Skip to main content

internet security

Introduction

Internet security refers to securing communication over the internet. It includes specific security protocols such as:
  • Internet Security Protocol (IPSec)
  • Secure Socket Layer (SSL)

Internet Security Protocol (IPSec)

It consists of a set of protocols designed by Internet Engineering Task Force (IETF). It provides security at network level and helps to create authenticated and confidential packets for IP layer.

Secure Socket Layer (SSL)

It is a security protocol developed by Netscape Communications Corporation. ). It provides security at transport layer. It addresses the following security issues:
  • Privacy
  • Integrity
  • Authentication

Threats

Internet security threats impact the network, data security and other internet connected systems. Cyber criminals have evolved several techniques to threat privacy and integrity of bank accounts, businesses, and organizations.
Following are some of the internet security threats:
  • Mobile worms
  • Malware
  • PC and Mobile ransomware
  • Large scale attacks like Stuxnet that attempts to destroy infrastructure.
  • Hacking as a Service
  • Spam
  • Phishing

Email Phishing

Email phishing is an activity of sending emails to a user claiming to be a legitimate enterprise. Its main purpose is to steal sensitive information such as usernames, passwords, and credit card details.
Such emails contains link to websites that are infected with malware and direct the user to enter details at a fake website whose look and feels are same to legitimate one.

What a phishing email may contain?

Following are the symptoms of a phishing email:

SPELLING AND BAD GRAMMAR

Most often such emails contain grammatically incorrect text. Ignore such emails, since it can be a spam.

BEWARE OF LINKS IN EMAIL

Don’t click on any links in suspicious emails.

THREATS

Such emails contain threat like “your account will be closed if you didn’t respond to an email message”.

SPOOFING POPULAR WEBSITES OR COMPANIES

These emails contain graphics that appear to be connected to legitimate website but they actually are connected to fake websites.

Comments

Popular posts from this blog

Principle security There are five principles of security. They are as follows: ·  Confidentiality: The principle of confidentiality specifies that only the sender and the intended recipient should be able to access the content of the message.               Integrity: The confidential information sent by A to B which is accessed by C without the permission or knowledge of A and B.   ·  Authentication: Authentication mechanism helps in establishing proof of identification. ·  Non-repudiation: ·  Access control: Access control specifies and control who can access what. ·  Availability: It means that assets are accessible to authorized parties at appropriate times. Attacks We want our security system to make sure that no data are disclosed to unauthorized parties. Data should not be modified in illegitimate ways   Legitimate user can access the data ...

Firewell security

Firewall  is a barrier between Local Area Network (LAN) and the Internet. It allows keeping private resources confidential and minimizes the security risks. It controls network traffic, in both directions. The following diagram depicts a sample firewall between LAN and the internet. The connection between the two is the point of vulnerability. Both hardware and the software can be used at this point to filter network traffic. There are two types of Firewall system: One works by using filters at the network layer and the other works by using proxy servers at the user, application, or network layer. Key Points Firewall management must be addressed by both system managers and the network managers. The amount of filtering a firewall varies. For the same firewall, the amount of filtering may be different in different directions.