Wednesday, April 9, 2014

Internet Security Procedures

By Karen Carter


Internet Security is a branch of computer security which is related to the internet which can sometimes be cause of a real concern in society. The objective of Internet security is to establish rules and measures that will overcome attacks on the internet. The Internet represents an insecure channel for information interchange that often leads to a high risk of fraud.

Often we hear on the news that a popular website has been compromised and many people have had their personal data stolen. When a website is compromised, it leads to thousands of risks such as identity theft. Instead of hacking a particular site, data is collected through look alike sites, through spyware or through other means of collection, most of which happen on a single user basis. When personal information is given out to anyone online, many people become nervous because they are in doubt about what actually can happen.

Internet security can be breached by different types of malicious software. Malware is a type of virus that forces itself into your computer system in the form of viruses, Trojan horses and worms. Viruses are usually simple programs that replicate their structure by infecting files on a computer system. Trojan horses pretend to be something harmless so the user is tricked into thinking that they are downloading something safe. This is how it gets into the system and infects it.

Some different types of internet security are as follows. Network layer security (TCP/IP) is developed to carry a secure communication on the internet with the help of a cryptographic method. SSL is this type of protocol. Electronic mail security is when a client uses MUA to create a user agent which is then sent to MTA. After that the message is extracted by the server. A multipurpose internet mail extension is a non ASCII data that are transformed at the senders site into a Network Virtual Terminal and then delivers it to the client through the internet.

Thus the Internet security can be defined as and designed for management of a procedure of security techniques such as encryption, authentication, physical security, line protection, and firewalls to prevent the Internet system, software, hardware, and other network communication from outside invasion. Different institution uses different solutions for their own problems which are raised from the security threats to retain their performance and survivability. If we want to have secure system we should take into consideration all of those above mentioned factors.




About the Author:



Add to Technorati Favorites Bookmark and Share

0 comments:

Privacy protection , Benefits of spam filter , Spam blocker , Spam filter test , Privacy protection solution 2012

Back to TOP