Types of IT Audits: Information Security (Module-1)
Types of IT Audits: Information Security (Module-1)
INFORMATION SECURITY(MODULE-1)
1.computer Auditing-System Access Control
2.Data Access Control
3.Security Administration
4.System Design
Computer Auditing: Computer auditing is a systematic and logical process that follows a risk based
approach to determine whether the information systems of an entity, including its detailed
information technology processes, controls and activities, will achieve its IT objectives and will
thereby ultimately enable the organisation to achieve their organisational goals. Although computer
auditing is already a specialist field within auditing, there is a need for even further specialisation in
areas such as computer assisted audit techniques (CAATs), IT governance, risk and information
systems control, information security, information system continuity, disaster recovery, etc. The
primary functions of an IT audit are to evaluate the systems that are in place to guard an
organization's information.
Types of IT audits
Various authorities have created differing taxonomies to distinguish the various types of IT audits.
Goodman & Lawless state that there are three specific systematic approaches to carry out an IT
audit
• Technological innovation process audit. This audit constructs a risk profile for existing and new
projects. The audit will assess the length and depth of the company's experience in its chosen
technologies, as well as its presence in relevant markets, the organization of each project, and the
structure of the portion of the industry that deals with this project or product, organization and
industry structure.
• Innovative comparison audit. This audit is an analysis of the innovative abilities of the company
being audited, in comparison to its competitors. This requires examination of company's research
and development facilities, as well as its track record in actually producing new products.
• Technological position audit: This audit reviews the technologies that the business currently has
and that it needs to add. Technologies are characterized as being either "base", "key", "pacing" or
Principles of an IT audit
System Design
Systems design is the process of defining the architecture, product design, modules, interfaces, and
data for a system to satisfy specified requirements. Systems design could be seen as the application
of systems theory to product development. There is some overlap with the disciplines of systems
analysis, systems architecture and systems engineering
Architectural design
The architectural design of a system emphasizes the design of the system architecture that
describes the structure, behaviour and more views of that system and analysis.
Logical design
The logical design of a system pertains to an abstract representation of the data flows, inputs and
outputs of the system. This is often conducted via modelling, using an over-abstract (and sometimes
graphical) model of the actual system. In the context of systems, designs are included. Logical
design includes entity-relationship diagrams(ER diagrams).
Physical design
The physical design relates to the actual input and output processes of the system. This is explained
in terms of how data is input into a system, how it is verified/authenticated, how it is processed, and
how it is displayed. In physical design, the following requirements about the system are decided.
Rapid application development (RAD)
Rapid application development (RAD) is a methodology in which a system designer produces
prototypes for an end-user. The end-user reviews the prototype, and offers feedback on its
suitability. This process is repeated until the end-user is satisfied with the final system.
5
MODULE-2
Hardware Security Control-The Total System Needs Security
a.Levels Of Hardware Controls
b.Operating System Control
c.Access Control
d.General Purpose Operating System Security
e.Sources of Additional Information
1. Hardware security is vulnerability protection that comes in the form of a physical device rather
than software that is installed on the hardware of a computer system. Hardware security can pertain
to a device used to scan a system or monitor network traffic.
2. The term hardware security also refers to the protection of physical systems from harm.
equipment destruction attacks, for example, focus on computing devices and networked non-
computing devices such as the ever-increasing number of connected devices in M2M or IoT
(Internet of Things) environments. These environments are bringing connectivity and
communications to large numbers of hardware devices that must be protected through either
hardware- or software-based security.
3.To assess the security of a hardware device, it’s necessary to consider vulnerabilities existing
from its manufacture as well as other potential sources such as running code and the device’s data
I/O on a network. Although any device should be protected if it connects even indirectly to the
internet, the stringency of that protection should be in accordance with need.
Security Controls
Computer security is often divided into three distinct master categories, commonly referred to as
controls:
• Physical
• Technical
• Administrative
• Regulatory Controls
Physical Controls
Physical control is the implementation of security measures in a defined structure used to deter or
prevent unauthorized access to sensitive material. Examples of physical controls are:
• Closed-circuit surveillance cameras
• Motion or thermal alarm systems
• Security guards
• Picture IDs
• Biometrics
Technical Controls
Technical controls use technology as a basis for controlling the access and usage of sensitive data
throughout a physical structure and over a network. Technical controls are far-reaching in scope and
encompass such technologies as:
• Encryption
• Smart cards
• Network authentication
• Access control lists (ACLs)
• File integrity auditing software
6
Administrative Controls
Administrative controls define the human factors of security. It involves all levels of personnel
within an organization and determines which users have access to what resources and information
by such means as:
• Training and awareness
• Disaster preparedness and recovery plans
• Personnel recruitment and separation strategies
• Personnel registration and accounting
Preventive Controls:
Preventive security controls refer to the countermeasure limiting cyber events from happening and
stopping the incident before they occur. Antivirus, software firewalls, blocking malicious traffic
communication, blocking unauthorised accesses are some examples of preventive controls.
Detective Controls:
These controls refer to information security countermeasures that identify the cyber events and
notify the concerned authorities about the real-time event or suspicious action in progress.
Corrective Controls:
These information security controls are those countermeasures that every organisation must have in
advance. This control refers to the actions and plans that help reduce the impact and damage of the
data breach or any cyber incident.
Program Threats
Operating system's processes and kernel do the designated task as instructed. If a user program
made these process do malicious tasks, then it is known as Program Threats.
• Trojan Horse − Such program traps user login credentials and stores them to send to malicious
user who can later on login to computer and can access system resources.
• Trap Door − If a program which is designed to work as required, have a security hole in its code
and perform illegal action without knowledge of user then it is called to have a trap door.
• Logic Bomb − Logic bomb is a situation when a program misbehaves only when certain
conditions met otherwise it works as a genuine program. It is harder to detect.
• Virus − Virus as name suggest can replicate themselves on computer system. They are highly
dangerous and can modify/delete user files, crash systems.
System Threats
System threats refers to misuse of system services and network connections to put user in trouble.
System threats can be used to launch program threats on a complete network called as program
attack. System threats creates such an environment that operating system resources/ user files are
misused. Following is the list of some well-known system threats.
• Worm − Worm is a process which can choked down a system performance by using system
resources to extreme levels.
• Port Scanning − Port scanning is a mechanism or means by which a hacker can detects system
vulnerabilities to make an attack on the system
. • Denial of Service − Denial of service attacks normally prevents user to make legitimate use of
the system. For example, a user may not be able to use internet if denial of service attacks browser's
content settings
Access Control
Access control is a method of limiting access to a system or to physical or virtual resources. It is a
process by which users can access and are granted certain prerogative to systems, resources or
information. Access control is a security technique that has control over who can view different
aspects, what can be viewed and who can use resources in a computing environment. It is a
fundamental concept in security that reduces risk to the business or organization. To establish a
secure system, electronic access control systems are used that depend on user credentials, access
card readers, auditing and reports to track employee access to restricted business locations and
areas.
Authentication Factors:
• Password or PIN
• Bio-metric measurement (fingerprint & retina scan)
• Card or Key Different access control models are used depending on the compliance requirements
and the security levels of information technology that is to be protected.
8
Basically access control is of 2 types:
1. Physical Access Control: Physical access control restricts entry to campuses, buildings, rooms
and physical IT assets.
2. Logical Access Control: Logical access control limits connections to computer networks, system
files and data.
Access Control Models:
1. Attribute-based Access Control (ABAC): In this model, access is granted or declined by
evaluating a set of rules, policies, and relationships using the attributes of users, systems and
environmental conditions.
2. Discretionary Access Control (DAC): In DAC, the owner of data determines who can access
specific resources. 3. History-Based Access Control (HBAC): Access is granted or declined by
evaluating the history of activities of the inquiring party that includes behavior, the time between
requests and content of requests.
4. Identity-Based Access Control (IBAC): By using this model network administrators can more
effectively manage activity and access based on individual requirements.
5. Mandatory Access Control (MAC): A control model in which access rights are regulated by a
central authority based on multiple levels of security. Security Enhanced Linux is implemented
using MAC on the Linux operating system.
Security may be compromised through the breaches. Some of the breaches are as follows:
1. Breach of integrity This violation has unauthorized data modification.
2. Theft of service It involves the unauthorized use of resources.
3. Breach of confidentiality It involves the unauthorized reading of data.
4. Breach of availability It involves the unauthorized destruction of data.
5. Denial of service It includes preventing legitimate use of the system. Some attacks may be
accidental
Types of Threats
There are mainly two types of threats that occur.
1. Program threats
The operating system's processes and kernel carry out the specified task as directed. Program
Threats occur when a user program causes these processes to do malicious operations.
1.Virus A virus may replicate itself on the system. Viruses are extremely dangerous and can
modify/delete user files as well as crash computers.
2. Trojan Horse This type of application captures user login credentials. It stores them to transfer
them to a malicious user who can then log in to the computer and access system resources.
3. Logic Bomb A logic bomb is a situation in which software only misbehaves when particular
criteria are met; otherwise, it functions normally.
4. Trap Door A trap door is when a program that is supposed to work as expected has a security
weakness in its code that allows it to do illegal actions without the user's knowledge.
2.System Threats
System threats are described as the misuse of system services and network connections to cause
user problems. These threats may be used to trigger the program threats over an entire network,
known as program attacks.
1. Port Scanning It is a method by which the cracker determines the system's vulnerabilities for an
attack. It is a fully automated process that includes connecting to a specific port via TCP/IP.
2. Worm The worm is a process that can choke a system's performance by exhausting all system
resources. A Worm process makes several clones, each consuming system resources and preventing
all other processes from getting essential resources.
3. Denial of Service Denial of service attacks usually prevents users from legitimately using the
system. For example, if a denialof-service attack is executed against the browser's content settings,
a user may be unable to access the internet
Firewalls
Firewalls are essential for monitoring all incoming and outgoing traffic. It imposes local security,
defining the traffic that may travel through it. Firewalls are an efficient way of protecting network
systems or local systems from any network-based security threat.
Physical Security
The most important method of maintaining operating system security is physical security. An
attacker with physical access to a system may edit, remove, or steal important files since operating
system code and configuration files are stored on the hard drive.
Various operating system security policies may be implemented based on the organization that you
are working in. In general, an OS security policy is a document that specifies the procedures for
ensuring that the operating system maintains a specific level of integrity, confidentiality, and
availability. OS Security protects systems and data from worms, malware, threats, ransomware,
backdoor intrusions, viruses, etc. Security policies handle all preventative activities and procedures
to ensure an operating system's protection, including steal, edited, and deleted data.
As OS security policies and procedures cover a large area, there are various techniques to
addressing them. Some of them are as follows:
1. Installing and updating anti-virus software
2. Ensure the systems are patched or updated regularly
3. Implementing user management policies to protect user accounts and privileges.
4. Installing a firewall and ensuring that it is properly set to monitor all incoming and outgoing
traffic.
OS security policies and procedures are developed and implemented to ensure that you must first
determine which assets, systems, hardware, and date are the most vital to your organization. Once
that is completed, a policy can be developed to secure and safeguard them properly.
Module-3
11
MODULE-3
Security Controls
Security controls are parameters implemented to protect various forms of data and infrastructure
important to an organization. Any type of safeguard or countermeasure used to avoid, detect,
counteract, or minimize security risks to physical property, information, computer systems, or other
assets is considered a security control. Given the growing rate of cyberattacks, data security controls
are more important today than ever. According to a Clark School study at the University of
Maryland, cybersecurity attacks in the U.S.
Security controls can also be classified according to their characteristics, for example:
Physical controls e.g. fences, doors, locks and fire extinguishers;
Procedural or administrative controls e.g. incident response processes, management oversight,
security awareness and training;
Technical or logical controls e.g. user authentication (login) and logical access controls, antivirus
software, firewalls;
Legal and regulatory or compliance controls e.g. privacy laws, policies and clauses
Systems of security controls, including the processes and documentation defining implementation
and ongoing management of these controls, are referred to as frameworks or standards. Frameworks
enable an organization to consistently manage security controls across different types of assets
according to a generally accepted and tested methodology. Some of the best-known frameworks and
standards include the following
The National Institute of Standards and Technology (NIST) created a voluntary framework in 2014
to provide organizations with guidance on how to prevent, detect, and respond to cyberattacks. The
assessment methods and procedures are used to determine if an organization’s security controls are
implemented correctly, operate as intended, and produce the desired outcome (meeting the security
requirements of the organization). The NIST framework is consistently updated to keep pace with
cybersecurity advances
12
Center for Internet Security controls
The Center for Internet Security (CIS) developed a list of high-priority defensive actions that
provide a “must-do, do-first” starting point for every enterprise looking to prevent cyberattacks.
According to the SANS Institute, which developed the CIS controls, “CIS controls are effective
because they are derived from the most common attack patterns highlighted in the leading threat
reports and vetted across a very broad community of government and industry practitioners.” :
Enforces IT security policies through security controls
Educates employees and users about security guidelines
Meets industry and compliance regulations
Achieves operational efficiency across security controls
Continually assesses risks and addresses them through security controls
Types of IDS
An intrusion detection system comes in one of two types:
1. host-based intrusion detection system (HIDS)
2. network-based intrusion detection system (NIDS).
13
1. signature-based IDS
The signature-based approach to IDS focuses on identifying a “signature” of an intrusion event.
This could be in the form of a known identity, or perhaps a pattern. Most IDSs use the signature-
based approach. For this mode to be successful, it needs to be updated regularly, so it understands
which identities and signatures are common. These identities and signatures are changing and
evolving. In other words, if an attacker changes details about how the attack is executed regularly
enough, they may be able to evade the attention of a signaturebased IDS, because the IDS cannot
keep up with the alterations. Brand-new attack types may also slip through, because they don’t yet
exist in the IDS database.
2.Anomaly-Based IDS
Anomaly-based detection, as its name suggests, focuses on identifying unexpected or unusual
patterns of activities. This method compensates for any attacks that slip past the signature-based
model’s pattern identifying approach. However, previously unknown but nonetheless valid behavior
14
can sometimes be flagged accidentally. Anomaly-based IDS is good for identifying when someone
is sweeping or probing a network, which can provide a strong indication of an imminent attack.
Examples of an anomaly include multiple failed login attempts and unusual port activity.
Modularity
Modularization is the process of dividing a task into subtasks. This division is done on a logical or
functional basis. Each component performs a separate, independent part of the task. Modularity is
depicted in the figure below . The goal is to have each component meet four conditions
16
Coupling refers to the degree with which a component depends on other components in the system.
Thus, low or loose coupling is better than high or tight coupling because the loosely coupled
components are free from unwitting interference from other components. This difference in
coupling
Encapsulation
Encapsulation hides a component's implementation details, but it does not necessarily mean
complete isolation. Many components must share information with other components, usually with
good reason. However, this sharing is carefully documented so that a component is affected only in
known ways by others in the system. Sharing is minimized so that the fewest interfaces possible are
used. Limited interfaces reduce the number of covert channels that can be constructed. An
encapsulated component's protective boundary can be translucent or transparent, as needed. Berard
notes that encapsulation is the "technique for packaging the information [inside a component] in
such a way as to hide what should be hidden and make visible what is intended to be visible.
Information Hiding
Developers who work where modularization is stressed can be sure that other components will
have limited effect on the ones they write. Thus, we can think of a component as a kind of black
box, with certain well-defined inputs and outputs and a well-defined function. Other components'
designers do not need to know how the module completes its function; it is enough to be assured
that the component performs its task in some correct manner. This concealment is the information
hiding,
Mutual Suspicion
Programs are not always trustworthy. Even with an operating system to enforce access limitations,
it may be impossible or infeasible to bound the access privileges of an untested program effectively.
In this case, the user U is legitimately suspicious of a new program P. However, program P may be
invoked by another program, Q. There is no way for Q to know that P is correct or proper, any more
than a user knows that of P. Therefore, we use the concept of mutual suspicion to describe the
relationship between two programs.
Confinement
Confinement is a technique used by an operating system on a suspected program. A confined
program is strictly limited in what system resources it can access. If a program is not trustworthy,
the data it can access are strictly limited. Strong confinement would be helpful in limiting the
spread of viruses.
Genetic Diversity
At your local electronics shop you can buy a combination printerscannercopierfax machine. It
comes at a good price (compared to costs of the four separate components) because there is
considerable overlap in functionality among those four. It is compact, and you need only install one
thing on your system, not four. But if any part of it fails, you lose a lot of capabilities all at once
Confidentiality
Confidentiality measures are designed to prevent unauthorized disclosure of information. The
purpose of the confidentiality principle is to keep personal information private and to ensure that it
is visible and accessible only to those individuals who own it or need it to perform their
organizational functions.
Integrity
Consistency includes protection against unauthorized changes (additions, deletions, alterations,
etc.) to data. The principle of integrity ensures that data is accurate and reliable and is not modified
incorrectly, whether accidentally or maliciously.
17
Availability
Availability is the protection of a system’s ability to make software systems and data fully available
when a user needs it (or at a specified time). The purpose of availability is to make the technology
infrastructure, the applications and the data available when they are needed for an organizational
process or for an organization’s customers.
Social Engineering
Social engineering involves attackers sending emails and messages that trick users into performing
actions that may compromise their security or divulge private information. Attackers manipulate
users using psychological triggers like curiosity, urgency or fear.
Malware on Endpoints
Organizational users work with a large variety of endpoint devices, including desktop computers,
laptops, tablets, and mobile phones, many of which are privately owned and not under the
organization’s control, and all of which connect regularly to the Internet.
Lack of Encryption
18
Encryption processes encode data so that it can only be decoded by users with secret keys. It is very
effective in preventing data loss or corruption in case of equipment loss or theft, or in case
organizational systems are compromised by attackers.
Security Misconfiguration
Modern organizations use a huge number of technological platforms and tools, in particular web
applications, databases, and Software as a Service (SaaS) applications, or Infrastructure as a Service
(IaaS) from providers like Amazon Web Services. Enterprise grade platforms and cloud services
have security features, but these must be configured by the organization. Security misconfiguration
due to negligence or human error can result in a security breach.
Active Attack
An active attack involves intercepting a communication or message and altering it for malicious
effect. There are three common variants of an active attacks:
Interruption—the attacker interrupts the original communication and creates new, malicious
messages, pretending to be one of the communicating parties.
Modification—the attacker uses existing communications, and either replays them to fool one of
the communicating parties, or modifies them to gain an advantage.
Fabrication—creates fake, or synthetic, communications, typically with the aim of achieving
denial of service (DoS). This prevents users from accessing systems or performing normal
operations
Active Attack
An active attack involves intercepting a communication or message and altering it for malicious
effect. There are three common variants of an active attacks:
Interruption—the attacker interrupts the original communication and creates new, malicious
messages, pretending to be one of the communicating parties.
Modification—the attacker uses existing communications, and either replays them to fool one of
the communicating parties, or modifies them to gain an advantage.
Fabrication—creates fake, or synthetic, communications, typically with the aim of achieving
denial of service (DoS). This prevents users from accessing systems or performing normal
operations
How it Works
Networks
Most network security software include packet sniffers and loggers for tracking potentially
malicious traffic. These system administration products use a combination of hardware and software
to prevent such traffic from entering the network. For example, security specialists often implement
firewall server software that is designed to open or close certain ports; configure black, white, and
gray lists for email; and act as a DMZ (demilitarized zone) between the Internet and an external
network.
Applications
Application security is a highly desirable feature in security software products. Systems
administrators use data encryption software to protect corporate information stored by applications
within a database. This type of software generally uses an algorithm of combined security features
including user names, passwords, and encryption keys to insure that only authorized users have
access to sensitive datasets.
Database Introduction
A database is an organized collection of data, generally stored and accessed electronically from a
computer system. It supports the storage and manipulation of data. In other words, databases are
used by an organization as a method of storing, managing and retrieving information. Types of
Database
Types of Databases
Depending upon the usage requirements, there are following types of databases available in the
market:
Centralized database
Distributed database
Personal database
20
End-user database
Commercial database
NoSQL database
Operational database
Relational database
Cloud database
Object-oriented database
Graph database
Database Security
Database security refers to the collective measures used to protect and secure a database or database
management software from illegitimate use and malicious cyber threats and attacks. Database
security procedures are aimed at protecting not just the data inside the database, but the database
management system and all the applications that access it from intrusion, misuse of data, and
damage.
Database security covers and enforces security on all aspects and components of databases.
This includes:
Data stored in database.
Database server.
Database management system (DBMS).
Other database workflow applications.
Integrity: Corrupted data will deteriorate customer trust. So data integrity is a priority for database
designers.
Availability: Data that can’t be reached is useless. An impenetrable wall that cuts off the data from
the rest of the world is not the goal. Rather, the objective is to use proper access control to make the
data available to the customers.
1. Authentication :
Authentication is the process of recognizing or identifying a user’s identity whether it is true, real,
or not. It’s simply a verification of claim whether you are who you say you are or not. There are
many authentication methods available nowadays like password authentication that includes using a
password, physical authentication that includes the scannable card or smart card or digital
certificate, biometric authentication that includes signatures and fingerprints, or visual
identification, and many more.
2. Authorization :
Authorization means to ensure whether you have permission to access on network or not. It’s
simply a verification of permission either user has access or not. Some authorization methods are
ACLs (Access Control Lists), Secure objects and methods, Access control for URL’s, etc.
3. Biometric System :
A Biometric system is one of the most secure systems as it provides high security to the computer
network. This system verifies the user’s identity based on some important characteristics that are
physiological and behavioral features. Physiological features include face, eyes, fingerprints, hand.
Behavioral features include voice, signature, etc.
4. Firewall :
A firewall is a method of network security that prevents the computer network from users that are
not authorized to have access to a network. It blocks the message, viruses, hackers if they do not
have authorized access and do not meet the security criteria as per requirement.
There are several types of firewall techniques:
Packet Filter
Application-level gateway
Circuit-level gateway
Stateful inspection firewall
Next-Generation Firewall (NGFW)
Proxy server Multilevel Security Multilevel security is a security policy that allows you to classify
objects and users based on a system of hierarchical security levels and a system of non-hierarchical
security categories.
Multilevel Security
Multilevel security is a security policy that allows you to classify objects and users based on a
system of hierarchical security levels and a system of non-hierarchical security categories.
Multilevel security provides the capability to prevent unauthorized users from accessing
24
Multilevel security offers the following advantages:
A database server is a physical or virtual machine running the database. Securing a database server,
also known as “hardening”, is a process that includes physical security, network security, and secure
operating system configuration. Ensure Physical Database Securit
Preventative Devices
These devices scan the networks and identify potential security problems. For example, penetration
testing devices and vulnerability assessment appliances.
Unified Threat Management (UTM)
These devices serve as all-in-one security devices. Examples include firewalls, content filtering,
web caching, etc.
Firewalls
A firewall is a network security system that manages and regulates the network traffic based on
some protocols. A firewall establishes a barrier between a trusted internal network and the internet.
Software firewalls are installed on your computers. A software firewall protects your computer from
internet threats.
Antivirus
An antivirus is a tool that is used to detect and remove malicious software. It was originally
designed to detect and remove viruses from computers. Modern antivirus software provide
protection not only from virus, but also from worms, Trojan-horses, adwares, spywares, keyloggers,
etc.
Content Filtering
Content filtering devices screen unpleasant and offensive emails or webpages. These are used as a
part of firewalls in corporations as well as in personal computers. These devices generate the
message "Access Denied" when someone tries to access any unauthorized web page or email.
Content filtering can be divided into the following categories −
Web filtering
Screening of Web sites or pages
E-mail filtering
Screening of e-mail for spam
Other objectionable content
Digital Signature
A digital signature is a technique to validate the legitimacy of a digital message or a document. A
valid digital signature provides the surety to the recipient that the message was generated by a
known sender, such that the sender cannot deny having sent the message. Digital signatures are
mostly used for software distribution, financial transactions, and in other cases where there is a risk
of forgery.
Electronic Signature
An electronic signature or e-signature, indicates either that a person who demands to have created a
message is the one who created it. A signature can be defined as a schematic script related with a
person. A signature on a document is a sign that the person accepts the purposes recorded in the
document. In many engineering companies digital seals
Security Considerations
Before the great explosion of interest in the World Wide Web, it was common practice to run
utilities or programs on the Internet that would interrogate specified remote computers to locate
friends or colleagues and see if they were logged on. You could then communicate with them in
real-time over the network or connect temporarily to their disk drive to exchange files.
User Authentication
Authentication is the process of verifying that a user who logs into a network or database has
permission to log in. Examples of authentication include the use of a user name and password when
logging into a local-area network (LAN) and the use of digital certificates when sending or
receiving secure e-mail over the Internet. An organization can use various types of authentication
processes depending on the level of security desired and the type of network or database that is
being protected.
Server Authentication
With server authentication, a client machine verifies that a server is who it claims to be. For
example, when a client sends confidential data to a server, the client can verify that the server is
secure and is the correct recipient of the client's confidential data. If you use the HTTPS
communications mode, which uses HTTP 1.1 with SSL (secure sockets layer), data transmission is
encrypted and server authentication is conducted over the Internet. Server authentication is
accomplished using digital certificates.
COMMUNICATION TECHNOLOGIES The turn of the twentieth and twenty-first century, and in
particular the beginning of the twenty-first century is inextricably linked to the emergence of the
information society and the development of information and communications technology, closely
related to electronics, telecommunications and IT. In all these disciplines, great progress has been
observed in basic, research and implementation works. The most important thing is to notice that
the driving force behind the development of all these disciplines are two basic values, namely
convergence and synergy. Convergence is associated with the tendency to create systems with
universal features, as well as similar structure and functional properties. In the case of information
technology, it is evident in the modern IT systems offering various services and applications, so far
typical of classic solutions. Synergy, in turn, means the interaction of various elements of the
system leading to strengthening the efficiency and effectiveness of the entire system, as well as the
appearance of new, previously unknown properties or possibilities. Figure 3 illustrates the basic
communication technologies currently used in networks in terms of the concept of the so-called
overlay networks
30