2. Internet security is the protection of private resources and
information on the internet. The information transmitted over
the internet has a high degree of security risks . There is no
central administrators on the internet . The data sent on the
internet travels different computers . Every computer reads
the data . Many people have access to internet the
unauthorized person can access data and misuse it .
3. Different risks on the internet are as follows :
Unauthorized access :
Unauthorized access is the most common security risk on the internet .
Hacker is a person who gains unauthorized access to the computer system for
malicious purpose over the internet.
Crackers also gains unauthorized access to computer for malicious purpose .
4. A cracker may steal important data from computer or copy a virus
program in system . The unauthorized person connects to computer
through internet to perfume illegal activities .
ONLINE PREDATORS :
Online predators are the very critical risk on the internet . The online
predators exist on website and chatrooms with harmful or inappropriate
material .They use the internet to talk with young peoples and to meet
them ,and to exchange photos etc. Children should not have
unmonitored access to the internet . Organizations are managing child
access to internet often use a proxy system . The proxy systems URL
check to block inappropriate websites .
5. Information theft is another is another critical security risk over the internet.it is a
process of stealing personal or confidential information without permission . The
stolen information can be further used for illegal activities.
EXAMPLE :
Someone may steal the credit card numbers of another person and can use it for
inline shopping or for other purposes .
7. A firewall is a set combination of hardware and software that prevents system from
unauthorized access . It works between an organization’s internal network and the
internet . It protects data ,media and all of a system from unauthorized access .
Encryption :
It is a process of encoding data so that only authorized users may understand and use
it . If an unauthorized person get access to the data he can’t understand
8. It is generated automatically and shared between two computers that communicates
with each other . This key is used to convert message into unreadable form. The
message can’t be read by it.
THIS METHOD IS OF TWO KEYS:
Secret key :
It is a private key , in this method both consumer use the same encryption key .
Public key encryption:
A public key encryption is used by all authorized users . While secret key is used by
both sender and receiver .
9. Keep hostage – keep off your files .
Avoid fake websites.
Spot scan emails.
Fire wall your data .
Take a look inside.
11. Access privileges ;
Some internet providers allow the parents to specify each children access privileges .
Blocking software :
Parents can protect children from immoral or vulgar websites by using these software
.
Child monitoring :
The computer used by children must be places at public area . The children should
not use the internet in their bedrooms .
13. Network security is a level of guarantee that all the machines in the network are
working optimally and users of these machines only possess the rights that were only
guaranteed to them.
THIS CAN INCLUDE:
Preventing unauthorized people from acting on the system maliciously .
Preventing users from performing involuntary operations that are capable of harming
the system .
Securing data from anticipating failure.
Guaranteeing that the services are nit interrupted.
14. Internet security has been a issue since the internet rose to international phenomenon
.
By 1996 the internet already connected 13 million computers , so early security
protocols were required .
15. Wi-fi protected access:
WPA encrypts the information and checks to make sure that the network security has
not been modified.
WPA also authorized authenticates users to help ensure that only authorized people
can access the network .
Wired equivalent policy :
WEP is an older network security method that is still available to support older
devices but it is no longer recommended .
16. Network security helps in protecting personal data of clients existing on network.
Network security facilities protecting of information that is shared between computers
on network .
Although this evaluation is in direct response to the changing business needs ,in
many cases security has ben an after cases .
17. Purchasing network cabling and file server can be expensive.
Managing a large network is complicated , requires training and a network manager
usually needs to be employed .
Viruses can spread to other computers throughout a computer network.
There is a danger of hacking ,particularly with wide area network . Security
procedures are needed to prevent to such abuse ,eg a firewall.