Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CS 2023unit III

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Unit III Internet Security

Hello Everyone
Welcome back to our MOOC course. Today we shall be learning Unit III and that is Internet
Security.
We all are quite familiar and used to with internet don’t we? Yes of course. Internet is a vast pool
of information and resources. Also we have numerous applications such as facebook, instagram,
tik tok to name some, which we use by connecting to the internet. Also we are quite used to with
sending and receiving emails via internet.
Internet actually is an inter-connected network of networks. Internet consists of thousands and
thousands of networks connected via some cables, most commonly fiber optic cables across
several continents. These cables also are laid under the sea and oceans across Atlantic and
pacific. These undersea cables also falls under critical infrastructure. This infrastructure needs
protection in order to function smoothly. While saying protection we are saying physical security
and logical security.
Physical security means protecting network infrastructure such as servers, cables and other
networking devices from some physical damages. Physical damage might cause by natural
phenomenon such as flooding, earthquakes, fire, hurricanes etc. and sometimes by intentional
purposes such as sabotage, vandalism etc. Either way we need to be vigilant and try to maintain
network infrastructure in maximum protection by adopting strong physical security means.

Likewise our internet infrastructure might be vulnerable from logical threats that covers all
aspects of online digital infrastructure — including networks, websites, and browser security —
and also involves applications or software services that rely on network or internet connections.
Here in this section we shall discuss in these aspect in detail.

Some common internet security threats.

 Malware: Malware is malicious software that infects your device. Computer viruses and
ransomware are some of the many different types of malware.

 Ransomware: One of the most devastating types of malware, ransomware hijacks your
computer files and encrypts them, which is some mechanism that locks your information,
until you pay to have them decrypted which is a mechanism that unlocks your information.

 Botnets: Networks of infected computers are called botnets, which are controlled via
secrete remote access and used to launch Distributed Denial of Service attacks that can
crash websites.
 Hacking: Hackers are known for exploiting vulnerabilities in computer security systems
to access files and data. They may try to spy on you online or install malware on your
system.

 Phishing: Usually starting with links sent via email or text, phishing tricks you into giving
over personal data — like login credentials or financial information. Phishing is one of the
most common internet security threats today.

 Wi-Fi threats: Many internet security threats target Wi-Fi networks, either by gaining
access to routers or hacking smart home devices.

Essential internet security measures


The following processes and tools are fairly easy to introduce and, combined, they will give you
a basic level of security against the most common internet threats.

Use strong passwords


Strong passwords are vital to good online security. Make your password difficult to guess by:

 using a combination of capital and lower-case letters, numbers and symbols


 making it between eight and 12 characters long
 avoiding the use of personal data
 changing it regularly
 never using it for multiple accounts
 using two-factor authentication

Control access to data and systems


Make sure that individuals can only access data and services for which they are authorised. For
example, you can:

 control physical access to premises and computers network


 restrict access to unauthorised users
 limit access to data or services through application controls
 restrict what can be copied from the system and saved to storage devices
 limit sending and receiving of certain types of email attachments
Modern operating systems and network software will help you to achieve most of this, but you
will need to manage the registration of users and user authentication systems - eg passwords.
Put up a firewall
Firewalls are effectively gatekeepers between your computer and the internet. They act as a
barrier to prevent the spread of cyber threats such as viruses and malware. It's important to set up
firewall devices properly and check them regularly to ensure their software/firmware is up to
date, or they may not be fully effective.

Update programs and systems regularly


Updates contain vital security upgrades that help protect against known bugs and vulnerabilities.
Make sure that you keep your software and devices up-to-date to avoid falling prey to criminals.

Monitor for intrusion


You can use intrusion detectors to monitor systems and unusual network activity. If a detection
system suspects a potential security breach, it can generate an alarm, such as an email alert,
based upon the type of activity it has identified.

Raise awareness
You have a responsibility to help keep your system secure. Make sure that we understand our
role and any relevant policies and procedures, and update with regular cyber security awareness
and training.

You should also follow best practices defined by the government.

Use security software

You should use security software, such as anti-spyware, anti-malware and anti-virus programs,
to help detect and remove malicious code if it slips into your network.

how to detect spam?

Spam is unsolicited communication that now makes up the majority of email traffic. Your
internet service provider should offer you spam filtering as a default feature of your
dedicated email service.

Spam filters detect unwanted emails based on suspicious word patterns and other clues,
and divert them to a separate folder or mailbox after classifying them as spam. You can
buy separate spam filters or programs to reduce the spam you receive and securely
manage your inbox

How to detect a virus or malware


Common signs of virus or malware infection include:

 system slowing down


 unexpected activity on your machine or pop-up messages
 email server becoming overloaded or intermittent
 data files becoming corrupt or going missing
 unexpected changes in the content of your files
If you notice these signs and suspect a problem, use your security software to diagnose
the issue. Your software provider may be able to offer you advice.

Virus or malware recovery


If a virus has infected your system, follow these five basic recovery steps:

1. Tell everyone who needs to know


If the virus is spread through email, tell everyone with an email account on the infected
system as quickly as possible. If there is a specific file attachment that contains the
malicious virus program, name it.

2. Quarantine infected machines


As soon as possible, disconnect infected computers from any internal or external
networks. Do not reconnect until after you remove the virus.

3. Organise a clean-up operation


Use your anti-virus software to scan all computers and files to check if the virus has
spread. If you can't remove the virus or malware, you may need to restore your computer
files from a recent backup. In extreme cases, it may be more practical to wipe the infected
computer, reinstall the operating systems and restore your files from a recent, clean
backup. If necessary, contact your software supplier for specific advice.

4. Make sure there are no re-infections


Carry out emergency security measures and inform the users that clean-up is underway.
Ensure that additional patches are in place to prevent re-infection.

5. Manage outgoing email traffic during the crisis


Use whatever facilities you have to prevent the transfer of the virus via email. Consider
closing down the outgoing mail service.

Now we shall learn how to protect our networks.


Computer network security breaches are in the news often, and they’re costing organizations
huge amount. Therefore protecting our system is very critical.
Still, it can be difficult to understand how to secure a network with maximum effect. Fortunately,
there are some computer network security best practices that can be implemented today to secure
data and build more impenetrable protection against hackers and viruses.

1. Install and monitor firewall performance


A firewall is designed to block unauthorized access to computers and networks. In
essence, a firewall is a set of rules that controls network traffic — incoming and
outgoing. Computers and networks that pass these rules are granted access, and those that
don’t are walled out.
2. Install Anti-virus software
It is very essential that every network and system are installed with antivirus software.
Anti-virus software are an important utility software that are developed to protect our
digital assets. These anti-virus software need regular updation so that it can detect latest
virus that are on the rise. These software help our computers and network scan on regular
basis for any malicious scripts present in or not.

3. Update Passwords When Needed and/or Yearly


It is recommended to change passwords whenever there’s reason to suspect they’ve
been compromised, and annually even if they appear to remain secure.

4. Create a virtual private network (VPN)


VPNs create a more secure connection between remote computers and company servers.
With a VPN, only those authorized to access your systems will be able to do so. A VPN
can dramatically decrease the likelihood of hackers finding a wireless access
point and wreaking havoc on your system.

5. Train the users


Every preparation you have won’t be effective if the people using your system aren’t
following security best practices. Frequent reminders about risks and mitigation steps
can help them keep network security at the forefront of their attention. So regular
meetings, trainings and workshops can help mitigate risks.

6. Filter and delete spam emails


Try not to open those email that are suspicious in nature. They may allure you by sending
links offering gifts, wishes, picture of popular person. Properly check the email address
and open only when you are sure that you know the sender. We can use filters and can
delete spam emails to avoid risks.

7. Shut down computers when not in use


It is often recommended to shut down computers when not in use. Letting computer on
and staying connected to internet might pose risks from hackers who are always tempting
to penetrate networks and steal information.

8. Encrypt your files


It is highly recommended to lock our files by using encryption technique so that only the
owner who have keys to unlock the file can open. This way we can be assured that our
information is safe even if they are stolen.

9. Secure personal devices


We often use many devices for our different purposes. Mobiles and tablets are some
common gadget that are common among young population. We can install protection
system in our device to protect from any risks. Using anti virus software can prevent
infection in our devices from several viruses and worms. Also using strong password to
lock our device is recommended.

There are also some best practices to boost our internet security with the following best-
practices:

 Use internet security software to strengthen your online security automatically.


 Block your webcam access unless you’re actually using it.
 Use an ad blocker to help protect against malicious links online.
 Set parental controls to keep kids from accidentally downloading malware or viewing
inappropriate content.
 Use a device-cleaning tool to clear unused apps and remove unnecessary files.
 Scan your phone for spyware, ransomware, and other threats that can infect your device.

To conclude, I recommend you to be vigilant towards the threat posed while we are using
internet. It is our responsibility to use the internet in a safe way and not to act in such a way that
your action can harm others. Thankyou.

You might also like