Internet LEC 8-9
Internet LEC 8-9
Lecture 8 & 9
Learning Objectives
• Explain why computer users should be concerned about
network and Internet security.
• List several examples of unauthorized access, unauthorized
use, and computer sabotage.
2
Introduction
3
Why Be Concerned about Network and Internet
Security?
• Security concerns related to computer networks and the
Internet abound
• Computer crime (cybercrime): Any illegal act involving a
computer, including:
– Breaking through the security of a network
– Theft of financial assets
– Manipulating data for personal advantage
– Act of sabotage (releasing a computer virus, shutting down
a Web server)
• All computer users should be aware of security issues and the
precautions that can be taken
4
Types of security
•Network layer security: TCP/IP (Transmission Control Protocol and
Internet Protocol) can be made secure with the help of cryptographic methods
and protocols. These protocols include Secure Sockets Layer (SSL), succeeded
by Transport Layer Security (TLS) for web traffic, Pretty Good Privacy (PGP)
for email, and IPsec for the network layer security.
5
Types of security
•Security token: Some online sites offer
customers the ability to use a six-digit code
which randomly changes every 30–60 seconds
on a Security token. The keys on the security
token have built in mathematical computations
and manipulate numbers based on the current
time built into the device. 6
Types of security
•Electronic mail security (E-mail): Email messages are composed,
delivered, and stored in a multiple step process, which starts with the
message's composition. When the user finishes composing the message and
sends it, the message is transformed into a standard format. So,The Email
messages can be protected by using cryptography in various ways, such as the
following:
• Signing an email message to ensure its integrity and confirm the identity of
its sender.
• Encrypting the body of an email message to ensure its confidentiality.
• Encrypting the communications between mail servers to protect the
confidentiality of both message body and message header .
7
Types of security
Firewalls
• A computer firewall controls access between networks.
It generally consists of gateways and filters which vary
from one firewall to another. Firewalls also screen
network traffic and are able to block traffic that is
dangerous.
8
Create Strong, Secure Passwords
• There are several ways to keep remarkably strong passwords, but every strategy has a
point of weakness and a level of inconvenience that you're going to have to accept.
We're going to go over a method that we feel is all-around the best way to go, but
include a few variations along the way so you can decide what suits you best.
• Pick a phrase you can remember with a number in it, like "A bird in the hand is
worth two in the bush."
• Change that number (in this case, "two") to its numerical equivalent: A bird in the
hand is worth 2 in the bush
• Condense the phrase by only using the first letter of each word: Abithiw2itb
• Add some special characters you can remember: #Abithiw2itb!
9
Keep Other Information Protected
10
Keep Other Information Protected
11
Keep other Information Protected
12
Computer Sabotage
• Computer sabotage: Acts of malicious destruction to a
computer or computer resource
• Bot: A PC that is controlled by a computer criminal
• Botnet: A group of bots that can work together in a controlled
fashion
– Used by botherders to send spam, launch Internet attacks
and malware, etc.
• Malware: Any type of malicious software
– Includes viruses, worms, Trojan horses, etc.
– Increasingly used for computer crimes and to take control
of individuals’ PCs for botnet activities
– Can infect mobile phones and mobile devices (some 13
15
Computer Sabotage
• Denial of service (DoS) attack: Act of sabotage that floods a
Web server with so much activity that it is unable to function
– Distributed DoS attack: Uses multiple computers
16
Computer Sabotage
• Data or program alteration: When a hacker breaches a
computer system in order to delete or change data
– Students changing grades
– Employees performing vengeful acts, such as deleting or
changing corporate data
– Web site defacement (cybervandalism): Changing content
of a Web site
• Often used to make political statements
17
Interesting Fact
The most amazing aspect of Internet is about its birth, its evolution and its history.
• The term World Wide Web was coined by Tim Berners-Lee in the year 1990.
• The first computer hard drive was capable of storing only 5 MB data.
• A recent survey conducted by Google reveals that the average view time for a single webpage is about
41 seconds.
Fascinating Facts
• Radio took 38 years to have a million users, where as Television reached the same figure in 13 years.
But the Internet achieved this staggering number in only 5 years time.
• Cyber crime has become more prevalent nowadays and each crime is committed in every 10 seconds.
• About 3 Million TB of data is created and stored each year and the number is rising.
A child nowadays seems to know more about computers than their parents.
However, there are certain remarkable facts that they need to know about
computers and Internet.
• While using the Internet we blink 10 times a minute where we normally blink
20 times in the same time.
19
The End
20