internet, because of its excellent source of marketing, convenience, high speed, low cost, and almost unlimited possibilities. Institutions of education, hospitals, banks, institutions of public service, providers of mobile service and internet, utility companies and of course our government has our personal information on their computers and they ar connected to the Internet.With the birth of Social Networking Sites such as Bebo, Facebook, MySace, Twitter ect., we sharing our pictures, personal details, our thoughts and lives with friends and if we are not careful with everybody on the Internet. Just Facebook on its take has more than 400 million users.even more, with new generation of Internet- Cloud Computing, individuals and business users are storing less info on their hard drives and more in the cloud- remote servers, operated by giants like Google and Amazon.However, epoch using the Internet, along with the convenience and speed of access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or utilise and that the computer brasss will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a commit cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They raft steal or tamper with information without touching a piece of paper or a photocopier . They so-and-so create new electronic files, menstruate their own programs, and even hide all evidence of their unauthorized activity.So if we are closing and locking the door in our house to prevent criminals sack up access to our valuables, we must draw off care of our house and life in the digital world and use all possible security and privacy on the Internet measures against the threats.WORLD INTERNET USAGE AND POPULATION STATISTICSWorld RegionsPopulation( 2009 Est.)Internet UsersDec.31,2000Internet UsersLatest DataPenetration(%Population)Growth2000-2009Users %of TableAfrica991,002,3424,514,40067,371,7006.8 %1,392.4%3.9 %Asia3,808,070,503114,304,000738,257,23019.4 %545.9 %42.6 %atomic number 63803,850,858105,096,093418,029,79652.0 %297.8 %24.1 %Middle East202,687,0053,284,80057,425,04628.3 %1,648.2%3.3 %North America340,831,831108,096,800252,908,00074.2 %134.0 %14.6 %Latin America/Caribbean586,662,46818,068,919179,031,47930.5 %890.8 %10.3 %Oceania / Australia34,700,2017,62 0,48020,970,49060.4 %175.2 %1.2 %WORLD TOTAL6,767,805,208360,985,4921,733,993,74125.6 %380.3 %100.0 %Copyright 2001 2009, Miniwatts Marketing Group3.2 Personal PrivacyTotal privacy does not exist on the Internet, but it is possible to minimize the risks. Most security breaches are not done by technology, but by loving engineering. In security, people is the most risky factor of all, yet its the one thing thats often forgotten. A company may setup firewalls, security software system, locks and reproduce s sack upners, but if they forget to establish and enforce a well designed security policy, they buzz off forgotten the most important part.The easiest way to get a password from someone is just to ask In more likely situations, an attacker may simply call random people and pretend they are a tech support person trying to fix a problem, and ask for confidential information as part of the diagnostic.PretextingPretexting is the way of stealing information by providing just a littl e bit of known information, and pretending to be someone youre not. Thats how identity thieves raise call banks and, after a hardly a(prenominal) tries, by simply providing basic information about the target, get all the data they want.PhishingPhishing is when you receive an email that looks like its from your bank, Paypal, online shop or another determine site you use, and asking you to login to confirm your information.It works in this way the criminals sets up a website which looks like the genuine one and then ships phishing email to thousands of people, until they find somebody. accordingly when the person tries to login, his login information is intercepted by the bad guys and used to steal valuable information.MalwareMalicious programs, especially Key loggers can record what keys on the keyboard you are pressure when login to secure websites, to obtain your user spend a penny and password. Often Key loggers are incorporated together with Trojan Viruses, programs which p retends to be useful software i.e. antivirus or computer maintenance programs, to send stolen information to the criminals.Privacy threats on Social Networking SitesInternet users pay back to be very careful with the hidden information that they share on the web. Internet is congruous very popular way to communicate with people. Most people who give too much of private information about themselves arent aware about the risks they taking. in that location are people who can pretend to be your friends, gain information and use this information against you for blackmailing, psychological terror or for access to secure private pages.Conclusions and RecommendationsThe offenders are eer inventing new methods to steal private information. We have to be aware about that, constantly refresh our knowledge about security and living scam schemes and take all possible security measures by using trusted up to date security software. Never click a connexion in an email from unknown sender, never download from an untrusted source, and always type in the address of your financial sites to access them. Need to avoid to disclose responsive information online especially to the people we dont know very well.Also we have to remember that these attacks as well as can be done offline. Most identity thefts are done by people simply going through rubbish bins and getting confidential data that was thrown out, like a bank statements, invoices, payslips ect. We incline do much to secure our personal data collected and stored by businesses and institutions which can also be stolen or misused, just hope that they will take same good care as we do.3.3 CookiesWhat are Cookies?Cookies are a piece of text that a web server sends to web browser and are stored on a users hard disk. Main purpose of cookies is to help prepare customized web pages with our settings, interests, browsing habits. It works in similar way to loyalty cards i.e. if we bought a book in Amazon internet shop, next time when we come back to Amazon first it will offer similar books to our purchase.Cookies do not act venomedly on computer systems. They are text files that can be deleted at any time. Cookies cant be used to open viruses. But because any personal information that we gave to a web site will be stored in a cookie some people can accept it as a threat to privacy and anonymity. To prevent misuse of information in the cookie if its stolen, information in the cookie is encrypted.How do They contribute?When we visit a site that uses cookies, it can ask the browser to place one or more cookies on the visitors hard drive. It will contain our name and password, fill in form i.e. delivery addresses and basically what we do in the page. Next time, when we come back to the site the web browser sends back the cookies that break down to the site and then we will see personalized Web page with our details. Generally cookies help us to save a little bit of time. And we always have possibility to switch it off, however internet shopping web pages requires cookies to accesses them.How Could I Prevent/Manage Cookies?If we want to delete cookies we have to follow these moveInternet Explorer Tools /Internet options/Security /Set security level to high or custom level/Cookies/Disable.Mozilla Firefox Tools/Options/Privacy/Cookies/Uncheck/Allow sites to set cookies opposite options are to use designated Cookie Managing software or to use advanced Antivirus programs which also have the option to control cookies, to block cookies that we dont want and save yet the cookies that we want.Conclusions and RecommendationsI think that cookies are useful because we can get personalized information to read, do not spend time on security questions where it is undeniable to enter a password, we dont have to spend time filling up same forms. Cookies do not collect information saved in the computer, it can contain only private data that we give to a website on our own free will. And if we dont want some cookies we are able to remove them from computer when we want. Some websites such as internet banking, e-shops and similar are impossible to use properly without allowing the cookies.3.4 VirusesWhat is a Virus?Computer viruses are small catty program codes, which are designed by using various techniques to hide themselves inside the executable files. Their aim is to replicate, spread between the computers using removable media or network and to interfere with computer operation slowing down computer, damaging or deleting data, disturbing users and wasting time by showing annoying massages.Virus can be classified by several characteristic wager on the origin, on the way how they infect computer, on the place where they hide, on the constipation that they can cause However, the computer virus is only one type of the malicious software or malware, but majority of computer users referring to all malicious programs (Trojan horses, worms, rootkits, spyware etc.) as the v iruses.Type of VirusDifferent viruses can have many common characteristics and constantly appearing viruses with new specifications or combinations.Resident Virus. Loads the homecoming module into RAM memory when is executed, after this virus can infect all files that are accessed by user or operating system. If the antivirus program fails to spot the virus in the RAM it can infect all scanned files.FAT Virus. The File Allocation Table is a fundamental element in the system it works like an index, keeping information where is the files stores on the hard disk drive (HDD), which sectors are empty etc. If this vital index is destroyed by virus, it makes impossible for computer to locate files. It also can overwrite the files or entire directories corrupting them permanently. sometimes the only solution to fix the computer bear on by FAT virus is to format hard disk drive. Huge downside of this is that all information on HDD will be permanently erased.Virus of Direct-Action. Sometime s referred as Non-Resident Virus, they are unlike to resident virus, not loading in to RAM memory. They try to infect the programs and cause damage at the moment of work of septic file. Most of viruses are Resident.Overwriting Virus. Most destructible type of virus, it overwrites the information in the infected files corrupting them permanently. If you dont have the back-up copy of your files its a bad password because the only way to get rid of this type of virus is to delete infected files.Boot Virus. Also known as System Virus. These viruses infect tiny section with boot code on hard disk or another bootable media storage that helps to start computer. When the computer starts up and the boot virus is launched, it can take complete control over infected computer and does everything it wants (steal private information, delete system files etc.) Clean bootable antivirus software required to disinfect the system. However depend on the virus this solution is not enough to clean boo table sector.Macro Virus. Macros are micro-programs associated with a file that serve to automate joint complexes of operation. Macro virus expand from applications which use macro, word document (file with extension .doc),Excel (file with extension .xls) data of Access (file with extension .mdb), Power point (file with extension .pps). When we open a file containing a virus of this type of macros are automatically loaded causing the infection. Most applications that use macros have, but many macro viruses easily circumvent this protection. many-sided Virus.Very advanced type of virus that can perform multiple infections combining different techniques. These viruses are considered very dangerous, for its ability to combine many techniques of infection and offensive effects of their actions.File Virus. Infect programs or executable files (files with extension .ex and .com) when run the infected program, the virus becomes active, producing different effects. The majority of exiting v iruses are of this type.Logic Bombs.Neither virus is considered strictly as they do not reproduce. They are not separate programs, but hides in an unmarked segment within another program.They aim to destroy the data on a computer or cause other significant damage on it when certain conditions are met. While this does not happen, no one notices the presence of the logic bomb. Its action can be extremely destructive.Trojan Virus.Trojan arent considered virus, because they dont replicate themselves. Trojans are commonly hidden in the programs that appliers to be useful, but instead opens unauthorized access to users computer. Trojans also can be installed thorough web pages with executable content (ActiveX control), email attachements.The effects of the Trojan can be very dangerous, allowing remote control from other computer (downloading, uploading, modifying or deleting files), installing key loggers and other malware, connecting computer to botnet (sending SPAM messages, perform n etwork DDos attacks).How can computers become infected and what damage can cause?Viruses can infect computers throughInternet (email attachments, infected web pages, downloading infected files)Computer networksRemovable Media DrivesVirus SymptomsThe computer runs very slowReduces the available memoryThe computer shuts down or freeze frequentlyThere are programs which do not work or goThere is less free space on your hard diskComputer files disappearStrange messages appear on the screen.Some file are renamed or extendedConclusions and RecommendationsNot everything that affects the normal functioning of a computer is a virus. Is very important to have means to detect and disinfect viruses use an antivirus program and update daily (use default settings). Scan all removable disks before use it and scan computer periodically at least once a week.3.5 FirewallA firewall is a system that protects a computer or computer networks block unauthorized network access while permitting authorized communications. Firewall can be implemented in software, hardware or combination of both. Firewall is placed between protected and unprotected networks and acts as a gate to protect network or single computer, by inspecting network traffic, applying rules and allowing or denying connection.Firewall can use different techniques to do soPacket filter (inspects every information software package passing through the network)Application gateway (applies rules to specific applications such as FTP, Telnet servers.)Circuit-level gateway(applies rules to TCP or UDP connections, when are made there is no further inspection.) substitute Server (checks all network activity passing through network.)Conclusions and RecommendationsEveryone should use a firewall against network intruders to protect computer and private information. Most of the antivirus programs and operating systems have integrated firewall software. Minor disadvantage of firewall, it can slow down Internet traffic and can be tr icky for not advanced users to set-up it properly (not blocking traffic for useful programs).3.6 Filtering SoftwareThe filtering software is designed to control what contents are allowed to be accessed on Internet. Often its installed on the computers of educational, government organizations, private companies. Filtering software is commonly used by parents to prevent their children from having access to certain web places unsuitable for minors. It also can be used as the mean of censorship in some countries.How does it work?Nowadays on the market there are many options of filtering software with various techniques and content filtering to prevent from harmful online material.The filtering programs works like thatAddress blocking websites containing such contentControlling access timesAccepting default address listPossible to establish your own list of addressesAssigning different profiles or different days and times(work, leisure, etc.)Controlling which services can be used at any time and for each user (mail, chat, etc.)Advantages and disadvantages of Filtering Software.Advantage of filtering software is that does not allow minor to access pages of violence, pornography, racism. In a work place it prevents employees of wasting their time and resources for personal proposes (chatting online, mixer network pages, etc.).Main disadvantage is over-zealous filtering. Par example, in some filters attempts to block the word sex would block words such as Essex and Sussex and etc.Internet censorship in some countries limits freedom of speech for different reasons and that is not a good thing.Some Filtering Software examples.Netnanny, Mobicop, DansGuard, CleanFeed,Web Sence3.7 EncryptionIts a method to convert the characters of a text that can not be understood unless it is read with the corresponding key. Used to protect the integrity of cloak-and-dagger information if it is intercepted. Encryption is also used when data is sent via secure intranet (VSPN). Encryptio n is used for electronic commerce to protect credit card information.How does it work?The keys are the heart of the encryption. The keys are complex mathematical formulas (algorithms) used to encrypt and decrypt information. If someone encrypts a message, only one with the appropriate key can decrypt the message. Algorithms are used to perform a hash function. This process produces a unique MD5 for this message. The MD5 is encrypted with the senders private key resulting in a fingerprint.Conclusions and RecommendationsEveryone who has and important or secret information (banks, hospitals, government, universities, e-commerce sites) they have to keep this information in secret from fraudsters.In recent years, it was few cases when portable computers of government organizations with secret information were lost or stolen. Laptops (portable computers) became more and more popular and most of us have some kind of personal information on our computers. So it is very important to have tha t information encrypted, in case of losing it.3.8 Digital SignaturesA set of data in electronic form attached to or associated with others which are used to identify the signatory, which allows you to check the provenance, genuineness and integrity of messages exchanged over the Internet.There are two types of electronic signatures basic and advanced. The basic does not guarantee the identity of the signer, neither the veracity of information received since the sending does not ensure that the issuer has made it known to us, while the advanced signature identifies the signer and detect any subsequent change of data that could occur.The digital signature is a specific techology signature and created by the so-called System Asymmetric key cryptography and it works like that The holder has two keys public key and private key ,private key is only known to the issuer and is associated to the information you send .while the person who received only know their public key .Two keys are ne eded and complement each other to get the encrypted message appears as the original .When we want sent private information the information is encrypted by system which use mathematical operations so the information becames encripted ( strange numbers and letters) so the message only can be decode by the people who know the instruction and have a public keyConclusions and RecommendationsIt should be used by the organitations which have an important or secret information as banks, universities, hospitals, etc., these organitations should use digital signatures in order to avoid the risk of fraud .they have to be sure about the authenticy of the sender.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.