0% found this document useful (0 votes)
5 views

Internet Security

Computer software

Uploaded by

suyashkaranje74
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Internet Security

Computer software

Uploaded by

suyashkaranje74
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Internet security

Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security on a more general level as it applies to
other applications or operating systems on a whole.

Firewall
A firewall is a network security system, either hardware- or software-based, that uses
rules to control incoming and outgoing network traffic.
A firewall acts as a barrier between a trusted network and an untrusted network. A
firewall controls access to the resources of a network through a positive control model. This
means that the only traffic allowed onto the network is defined in the firewall policy; all other
traffic is denied.
There are five basic types:
1. Packet-filtering firewalls operate at the router and compare each packet received to a set of
established criteria (such as allowed IP addresses, packet type, port number, etc.) before
being either dropped or forwarded.
2. Circuit-level gateways monitor the TCP handshaking going on between the local and remote
hosts to determine whether the session being initiated is legitimate -- whether the remote
system is considered "trusted." They don't inspect the packets themselves, however.
3. Stateful inspection firewalls, on the other hand, not only examine each packet, but also keep
track of whether or not that packet is part of an established TCP session. This offers more
security than either packet filtering or circuit monitoring alone, but exacts a greater toll on
network performance.
4. Application-level gateways (proxies) combine some of the attributes of packet-filtering
firewalls with those of circuit-level gateways. They filter packets not only according to the
service for which they are intended (as specified by the destination port), but also by certain
other characteristics such as HTTP request string. While application-level gateways provide
considerable data security, they can dramatically impact network performance.
5. Multilayer inspection firewalls combine packet filtering with circuit monitoring, while still
enabling direct connections between the local and remote hosts, which are transparent to the
network. They accomplish this by relying on algorithms to recognize which service is being
requested, rather than by simply providing a proxy for each protected service. Multilayer
firewalls work by retaining the status (state) assigned to a packet by each firewall component
through which it passes on the way up the protocol stack. This gives the user maximum
control over which packets are allowed to reach their final destination, but again affects
network performance, although generally not so dramatically as proxies do.

What is Anti-Virus Software?


Anti-virus software is a program or set of programs that are designed to prevent,
search for, detect and remove software viruses and other malicious software like worms,
Trojans, adware, and more.
These tools are critical for users to have installed and up-to-date because a computer
without anti-virus software installed will be infected within minutes of connecting to the
internet. The bombardment is constant, with anti-virus companies update their detection tools
constantly to deal with the more than 60,000 new pieces of malware created daily.
There are several different companies that build and offer anti-virus software and what each
offers can vary but all perform some basic functions:
 Scan specific files or directories for any malware or known malicious patterns
 Allow you to schedule scans to automatically run for you
 Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at
any time.
 Remove any malicious code detected –sometimes you will be notified of an infection and
asked if you want to clean the file, other programs will automatically do this behind the
scenes.
 Show you the ‘health’ of your computer
Always be sure you have the best, up-to-date security software installed to protect your
computers, laptops, tablets and smart phones.

SSL (Secure Sockets Layer)


SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted
link between a web server and a browser. This link ensures that all data passed between the
web server and browsers remain private and integral.

Proxy Server
A proxy server is a dedicated computer or a software system running on a computer that acts
as an intermediary between an endpoint device, such as a computer, and another server from
which a user or client is requesting a service.

IT ACT-2000
An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as
"electronic commerce", which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with
the Government agencies and further to amend the Indian Penal Code, the Indian Evidence
Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934
and for matters connected therewith or incidental thereto.
Computer Crime
There are a number of offenses which can fall under the category of “computer crime.” Any
crime that either targets a computer, or in which someone uses a computer to commit a crime,
falls into this category. State computer crime laws differ widely, and when a person uses a
computer to commit a crime, that crime may be covered under several different state or
federal laws.
 Unlawful use or access. Some states have laws that make it a crime to use or access a
someone else's computer without permission or authority. This type of crime includes
instances where a person physically accesses someone else's computer, gains access
electronically, or uses a virus to gain access. These laws are often used in computer hacking
cases where someone gains access to someone else's computer without permission.
 Access for fraudulent purposes. Other states have laws that punish using a computer to
accomplish a fraudulent act. Some states, for example, make it a crime to use a computer,
computer software, or computer network to fraudulently obtain goods or services of any kind.
 Data theft. Even if you're allowed to use or access a computer, you can still commit a
computer crime if you access, copy, damage, or alter information you don't have permission
to use. Some states provide additional penalties in cases where the data theft resulted in
damage, while less severe penalties apply for thefts which did result in data being damaged,
altered, or destroyed.

Internet Crime
While computer crimes cover a wide range of activity, internet crime laws punish activity
that specifically involves the internet in some way. These laws apply to emails and websites,
as well as using the internet to commit identity theft or other forms of fraud. Like computer
crimes, both individual states and the federal government have laws that apply to internet
crime.
 Luring or soliciting children. Nearly all states have laws that make it a crime to use the
internet to solicit, lure, or entice a child to engage in a sexual act. These laws apply when a
person aged 18 or older uses the internet to communicate with a child. The age limit of a
child for the purposes of these laws is usually 16. However, a person can violate these laws as
long as they believe the person they're talking to is 16 or younger, even if the person is
actually an adult.
 Harassment, stalking, and bullying. Various states have enacted laws which criminalize
using the internet to stalk,harass, or make criminal threats against someone. State stalking
laws typically require that the threats made must be credible, but a state's harassment laws
may also punish internet communications intended to threaten or harass even if the threat is
not credible. Recently, some states have enacted cyber bullying laws which criminalizes
harassment aimed specifically towards minors.
 Other laws and new laws. There are any number of federal and state crimes that may also
apply in computer and internet criminal cases. Federal wire fraud, for example, can apply to
any case where a person uses a computer or electronic communications device to fraudulently
deprive someone else of property. As computers and the internet continue to change and
proliferate, legislatures regularly introduce new criminal laws which apply to internet and
computer use.
Penalties
Because there are numerous different types of computer and internet crimes, there are also a
wide range of potential penalties.

Fines: Fines for a conviction of various computer and internet crimes range widely. A
misdemeanor conviction can result in relatively minor fines of a few hundred dollars, and
possibly up to a $1,000 or more, while felony convictions can have fines that exceed
$100,000.
 Jail or prison. A person convicted of certain internet or computer crimes may also face a jail
or prison sentence. The most serious crimes, such as possessing child pornography, can result
in a prison sentence of 20 years or more.

Information Technology Act 2008


Information Technology (Amendment) Bill 2006 was amended by Information Technology
Act Amendment Bill 2008 and in the process, the underlying Act was renamed as
Information Technology (Amendment) Act 2008 herein after referred to as ITAA 2008.

Cyber Crimes
Cyber crimes are any crimes that involve a computer and a network. In some cases, the
computer may have been used in order to commit the crime, and in other cases, the computer
may have been the target of the crime.

Cybercriminals use computers in three broad ways:


 Select computer as their target: These criminals attack other people's computers to perform
malicious activities, such as spreading viruses, data theft, identity theft, etc.
 Uses computer as their weapon: They use the computer to carry out "conventional crime",
such as spam, fraud, illegal gambling, etc.
 Uses computer as their accessory: They use the computer to save stolen or illegal data.

Steps for prevention of Cyber Crime


Prevention is always better than cure. It is always better to take certain precaution while
operating the net. ANUP GIRDHAR, Editor In Chief, Cyber Times advocates that we should
follow 5 main key points: Precaution, Prevention, Protection, Preservation and Perseverance
for online security.
Steps to prevent cyber crime:-
1. Never disclose your personal information publicly on websites. This is as good as
disclosing your identity to strangers in public place.
2. Always avoid sending any photograph online particularly to strangers and chat friends as
there have been incidents of misuse of the photographs.
3. Never enter your credit card number to any site that is not secured, to prevent its misuse.
4. Always keep a watch on the sites that your children are accessing to prevent any kind of
harassment or depravation in children
5. Always use latest and updated Antivirus software to guard against virus attacks.
6. To prevent loss of data due to virus attacks, always keep back up of your data.
7. It is advisable to use a security program that gives control over the cookies and send
information back to the site, as leaving the cookies unguarded might prove fatal.
8. Use of firewalls proves beneficial.
9. Website owners should watch traffic and check any irregularity on the site. Putting host-
based intrusion detection devices on servers will serve the purpose.
Capacity of human mind is profound. It is not possible to eliminate cyber crime from the
cyber space. It is quite possible to check them. History is the witness that no legislation has
succeeded in totally eliminating crime from the globe. The only possible step is to make
people aware of their rights and duties and to guard ourselves so that crime has no effect on
us.

You might also like