Free Essay

Internet Security

In:

Submitted By sunnykesireddy
Words 3516
Pages 15
ABSTRACT
The paper discusses the topics regarding, 1) Internet Frauds ;2) to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL); and 3) to make people aware of internet fraudsters.
Six research questions were utilized in this study. This study examines whether secure socket layer and its certificate would protect online users from fraudsters while they browse websites. The six research questions are as follows:
• Are there any security breaches occurring with the usage of SSL certified website?
• Can we stop internet frauds by making people aware of it?
• Is secure socket layer used in all websites?
• Is Secure Socket Layer reliable?
• Does Secure Socket Layer protect online users from fraudsters?
• Are users satisfied with security provided by SSL authentication?

TABLE OF CONTENTS
ABSTRACT ii
INTRODUCTION 1
Statement of Purpose and Problem 2
Principle Research Questions 3
Assumption of the study 3
Limitation of the Study 3
Definition of Terms 3
REVIEW OF LITERATURE 5
Internet 5
How SSL Works? 8
What is a “certificate” in SSL certificate? 8
What is an SSL certificate? 9
METHODOLOGY 11
Selection of subjects 11
Instrumentation 11
Method 13
ANALYSIS 15
REFERENCE i INTRODUCTION
The term internet refers to prevalent network of networks connected on the Earth and the security provided to the networks in order to maintain confidentiality of the data is called Internet security. Network can be defined as a group of computers connected together and the communication between these computers is called networking. This networking is done by providing the internet to different systems.
Some of the advantages of networking include:
• Sharing of memory
• Sharing of data
• Sharing the software
• Sharing the hardware
• Sharing of processor (Knipp, 2002).
“The first software network is developed by Thompson. This is called the ARPANET (Advanced Research Project Agency Network). This was developed by the United states Department of defense in the year 1969” (Giacomello, 2005).
Internet security has become a major concern for all online users because the risk related with many online services had made security a major issue for online failure or success. Over the past few years, user magazines and security providers have well-read the market on the essentials of online security (Bit Engines, 2002).
The majority of customers are expecting online services to be confidential and vital. Users would buy their products or browse websites when they are satisfied that their details are secure and safe from fraudsters or hackers. Quality SSL Certificates used for online transaction tells customers to take their security seriously (Bit Engines, 2002).Various studies stated that SSL provides protection for customer’s transactions and provide company with a proof of your digital identity.
Statement of Purpose and Problem
The purpose of this study is to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL) and to make people aware of internet frauds. Is SSL capable of protecting the advanced technologies used in hacking the internet? The following provides the research hypothesis and relevant information pertaining to the hypothesis.
Hypothesis:
With the usage of SSL, users are unable to prevent internet security breaches. Null Hypothesis:
Users are able to prevent internet breaches using SSL.
Procedures:
The objectives of this study will be met using descriptive experimental pretest-posttest. Many online users have been selected for this study, users browse websites but they cannot differentiate a website that has a SSL certificates or not, which protects customer’s data while they make transactions online. Each user, during this study will be asked to browse similar type of websites that is unsecured, medium or highly secured, highly secured website uses SSL certificate for providing security.
There is a pretest governed to online website users. After the completion of the test, both the quality and service providers will test the website and gather information whether the data transferred is secured from fraudsters. Few days after, when the test is completed users will be given a delayed posttest to evaluate the security problems.
Data will be gathered and the required statistical analyses will me made. The null hypotheses test will be performed to determine if there is any statistical significance among online users.
Principle Research Questions
• Are there any security breaches occurring with the usage of SSL certified website?
• Can we stop internet frauds by making people aware of it?
• Is secure socket layer used in all websites?
• Is Secure Socket Layer reliable?
• Does Secure Socket Layer protect online users from fraudsters?
• Are users satisfied with security provided by SSL authentication?
Assumption of the study
It can be assumed that the subjects participating in this research will provide information truthfully and honestly. The following assumptions are made regarding the research and sample of this study
1. Users will participate voluntarily in the study.
2. The research sample has limited knowledge on Secure Socket Layer.
3. The research sample has limited knowledge on Internet frauds.
4. The instruments used in the study will accurately measure the security given to the websites.
Limitation of the Study This study will be limited to internet users, users who have experienced internet fraud and users who regularly shop online.

Definition of Terms
Web Server: A web server refers to a location on the internet that contains information in the form of web Pages.
Web Browser: It is a software application that resides on your PC and can display text, images, and multimedia data found on different Web Pages.
Certification Authority (CA): It is a center trusted by one or more entities which create and assigns certificates. REVIEW OF LITERATURE
Internet
The Internet is the transport vehicle for the information stored in files or documents on another computer. The Internet has shaped many new worldwide business opportunities for enterprises.
The Internet has developed a very strong society base where information, software and specialist advice is freely shared and mainly for this reason the users have developed a very strong protective attitude on freedom of speech, freedom from commercial interests, etiquette and unsuitable material on the web.
According to Steven C. Perkins (1999) Internet is defined as “the name given to the collective electronic network of computers and computer networks which are inter-connected throughout the world - started with the ARPA net at the US Dept. of Defense”.
In America the people who use internet, 31 percent, or approximately 35 million people, participate in online auctions, according to a Harris Interactive survey commissioned by the National Consumers League. A whopping 94 percent of respondents who have participated as bidders said they are somewhat or very confident that as the winning bidder in an online auction, they will get what they pay for from a seller. But 41 percent of online auction buyers reported having a problem. (Internet Fraud Watch, 2001)
“Consumers’ overconfidence that they will get what they paid for is one big reason why they easily fall victim to scams,” said Susan Grant, director of NCL’s Internet Fraud Watch, “Many donot know about the safe ways to pay in online auctions.”
NCL has launched a campaign for online user. The goal for their campaign was to educate the customers about how to make safe online transactions.
Morgan Stanley admitted that they are the latest online banking operation to have discovered a serious security flaw in its systems, which allowed fraudsters to access account details of customers. The latest instance is of greater concern, since fraudsters were able to enter other accounts by entering just the first digit of a credit card number.
"Security violations certainly aren't limited to Internet banks - they affect all banks which conduct transactions over the web" Chris Fedde, a senior vice-president of the enterprise division at Safe Net, an internet security company. "The worrying thing is that breaches happen on an alarmingly frequent basis."
The factors which are influenced due to the Internet Security in a nation are:
• Credit card fraud
• Website defacing
• Spam coming in
• Packet sniffing
• Hacking private information on your network
• Email relaying
• Virus attacks
These are few security threats, but most these problems can be solved using technical methods and few security threats can be covered by laws (Rhee, 2003). These security threats might be solved using Secure Socket Layer and also by making people aware of the frauds.

Secure Socket Layer
Secure Socket layer was developed by Netscape in 1994. The main goal of Netscape was to create encrypted path between client and server regardless of operating system. Netscape also designed SSL to take advantage of new encryption schemes as they become available, such as the recent adoption of the Advanced Encryption Standard, which replaced the Data Encryption Standard (Jones, 2002).
SSL uses both public-key and symmetric-key encryption technologies. Public-key technology steadily authenticates clients and servers, they also securely deal secret symmetric keys used in the encryption sessions. Symmetric-key encryption is much faster than public-key encryption technologies. So to encrypt the data symmetric key is used. SSL works with transport layer in the OSI model which supports the application layer, where both web browser and server operate (Michael, 2003)
Secure socket layer is a combination of two protocols:
• Record protocol
• Handshake protocol.
The record protocol controls the flow of data between two end points of SSL session. The handshake protocol is used to authenticate the two end points of the SSL session where it can encrypt and decrypt the data. SSL uses cryptography, certificates and SSL handshake protocol to authenticate the end SSL session (Shostack, 1995)

How SSL Works? Figure 1: Working of Secure Socket Layer (Network World, 1994)
As shown in Figure 1, first, the user sends a request to web server then the server checks for the user’s digital signature that contains public key. The server also checks for the expiration date of the certificate and issuer of the certificate with the trusted Certification Authority (CA). After conforming that, the user’s public key and signature is a valid one, the server then creates a secret key and encrypts it using the user’s public key and sends it to the user. The key which is created by the server is encrypted with the user’s key, so this can only be decrypted by the user. Then by using that key communication between web browser and web server would be done.
What is a “certificate” in SSL certificate?
It is a data structure that consist all the information about an organization which created it. It is cryptographically signed and can never be forged by fraudsters or hackers. For any website to be secure from fraudsters it should have a certification which should be purchased from the certification authority such as Verisign (Addison, 2002).
What is an SSL certificate?
Secure Socket Layer (SSL) is the normal security technology for creating an encrypted connection between a web server and web browser. SSL Certificates give a website the ability to communicate securely with its web customers. Without a certificate, any hacker and fraudsters can intercept and view the information which is send from the user’s computer.
The data between web server and browser remains private and secure. SSL is used by many websites to protect customers from hackers when they do online transactions. In order to generate a SSL link, a server requires SSL certificate. When you want to activate SSL on your browser there would be few queries about the identity of website and name of the company. Then the web browser automatically creates two keys- a Private and a Public key. It is said to be private because it can only be accessed by a key holder and very secure (Shostack, 1995).
The Public Key need not be placed secretly and is placed into a Certificate Signing Request (CSR) – a data file contains also the details when you order for SSL certificate, you need to submit the CSR to SSL. Then the Certificate Authority (CA) will view the details and issue an SSL Certificate containing your details and allowing you to use SSL. Your web server will match your issued SSL Certificate to your Private Key. Then the web browser will establish an encrypted link between the website and customers web browser (Network World, 1994)
The SSL certificate interaction with web browser and web server (see Figure 2):
• The browser checks whether the site you are connecting is real site and not intercepting by making sure that it has a certificate.
• The encryption types for the browser and website server should be easy to understand.
• Browser and Server use unique codes while the encrypted information is sent.
• The web browser and web server can now use encrypted messages to communicate with each other. The browser shows an encrypted icon in the address bar then it is conformed that the web pages are processed securely.( The Next Generation High Assurance SSL Certificate) Figure 2: Interaction of SSL certificate (The Next Generation High Assurance SSL Certificate METHODOLOGY
The Internet provides opportunities for small businesses to compete with larger business effectively and efficiently. At the same time well-organized fraudsters are targeting websites to obtain sensitive data and personal customer information via the Internet, creating security privacy concerns. The majority of the studies found were investigating the effects of security breaches on banking sectors and other global organizations. The purpose of this study is to survey and investigate user’s satisfaction on internet security by using Secure Socket Layer (SSL) and to make people aware of internet frauds.
Selection of subjects
The subjects for this study will be a sample of online user’s. The researcher will choose a sample of user’s, who use websites enabled with SSL certificate filters for transactions of personal or confidential data. The sample will transfer data through websites that have been used for the past few years. Thousand users will be selected using a random sampling method. The sample selected transacts data from the websites which use SSL certificate filters, the researcher feels confident that if sample’s data is not been hacked then the overall online users data will be secure from fraudsters.
Instrumentation
The research instruments in the proposed study will include: 1) online security survey; 2) face-to-face interviews; and 3) security breaches log sheet.
The first instrument is a survey which will be used to assess data on security of websites. Most of the items included in the survey instrument will include open-ended questions. It will attempt to discover whether they are aware of security breaches, internet frauds, and their knowledge of Secure Socket Layer (SSL) and its certificates. First, the survey will determine if there are any security breaches in the website (e.g., theft of information, web site defacement, denial-of-service attacks, and virus attacks). The survey instrument will also include questions to find out: Whether the website is secured using Secure Socket Layer Certificate or not. Another question that will be administered is how many websites use Secure Socket Layer (SSL) certificates to protect confidential data of online users from fraudsters. Current strategies used by the website to secure customer information will also be investigated and analyzed. The second instrument will be a face-to-face interview with network administrators who maintain those websites which mainly deals with security. They will be contacted and an appointment for the interview and the location for the interview are scheduled. The face-to-face interview will also include many open-ended questions similar to those administered in the initial survey instrument, including the general awareness of internet frauds and security attacks on the website.
The interview will attempt to gain an in-depth perception of what are SSL certificates? And how users are satisfied with security provided by SSL authentication? The interview will also include a discussion on the types of security breaches that cause the most problems for a website. This will also include whether they can see any difference in websites which use SSL certificates. Another question includes whether Secure Socket Layer certificate is reliable or not for a website. The third instrument is a security breaches log sheet which will be used to record the type of security breaches, when does the security breaches occur. This instrument will be handed over to the person who has been selected from a sample of online users after the survey.
Method
The complete study will be conducted over a period of twelve months. The online security survey and face-to-face interview research instruments will be used at the beginning of the study, and third instrument security breaches log sheets will be given to the subjects at beginning of the study to record security breaches using Secure Socket Layer during the twelve months period. The survey research instrument used at the beginning of the study is also used at the end of the study as well.
The purpose of this strategy is to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL) and to make people aware of internet frauds. All three instruments will be distributed online and comments of selected experts in this field are considered as a measure of validity. After validation, the survey instrument will be administered via internet and sample selected will be asked to complete and return the survey within 30 days. Other information and directions on completing the survey will be included in a cover letter.
The subjects who respond to the online survey will be contacted to conduct face-to-face interviews. At the end of the interview log sheets will be handed over to samples to record whether there are any security breaches even by using SSL and any changes that may happen during the year. The researcher will also gain permission to do an exit survey at the end of the twelve month period and request online users to maintain security breaches log sheets and return them along with exit survey. After twelve months the researcher will mail the security survey instrument through internet, and online users will be asked to complete and return the survey within 15 days along with the security breaches log sheets they maintain during the year. Other information and directions on completing the survey will be included in a cover letter. ANALYSIS
The data will be compiled and tabulated from the survey and interview instruments to answer the research questions 1, 2, 3, and 4. To answer the research question 5, the data will be divided into two groups to compare whether there is any correlation between websites which provide security by using SSL certificate against those websites that do not use SSL certificates to provide security from fraudsters. Finally to answer the research question 6, data which are gathered from all surveys will be validated and concluded whether users are satisfied with security provided by SSL authentication or not. T-tests will be used to determine whether users are satisfied by using Secure Socket Layer and its certificate to provide security to websites.
REFERENCE
Addison, R. D. (2002). Website Cookbook. Retrieved April 16, 2007, from http://books.google.com/books?vid=ISBN0596101090&id=y-HXEhZWdm8C&pg=PA206&lpg=PA206&ots=2coSy36mke&dq=define:SSL+Certificate&sig=vv_NA9ABt-0EwA8TIPpfRzY6BhE#PPA206,M1 Bangia, R. (2005). Internet and Web design. Retrieved April 17, 2007, from http://books.google.com/books?vid=ISBN8170085454&id=ExdHftLjETQC&pg=PA1&lpg=PA1&ots=VTIPnwR_qh&dq=History+of+internet&sig=YeBj4366gsH0LrBBahmQ3KPIsnc#PPA2,M1
BitEngines. (2002). Quality SSL. Retrieved March 25, 2007, from http://www.qualityssl.com/pdf/ssl_guide_intro_1.00.pdf Charles, J. (2005). Feds demand better online security by 2007. Retrieved March 25, 2007, from http://arstechnica.com/news.ars/post/20051018-5451.html
Internet Fraud Watch. (2001). Retrieved March 20, 2007, from http://www.fraud.org/internet/intalert.htm Internet Security Solutions. (2004). Retrieved April 20, 2007, from http://www.anonic.org/internet-security-solution.html Jones, A. (2002).SSL Demystified. Retrieved April 4, 2007, from http://www.windowsitpro.com/Articles/ArticleID/16047/16047.html?Ad=1
Knipp, E. (2002). Managing Cisco Network Security. Retrieved April 04, 2007, from http://books.google.com/books?id=AkogEl1gbREC&pg=PA346&ots=HRmWtLgQy3&dq=Cisco+Networking+Simplified,+Networking+and&sig=88vZDNT-jjsYYrVzXN1zglUZ6Bk Michael, H. (2003).Introducing Secure Socket Layer Protocol. Retrieved April 02, 2007, from http://diuf.unifr.ch/ds/michael.hayoz/docs/hayozm_ssl.pdf
Morgan, S. (2006). Consumers Want Better Online Banking Security.
Retrieved March 24, 2007, from http://www.consumeraffairs.com/news04/2006/04/online_banking_security.html
Network World. (1994).Retrieved March 25, 2007, from http://www.networkworld.com/details/473.html
Rhee, M. Y. (2003). Internet Security. Retrieved March 19, 2007, from http://books.google.com/books?id=bJJUVNGbrLsC&dq=internet+security Giacomello,G. (2005). National Governments and Control of the Internet. Retrieved April 02, 2007, from http://books.google.com/books?id=pLebIkWNfgMC&printsec=frontcover&dq=Warriors+%26+Hackers:+Writing+the+History+of+the+Internet
Shostack, A. (1995), An Overview of SSL. Retrieved March 20, 2007, from http://www.homeport.org/~adam/ssl.html Perkins, C.S. (1999). Internet Terminology and Definitions. Retrieved March 20, 2007, from http://www.rci.rutgers.edu/~au/workshop/int-def.htm The Next Generation High Assurance SSL Certificate. (NoDate). Retrieved April 4,
2007, from http://www.evsslcertificate.com/ssl/description-ssl.html

Similar Documents

Premium Essay

Security on the Internet

... Security on the Internet The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, is still growing and evolving at a fast pace, is probably impossible. Changes are needed, and once you have achieved a certain amount of size, the sheer inertia of the installed base may make it impossible to apply fixes. The challenges for the security industry are growing. With the electronic commerce spreading over the Internet, there are issues such as nonrepudiation to be solved. Financial institutions will have both technical concerns, such as the security of a credit card number or banking information, and legal concerns for holding individuals responsible for their actions such as their purchases or sales over the Internet. Issuance and management of encryption keys for millions of users will pose a new type of...

Words: 2435 - Pages: 10

Premium Essay

Internet Security

...Internet Security. Abstract Online users today are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses etc.; he/she is also exposed to sniffers, spoofing their private sessions; and they are also vulnerable to phishing of financial information. Not only this but users are also constantly subjected to invasion of privacy with the multitude of spy ware available for monitoring their surfing behaviours. If this is not all, users are also subjected to malwares that stop or totally destroy their machines render them helpless. These instances only indicate that the Internet is not a safe place for online users. Users are constantly vulnerable to hacked sessions, attacks and phishes that make them wary of going online. However, the trend does not stop at that. In fact corporations and government sector organizations are also faced with the same problems. Corporate information are being hacked; emails are read; government secret information are subject to security risks and banks are being hacked and millions stolen. Some of the reasons behind such attacks include the weaknesses inherent in the networks of the companies and government organizations; other reasons include carelessness of users. Whichever the case internet security issues have become one of the major concerns for technologists and users alike. There is a great need for understanding the nature of the attacks, the attackers, the networks, the loop holes...

Words: 10693 - Pages: 43

Premium Essay

Internet Security

...Internet Security Embry-Riddle Aeronautical University Table of Contents Abstract 3 Discussion 4 Background 4 Analysis 5 Conclusion 7 References 8 Abstract This paper focuses on five major areas of security issues on the Internet. Security concerns relate useful information to the average web surfer at home. There are tips on safeguarding one’s security and privacy over a network connection, plus some definitions of typical security problems individuals will come into contact with. The second focus of this paper includes the initial internet security measures. It will discuss the early security protocols and how technology has increased the security of the internet numerous times. Invention of internet security is the third topic of this project and focuses the invention and its impact on the Internet. The forth topic deals with the legal measures which have taken place regarding internet security issues. Finally, the fifth topic deals with the consumer privacy concerns, for the most part, people are becoming aware of internet security as online activities continue to skyrocket. As the technology becomes more available and easy to use, people seem to accept security risks in exchange for the convenience. Internet Security Since the early 1990’s, the solitary thing most people knew about internet security that there was a colossal computer network that had been inundated by a computer virus. Today it is difficult for anyone, to remember the...

Words: 1424 - Pages: 6

Free Essay

Internet Security

...need it. You and your family are at risk of virtual attacks. A decade ago, the Internet was something only “techies” talked about. It was a new limitless source of information, with very few users. Today, the Internet has already become an essential part of our lives. It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information. By the end of this decade, over 2 billion people will be connected to the Internet—that’s about half the world’s current population. But with all the good things the Internet offers us, it also opens the door to serious, potentially devastating threats. Unlike corporate and government computer systems, few personal computers have any safeguards beyond basic virus protection. That means anytime you’re online, you are a potential target for online criminals and hackers. And if you have high-speed Internet access, your computer is online most of the time, making Internet criminals and hackers a 24-hour-a-day, year-round threat to you, your personal information, and your family. Understanding how the Internet works and the security threats you face. When you access the Internet, your computer sends a message over the Web that uniquely identifies your computer and where it is located. This allows the information you’ve requested to be returned to you. Often, this requested information carries with it unwanted hidden software created by hackers and online criminals. This...

Words: 699 - Pages: 3

Premium Essay

Internet Security

...2. Internet security Internet Security, among different types of computer security, covers malware and hacking techniques. The Internet is an open zone where anyone can create a website that may place malware on your computer or server. This is also the space that gives shelter to people who are on the prowl to reach your computer or servers to access your data for misuse. You can divide the Internet into unknown and trusted sites. Trusted sites are simply the ones that you can trust, with a good example being your own office website. Obviously, you won't knowingly place any code on your own website to compromise the computer security of people visiting it. Another way to divide the Internet is into secure and non-secure zones. The secure zones are normally represented by a lock symbol in the address bar of your computer. An example of such sites can be your Internet banking site that employs high level encryption to secure their database as well as your computer. While you already know about malware, there are two more common techniques used by hackers to access your data: port knocking and packet sniffing. There are several ports on your computer that allow different applications to transfer data to and from your computer. A good application would instantly close the port as soon as it sends or receives information. However, there are some applications that delay or forget to close these ports. Sometimes it is the OS to blame. Port knocking, or port scanning, is the...

Words: 764 - Pages: 4

Free Essay

Internet Security

...Internet Censorship Name Institution Date Internet Censorship The number of internet users continues to increase daily and many of these users are young children. There are growing concerns regarding child censorship because the number of children accessing inappropriate adult sites is increasing. There is an urgent need to protect children online and ensure that they cannot access such sites, as well as protecting them from internet predators such as cyber bullies and paedophiles.One disturbing occurrence is that many children can now log into the internet from the privacy of their homes and gain access to all these sites. The internet has no regulations and is not governed by any body (Zuchora-Walske, 2010).Therefore that means that there are no checks as to the users of the internet, and this offers a risky proposition. Many people use the internet for retrieving beneficial information, but a large number also use the internet for things, which are detrimental and are inappropriate to the common population. Therefore, though child internet use is commendable, it should be carefully monitored to protect children from harmful elements. Children are often curious and are eager to discover new things on the internet, there is no limit to what children can discover, and this is dangerous. Censorship of the internet is therefore important because it ensures that there is safety as children navigate the internet. With censorship, children are able to access the internet without parental...

Words: 583 - Pages: 3

Premium Essay

Security and Privacy on the Internet

...Security and Privacy on the Internet There are a lot of articles in the newspapers these days about databases hacked, personal information stolen, bank accounts “cleaned out”, or credit cards erroneously charged. When it comes to security and privacy on the Internet, how well does the system protect the public? Are certificate based security protocols as safe as one is lead to believe? Will modifying the Internet Explorer’s settings provide adequate privacy? As the “tech” world evolves and smart phones and other wireless devices become the norm, how secure are the Wi-Fi networks? Part of the problem is the technology is moving so fast, the rules cannot even keep up. Encryption is considered one of the better ways to help keep personal information secure, and give the user a “warm fuzzy” when the closed lock is displayed. Mr. Miguel Helft, New York Times, expresses a concern with the certificates issued by a third-party organization to guarantee a websites authenticity. According to the Electronic Frontier Foundation, more than 650 organizations can issue certificates used by Microsoft’s Internet Explorer and Mozilla’s Firefox for encryption. These organizations are located across the globe, like Russia and China which are suspected of internal public surveillance, and raise the question if the issuing organization is misusing certificates to eavesdrop on internet activity. Peter Eckersley, a senior staff technologist at the Electronic Frontier Foundation, tells of...

Words: 1110 - Pages: 5

Premium Essay

Internet Security

...Security Assessment of Ping Sweeps and Port Scans Antoine Rivers Devry University March 7, 2014 System security administrators will say that their network has been probed at some point or another. Hacking tools have become widespread and many in number and will likely continue to do so. Network probes are not infiltrations in themselves, however, they should not be overlooked because they can lead to real infiltrations. My essay will try to explain the two methods behind the most common network probes and how they can be prevented. The most prevalent form of attack is the port scan. A port scan is when potential infiltrators discover services currently in use on a network device. The infiltrator then strategizes an attack on one of the vulnerable services. For instance, if the infiltrator finds that port 143 (the IMAP port) is open, they may try to find out what version of IMAP is in use on the network device. If the version is vulnerable, they may be successful in gaining access to the device using an “expoit” or a program that exploits a hole in security. Port scans are easy to create. All a potential hacker has to do is connect to any port on the device and search which ports respond. Port scanners can easily be programmed in little time in one of the programming languages like Java. Nevertheless, port scans are easily found by operating systems of the vulnerable device. Since these types of scans are transparent, infiltrators are less likely to run this kind of port...

Words: 539 - Pages: 3

Premium Essay

Internet Protocol Security

...MEANING OF INTERNET PROTOCOL SECURITY Internet Protocol Security is a framework of open standards for ensuring private secure connections over internet protocol (IP) networks through the use of cryptographic security services. It encrypts and authenticates each communication package on the network in a communication session. It can be used to protect communication between data hosts, security gate ways or security gateway and host. It has been deployed widely to implement virtual private networks. It supports two encryption modes, tunnel and transport. The transport mode encrypts only the data section of each packet while the tunnel mode encrypts both the header and the data section. On the receiving side, an Internet protocol security compliant device decrypts both the header and the data portion to present it to the user in a format he can understand. In the recent past there has been a lot of development in the information technology sector. Much if this development is based in information. It is therefore important to protect the information since it is not only precious and private, but if found in the wrong hands, it could be used to do a lot of damage for example terrorism. It has forced tech companies to develop secure ways of transmitting information without the interception of non-intended users. Information is a strategic resource. A significant portion of organizational budgets is spent on managing information. Hence information is a huge business where loads of...

Words: 1373 - Pages: 6

Premium Essay

Internet Security Today

...Daniel Kim 007781473 ENGR 350 Section 01 Current Event #1 The article begins by introducing Eugene Kaspersky, the “CEO of what is arguably the most important Internet security company in the world” (Shachtman). His company, Kaspersky Lab, protects over 50 million people today. However, Kaspersky Lab isn’t just an anti-virus company; it’s also a huge help in finding cyber-espionage. In 2010, one of Kaspersky’s researchers had found “Stuxnet”, a highly-sophisticated computer worm that targeted Siemens industrial software and equipment and became known as the world’s first cyber-weapon. Also, in May of 2012, Kaspersky Lab discovered “Flame”, another appearance of cyber-espionage aimed at Iran. Kaspersky’s prospect for the future of internet security is then mentioned, which includes “strictly monitored digital passports for some online activities and enabling government regulation of social networks to thwart protest movements” (Shachtman). He says that we are “too free”, that “freedom is good, but the bad guys can abuse this freedom to manipulate public opinion.” This is where people may agree or disagree with one another – whether to go with Kaspersky, an affiliate of the autocratic Putin regime who is also responsible for preserving the data of millions of people, or refuse and live with the risks of being allowed seemingly unrestricted freedom. The article continues on to describe the background and history of Kaspersky’s life, what goes on in his company, and...

Words: 859 - Pages: 4

Premium Essay

Internet Privacy and Security

...Abstract Have you ever bought anything on the Internet with your credit or debit card? Do you think other people wouldn't like to buy things with your cards, too? Have you ever given out personal information to register for a contest or special event on the Web? If so, beware. In this paper, I will attempt to explore various privacy and security concerns facing both businesses and consumers when they take part in electronic commerce. Although the Internet offers a wonderful social, personal, and business opportunity, it is also laden with hackers, plotters, and schemers. This paper will examine some of the challenges posed by these shady individuals and look at measures Internet users can take to avoid becoming their victims. To survive in today’s highly competitive business environment, successful E-businesses must market their products and services to individuals or other businesses that are “willing and able” to purchase their offerings. To assist them in identifying and targeting specific market segments, companies are now using data mining techniques to examine their databases looking for trends, relationships, and outcomes to enhance their overall operations. These databases, containing detailed consumer information, can be valuable resources for the companies that use them. They can help businesses to better understand the needs of their customers so they can react to the customer’s needs faster. Businesses can also utilize this information to cut production...

Words: 941 - Pages: 4

Free Essay

Internet Technology, Marketing & Security

...Internet Technology, Marketing, and Security Rocheen Pearson Dr. John H. Carter Contemporary Business BUS 508 February 22, 2012 Question #1 – Describe and evaluate a major corporation’s Website in these four areas: (1) product information, (2) corporation’s contact information, (3) customization of products for customers, and (4) customer information at purchase. Product information Sony actively uses customer feedback to improve its products. Opinions, reports of defective products, inquiries about using products and other feedback received through Customer Information Centers are reviewed and submitted to planning and design groups so that improvements can be made (Product, 2011). Sony established the Quality Hot Line in 2003, to gather product quality-related information, including reports of problems, as well as opinions from Sony Group employees. Employees can send messages regarding quality-related matters. The Quality Hot Line proposes and introduces measures to prevent previous problems from recurring and precluding potential new problems (Product, 2011). Sony has established dedicated quality management organizations in each of its business divisions. The headquarters' quality management and technology experts gather weekly and share quality issues among them. They are also responsible for monitoring the effectiveness of responses, ensuring they are consistent and help expedite Sony's quality improvement efforts (Product, 2011). Corporation’s...

Words: 1581 - Pages: 7

Premium Essay

Internet Technology, Marketing and Security

...Internet Technology, Marketing and Security ------------------------------------------------- BUS508029VA016-1122-001 Prof. Etido Akpan Internet Technology, Marketing and Security An online presence is vital for today’s businesses. Many major corporations use social networking and the Internet to market and sell products, which requires the collection of data in order to facilitate these purchases. Unfortunately this can leave these corporations vulnerable to security breaches in an attempt to steal the information contained in these databases. One major corporation that suffered a security breach recently was Sony Corporation, which had two database security breaches in 2011. Sony Corporation was founded in May of 1946 and is headquartered in Tokyo, Japan with a U.S. Division called Sony Corporation of America. They have approximately 168,000 employees worldwide. Their major product lines are audio, video, televisions, information and communications, semiconductors, and electronic components. In 2010 global consolidated sales and operating revenue were $7,181,300 billion Yen or approximately $89.8 million US dollars (Sony Corporation, 2012). Sony Corporation has two websites, www.sony.com for the U.S. business lines and www.sony.net for the global corporate site. Each website is very similar in its offerings. Product information is available with detailed specs, and there are options to purchase some products online or links to purchase from a Sony store...

Words: 1790 - Pages: 8

Free Essay

Assignment 4: Internet Technology, Marketing, and Security

...Assignment 4: Internet Technology, Marketing, and Security Bus 508 – Contemporary Business Abstract Modern business depends on complex electronic information systems that require computer and internet capability to keep that information flowing. There is a problem when someone outside of that business relationship between the business and the consumer interferes, or hacks, that information flow. An entire industry has been created to protect that information flow from being “hacked”. In 2011, Sony went through what is known as the largest security breach in history. The breach affected 77 million PlayStation Network users, 24.5 million users of Sony Online Entertainment and many more customers across the nation. All this was caused, according to Sony, by an “outdated database from 2007” (Lina, 2011). Assignment 4: Internet Technology, Marketing, and Security In 2011, there were more than 300 corporate security breaches. Sony, Citigroup, and Morgan Stanley Smith Barney are among the major firms that have reported to their customers that they have been hacked (Mintzer, 2011). Hacking is continuously happening to companies all over the world. Sony Corporation is a leading manufacturer of audio, video, game, communications, key device and information technology products for the consumer and professional markets. With its music, pictures, computer entertainment and on-line businesses, Sony is uniquely positioned to be the leading...

Words: 1284 - Pages: 6

Free Essay

Internet Security

...Internet Security Internet Security The interconnected nature of the Internet gives you around-the-clock easy access to information all over the world. It can also expose you to threats by malicious users who wish to access your personal, financial, or business information; prevent you from using the Internet; steal your identity; or access or damage your computer equipment or files in some way. The risks can run from a mere inconvenience to circumstances with serious legal and financial implications that can take years to resolve. As a person who is connected to the Internet, you should be aware of risks that using the Internet can carry and explore different ways in which you can avoid becoming a victim of online crime. The sections below describe some of the challenges you may face as you use the Web. Security From Hackers Hackers or malicious users can cause irreparable damage to key assets that support a company and its information. Preventing theft, interruption, or loss of this data becomes crucial. There is much legal liability to the potential loss of this data, so corporations must focus on how to prevent intrusions by these individuals. Denial of Service Attacks Maintaining the access and availability of corporate networks and electronic environments becomes more and more crucial as more information is dependent on this access. A denial-of-service attack occurs when intruders attempt to overload these key information assets, causing them to crash. This type of...

Words: 504 - Pages: 3