Internet Security
Internet Security
Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security on a more general level as it applies to
other applications or operating systems on a whole.
Firewall
A firewall is a network security system, either hardware- or software-based, that uses
rules to control incoming and outgoing network traffic.
A firewall acts as a barrier between a trusted network and an untrusted network. A
firewall controls access to the resources of a network through a positive control model. This
means that the only traffic allowed onto the network is defined in the firewall policy; all other
traffic is denied.
There are five basic types:
1. Packet-filtering firewalls operate at the router and compare each packet received to a set of
established criteria (such as allowed IP addresses, packet type, port number, etc.) before
being either dropped or forwarded.
2. Circuit-level gateways monitor the TCP handshaking going on between the local and remote
hosts to determine whether the session being initiated is legitimate -- whether the remote
system is considered "trusted." They don't inspect the packets themselves, however.
3. Stateful inspection firewalls, on the other hand, not only examine each packet, but also keep
track of whether or not that packet is part of an established TCP session. This offers more
security than either packet filtering or circuit monitoring alone, but exacts a greater toll on
network performance.
4. Application-level gateways (proxies) combine some of the attributes of packet-filtering
firewalls with those of circuit-level gateways. They filter packets not only according to the
service for which they are intended (as specified by the destination port), but also by certain
other characteristics such as HTTP request string. While application-level gateways provide
considerable data security, they can dramatically impact network performance.
5. Multilayer inspection firewalls combine packet filtering with circuit monitoring, while still
enabling direct connections between the local and remote hosts, which are transparent to the
network. They accomplish this by relying on algorithms to recognize which service is being
requested, rather than by simply providing a proxy for each protected service. Multilayer
firewalls work by retaining the status (state) assigned to a packet by each firewall component
through which it passes on the way up the protocol stack. This gives the user maximum
control over which packets are allowed to reach their final destination, but again affects
network performance, although generally not so dramatically as proxies do.
Proxy Server
A proxy server is a dedicated computer or a software system running on a computer that acts
as an intermediary between an endpoint device, such as a computer, and another server from
which a user or client is requesting a service.
IT ACT-2000
An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as
"electronic commerce", which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with
the Government agencies and further to amend the Indian Penal Code, the Indian Evidence
Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934
and for matters connected therewith or incidental thereto.
Computer Crime
There are a number of offenses which can fall under the category of “computer crime.” Any
crime that either targets a computer, or in which someone uses a computer to commit a crime,
falls into this category. State computer crime laws differ widely, and when a person uses a
computer to commit a crime, that crime may be covered under several different state or
federal laws.
Unlawful use or access. Some states have laws that make it a crime to use or access a
someone else's computer without permission or authority. This type of crime includes
instances where a person physically accesses someone else's computer, gains access
electronically, or uses a virus to gain access. These laws are often used in computer hacking
cases where someone gains access to someone else's computer without permission.
Access for fraudulent purposes. Other states have laws that punish using a computer to
accomplish a fraudulent act. Some states, for example, make it a crime to use a computer,
computer software, or computer network to fraudulently obtain goods or services of any kind.
Data theft. Even if you're allowed to use or access a computer, you can still commit a
computer crime if you access, copy, damage, or alter information you don't have permission
to use. Some states provide additional penalties in cases where the data theft resulted in
damage, while less severe penalties apply for thefts which did result in data being damaged,
altered, or destroyed.
Internet Crime
While computer crimes cover a wide range of activity, internet crime laws punish activity
that specifically involves the internet in some way. These laws apply to emails and websites,
as well as using the internet to commit identity theft or other forms of fraud. Like computer
crimes, both individual states and the federal government have laws that apply to internet
crime.
Luring or soliciting children. Nearly all states have laws that make it a crime to use the
internet to solicit, lure, or entice a child to engage in a sexual act. These laws apply when a
person aged 18 or older uses the internet to communicate with a child. The age limit of a
child for the purposes of these laws is usually 16. However, a person can violate these laws as
long as they believe the person they're talking to is 16 or younger, even if the person is
actually an adult.
Harassment, stalking, and bullying. Various states have enacted laws which criminalize
using the internet to stalk,harass, or make criminal threats against someone. State stalking
laws typically require that the threats made must be credible, but a state's harassment laws
may also punish internet communications intended to threaten or harass even if the threat is
not credible. Recently, some states have enacted cyber bullying laws which criminalizes
harassment aimed specifically towards minors.
Other laws and new laws. There are any number of federal and state crimes that may also
apply in computer and internet criminal cases. Federal wire fraud, for example, can apply to
any case where a person uses a computer or electronic communications device to fraudulently
deprive someone else of property. As computers and the internet continue to change and
proliferate, legislatures regularly introduce new criminal laws which apply to internet and
computer use.
Penalties
Because there are numerous different types of computer and internet crimes, there are also a
wide range of potential penalties.
Fines: Fines for a conviction of various computer and internet crimes range widely. A
misdemeanor conviction can result in relatively minor fines of a few hundred dollars, and
possibly up to a $1,000 or more, while felony convictions can have fines that exceed
$100,000.
Jail or prison. A person convicted of certain internet or computer crimes may also face a jail
or prison sentence. The most serious crimes, such as possessing child pornography, can result
in a prison sentence of 20 years or more.
Cyber Crimes
Cyber crimes are any crimes that involve a computer and a network. In some cases, the
computer may have been used in order to commit the crime, and in other cases, the computer
may have been the target of the crime.