0% found this document useful (0 votes)
29 views20 pages

Internet LEC 8-9

The document discusses internet technology and security. It covers topics like why network and internet security is important, examples of unauthorized access and computer sabotage, and different types of security measures like network layer security, internet protocol security, firewalls, and creating strong passwords. It also discusses keeping other information like credit cards and mobile devices protected.

Uploaded by

leeehsu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views20 pages

Internet LEC 8-9

The document discusses internet technology and security. It covers topics like why network and internet security is important, examples of unauthorized access and computer sabotage, and different types of security measures like network layer security, internet protocol security, firewalls, and creating strong passwords. It also discusses keeping other information like credit cards and mobile devices protected.

Uploaded by

leeehsu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Internet Technology

Lecture 8 & 9
Learning Objectives
• Explain why computer users should be concerned about
network and Internet security.
• List several examples of unauthorized access, unauthorized
use, and computer sabotage.

2
Introduction

• Internet security is a tree branch of computer security


specifically related to the Internet, often involving browser
security but also network security on a more general level as it
applies to other applications or operating systems on a whole.
Its objective is to establish rules and measures to use against
attacks over the Internet.

3
Why Be Concerned about Network and Internet
Security?
• Security concerns related to computer networks and the
Internet abound
• Computer crime (cybercrime): Any illegal act involving a
computer, including:
– Breaking through the security of a network
– Theft of financial assets
– Manipulating data for personal advantage
– Act of sabotage (releasing a computer virus, shutting down
a Web server)
• All computer users should be aware of security issues and the
precautions that can be taken
4
Types of security
•Network layer security: TCP/IP (Transmission Control Protocol and
Internet Protocol) can be made secure with the help of cryptographic methods
and protocols. These protocols include Secure Sockets Layer (SSL), succeeded
by Transport Layer Security (TLS) for web traffic, Pretty Good Privacy (PGP)
for email, and IPsec for the network layer security.

•Internet Protocol Security (IPsec) is a set of security extensions


developed by the Internet Task force IETF, and it provides security and
authentication at the IP layer by transforming data using encryption

5
Types of security
•Security token: Some online sites offer
customers the ability to use a six-digit code
which randomly changes every 30–60 seconds
on a Security token. The keys on the security
token have built in mathematical computations
and manipulate numbers based on the current
time built into the device. 6
Types of security
•Electronic mail security (E-mail): Email messages are composed,
delivered, and stored in a multiple step process, which starts with the
message's composition. When the user finishes composing the message and
sends it, the message is transformed into a standard format. So,The Email
messages can be protected by using cryptography in various ways, such as the
following:

• Signing an email message to ensure its integrity and confirm the identity of
its sender.
• Encrypting the body of an email message to ensure its confidentiality.
• Encrypting the communications between mail servers to protect the
confidentiality of both message body and message header .
7
Types of security
Firewalls
• A computer firewall controls access between networks.
It generally consists of gateways and filters which vary
from one firewall to another. Firewalls also screen
network traffic and are able to block traffic that is
dangerous.

8
Create Strong, Secure Passwords

• There are several ways to keep remarkably strong passwords, but every strategy has a
point of weakness and a level of inconvenience that you're going to have to accept.
We're going to go over a method that we feel is all-around the best way to go, but
include a few variations along the way so you can decide what suits you best.

• Pick a phrase you can remember with a number in it, like "A bird in the hand is
worth two in the bush."
• Change that number (in this case, "two") to its numerical equivalent: A bird in the
hand is worth 2 in the bush
• Condense the phrase by only using the first letter of each word: Abithiw2itb
• Add some special characters you can remember: #Abithiw2itb!

9
Keep Other Information Protected

• The passwords are not the only kind of important


information users don't want floating around the
internet, and chances are they have a few gadgets
you wouldn't want to fall into the wrong hands.

10
Keep Other Information Protected

• The protection of Credit Cards


• If users shop online, their Credit Card number has been entered
into at least one web site. While this is unavoidable, and just
about as safe as using Credit Card out in the real world, the fact
still remains that the number could be intercepted and used to
make unauthorized purchases. One easy way around that problem
is using temporary credit card numbers. Also, user shall use a
trustful a website having https protocol.

11
Keep other Information Protected

•How to keep Mobile Technology Secure


• There really isn't any assurance the technology will not be stolen someday.
Fortunately, there are a number of tools to keep laptops and mobile phones
secure from tampering, or at least initiate a remote data wipe in the event of a
breach. These tools can help to track and (potentially) recover the stolen laptop
or smartphone. For example, a solution offered from Apple for iOS device is
to find iPhone, iPod or iPad for free. This assists to remotely locate the device,
send a message, and wipe the personal data.

12
Computer Sabotage
• Computer sabotage: Acts of malicious destruction to a
computer or computer resource
• Bot: A PC that is controlled by a computer criminal
• Botnet: A group of bots that can work together in a controlled
fashion
– Used by botherders to send spam, launch Internet attacks
and malware, etc.
• Malware: Any type of malicious software
– Includes viruses, worms, Trojan horses, etc.
– Increasingly used for computer crimes and to take control
of individuals’ PCs for botnet activities
– Can infect mobile phones and mobile devices (some 13

preinstalled on mobile devices)


Computer Sabotage
• Computer virus: Malicious program embedded in a file that is
designed to cause harm to the computer system
– Often embedded in downloaded programs and e-mail
messages
• Computer worm: Malicious program designed to spread
rapidly by sending copies of itself to other computers
– Typically sent via e-mail
• Trojan horse: Malicious program that masquerades as
something else
– Usually appear to be a game or other program
– Cannot replicate themselves; must be downloaded and
installed 14
Computer Sabotage
-

15
Computer Sabotage
• Denial of service (DoS) attack: Act of sabotage that floods a
Web server with so much activity that it is unable to function
– Distributed DoS attack: Uses multiple computers

16
Computer Sabotage
• Data or program alteration: When a hacker breaches a
computer system in order to delete or change data
– Students changing grades
– Employees performing vengeful acts, such as deleting or
changing corporate data
– Web site defacement (cybervandalism): Changing content
of a Web site
• Often used to make political statements

17
Interesting Fact
The most amazing aspect of Internet is about its birth, its evolution and its history.

• In 1960 the US Defense created the Internet.

• The term World Wide Web was coined by Tim Berners-Lee in the year 1990.

• The first computer hard drive was capable of storing only 5 MB data.

• A recent survey conducted by Google reveals that the average view time for a single webpage is about
41 seconds.

Fascinating Facts

• Radio took 38 years to have a million users, where as Television reached the same figure in 13 years.
But the Internet achieved this staggering number in only 5 years time.

• Cyber crime has become more prevalent nowadays and each crime is committed in every 10 seconds.

• About 3 Million TB of data is created and stored each year and the number is rising.

• Only 30% of Internet users are women.


18
Interesting Facts
• Facts for Children

A child nowadays seems to know more about computers than their parents.
However, there are certain remarkable facts that they need to know about
computers and Internet.

• Douglas Engelbart created the first mouse in the year 1968.

• The first web browser was named Mosaic.

• We can access more than a billion websites today through Internet.

• While using the Internet we blink 10 times a minute where we normally blink
20 times in the same time.

19
The End

Wish you all the best

20

You might also like