OVERVIEW ON INTERNET SECURITY :
First of all you have to know what is INTERNET SECURITY.
INTERNET SECURITY:
INTERNET SECURITY is a branch of COMPUTER SECURITY specifically related to the INTERNET, often involving BROWSER SECURITY but also NETWORK SECURITY on a more general level, as it applies to other applications or OPERATING SYSTEM as a whole. Its objective is to establish rules and measures to use against attacks over the Internet.The Internet represents an insecure channel for exchanging information leading to a high risk of INTRUSION or fraud, such as PHISING, on line VIRUSES, TROJANS, WORMS and more.
Many methods are used to protect the transfer of data, including ENCRYPTION and from-the-ground-up engineering. The current focus is on prevention as much as on real time protection against well known and new threats.
INTERNET SECURITY protect computer from major risks that can affect computer
such risks are:
- PHISING
- ON LINE VIRUS
- TROJANS
- WORMS
1. PHISHING:

2. ON LINE VIRUS:
A VIRUS is a type of malicious software program ("MALWARE") that, when executed, REPLICATES itself by modifying other COMPUTER PROGRAM and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

3. TROJANS:
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

4. WORMS:
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

HIGHLIGHTED FEATURES OF INTERNET SECURITY:
- FIREWALLS:
A COMPUTER FIREWALL controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HYPERTEXT (HTTP) connections.
2. BROWSER SECURITY:
Web browser statistics tend to affect the amount a Web browser is exploited. For example, INTERNET EXPLORER 6, which used to own a majority of the Web browser market share, is considered extremely insecure because vulnerabilities were exploited due to its former popularity. Since browser choice is now more evenly distributed (Internet Explorer at 28.5%, FIRE FOX at 18.4%, GOOGLE CHROME at 40.8%, and so on), vulnerabilities are exploited in many different browsers.3. Network layer security:
TCP/IP protocols may be secured with cryptographic methods and SECURITY PROTOCOLS. These protocols include SECURE SOCKETS LAYER (SSL), succeeded by TRANSPORT LAYER SECURITY (TLS) for WEB TRAFFIC, PRETTY GOOD PRIVACY (PGP) for email, and IPsec for the network layer security.
4. Internet Protocol Security (IPsec):
IPsec is designed to protect TCP/IP communication in a secure manner. It is a set of security extensions developed by the INTERNET TASK FORCE (IETF). It provides security and authentication at the IP layer by transforming data using encryption. Two main types of transformation that form the basis of IPsec: the AUTHENTICATION HEADER (AH) and ESP. These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the INTERNET PROTOCOL (IP) layer.
The basic components of the IPsec security architecture are described in terms of the following functionalities:
- Security protocols for AH and ESP
- Security association for policy management and traffic processing
- Manual and automatic key management for the INTERNET KEY EXCHANGE (IKE)
- Algorithms for AUTHENTICATION and ENCRYPTION
The set of security services provided at the IP layer includes access control, data origin integrity, protection against replays, and confidentiality. The algorithm allows these sets to work independently without affecting other parts of the implementation. The IPsec implementation is operated in a host or security gateway environment giving protection to IP traffic.
5. Multi-factor authentication:
Multi-factor authentication (MFA) is a method of computer access control in which a USER is granted access only after successfully presenting several separate pieces of evidence to an AUTHENTICATION mechanism – typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Internet resources, such as websites and email, may be secured using multi-factor authentication.
6. Security token:
Some on line sites offer customers the ability to use a six-digit code which randomly changes every 30–60 seconds on a SECURITY TOKEN. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the on line account. The website that the user is logging into would be made aware of that device's serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 30–60 seconds the device will present a new random six-digit number which can log into the website.
Internet security products:
Anti virus:
ANTI VIRUS SOFTWARE and Internet security programs can protect a programmable device from attack by detecting and eliminating viruses; Anti virus software was mainly shareware in the early years of the Internet, but there are now several free security applications on the Internet to choose from for all platforms.
Password managers:
A PASSWORD MANAGER is a software application that helps a user store and organize passwords. Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database from top to bottom.
Security suites:
So called security suites were first offered for sale in 2003 (McAfee) and contain a suite of firewalls, anti-virus, anti-spy ware and more. They also offer theft protection, portable storage device safety check, private Internet browsing, cloud ANTI-SPAM, a file shredder or make security-related decisions (answering pop up windows) and several were free of charge.
Our computers are safe just because of ANTI-VIRUS.
THANKS TO ANTI-VIRUS.
AND THANK YOU FOR READING THIS.
HOPE YOU LIKE IT.
Comments
Post a Comment