Internet security

The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.

Рубрика Программирование, компьютеры и кибернетика
Вид контрольная работа
Язык английский
Дата добавления 07.08.2017
Размер файла 21,0 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru/

MINISTRY OF DEVELOPMENT OF INFORMATION TECHNOLOGIES AND COMMUNICATIONS OF THE REPUBLIC OF UZBEKISTAN

INDEPENDENT WORK

Subject: "Information Security"

Theme: "Internet security"

Executor: Group: 517-15

Sarvar Kulmatov

Examiner: Mardiyev Ulugbek

Tashkent - 2017

Before starting that topic I would like to talk about the XXI century. As the XXI century came in a new era time. The era time gives a denote as a new type of revolution of everyone of us. In the XXI century so many thing got turned into different views. Let's say a heavy type viewed cars got changed or altered into slim shape and get modernized so as to let all drivers feel themselves in a comfortable comfort. But the most powerful turning out appeared in technology. The reason everything is already alternated into the sphere technology. Not only technology but the virtual life came up after the technology's invention. As the part of people is Internet. The part of defending ourselves from various of vulnerabilities will be looked through at coming down.

Information Security is the whole aspect of technology. Almost all users of technology such as computers, gadgets and like these essentials are connected to the Internet. Internet is a widespread connection all of the world. In this section of technology computer and person are having a communication with each other. Precisely writing, User uses a technology and Internet is also depended on the technology. These two combinations are up to their functionality works. As it is a vivid fact as the first of them came as technology. By the invention side the most powerful invention among other left innovations is computer which was as the first calculation or counting machine. Step by step it became much more complex than usual time. Apparently, we can see that technology does not stay in one atmosphere for a long time. Anyway, there reveals a new way of using these equipment. At the present time people can not imagine their living conditions without Internet. Internet is really useful network which lets faces be in a touch. That's also regarded as one storage which keeps all information all over the servers of the world. In addition, that claims to be the intellectual sphere of artificial skills. What there gets meant? After its coming up in our life, people got much more faster and lazier than usual time. Let's give one an exact instance, before in 1950s years all dwellers tried to get information from books which were published in a public. Aftermath all intrigued humans were forced by their brain to get them and acquire with new sources into their mind. Now, it is easy, once you type on the Google, you will get an exact answer with the entire details. Actually, it is good. Because we no need to waste our time by inquiring into the books instead of one click will be enough. In a word everything what we need is Internet.

As these all lines were only about good position of Internet. As that too has the other side of coin. Not only does it get used for appropriate purpose but also does it get used for violation. Currently, it is called as provocation all users into bad habit. In this case we need to have a strong protection from this. For this matter it is called as it was mentioned above Internet Security.

What is actually Internet Security? That actually can not be responded with one word. But it can be told that all computers which are connected to the wired or wireless networks which are providing with this function. Security should be provided or given by the person fully well. The reason new technology era does not take in account even strong protected crypto system. It demands much more better not invented master piece by human. Functions of Security are categorized into several parts which will be described or fulfilled later by the topic. The other name of internet security is Cybersafe.

We are living in an open information century where you can not hide anything from anybody everything is able. After all it is job of occupation which is called Information Security.

In Internet Security the most required protection is data. Databases are being created by the huge companies, corporations, governments and military services and other left the most powerful organizations. Databases are preserving all necessary data information which gets used so as to use for one purpose. Actually, like this database is being created by administrators or qualified job dealer by using a great device which is known as "Server". As these computers which are targeted to these databases' information use a LAN which also has a second name NETWORK.

Network- is regarded the main function or feature which lets all people be in a touch with each other all of the time. Network gives an opportunity to have an access to the machine in which we're going to be by seeking a data or get shared folder. In a word saying it's the most protected side ever. There are some of the functions and they are TC/IP, VPN and Configuration them. Each of them has its functionality that is giving the route of being connected.

In Internet Security there is one more disgusting side. As each person gets on the Internet by surfing the web pages on the web sites where various of form information is being published by individual host. That time nobody knows what kind of content might appear when it gets loaded, may be there exists a virus which can be uploaded. Viruses are also different by its type. For this case, there is an essential side and it is called Antivirus. At the present time, Antivirus diversity are different. The main of them is to defend computer or data from any harm or attack.

Antivirus - can be derived simply as against to the virus on the computer. Actually, viruses are made for attacking to the data and bases then steal them. So as to be defended from them need to install a good ones of antivirus which can be believed. As a vivid fact a payable antivirus all the time offers a good type of service to all customers. Aftermath daily updates also should be done. Not only installation but other left complexity of setting must be done perfectly.

Not only users should have these defending options in the atmosphere of Internet Security but these Internet sphere dealers should get the same of functionality. They are called as web site holders. Who are creating and distributing the web sites may be by themselves or by the order of the clients. Such a great type of protection should be set up. Let's give a brief an explanation for this case. Each of the website has been taken in an account by the government. The exact purpose is to prevent the country from the provocative information and having the strike by grouping people. That's why each web site is being verified moreover, in order to preserve web site holder from various of attacks there should be done such a great type of configuration.

Web site - is the most demandable content of our time in which people are gathering much of the information and share it among themselves. The content all the time gets filled by web site owner. Web site might have a simple appearance but the server side should be protected really hard. Then the backside of server supporting is called as back-end. Where heterogeneous special codes are written in order to defend from different hacking in Internet security. That gets done by back-end developers. In addition that can be told the protocol such as https:// and http:// are distinguished from each other at all. http:// is used in a most cases. That is not defended highly but can be perfected with back-end but https:// is strong. Though it also can be attacked. If a website has a comment form in itself people might leave after themselves a lot of comments. Currently, there are bots which are getting on the web sites then leave these comments automatically. For this matter there is used a special tool type CAPTCHA. It is preventing bots from adding these comments. That is called as spam. That breaks the status of functionality of the web site.

Data Transfer - data transfer is being done by big company or corporations so as to have an exchange with their partners and other left reasons can be for this situation. As the most powerful item is data. In most cases it gets done by banks. Banks are all the time get secured with the high protection. Than money transfer is also included into data transfer. For this case there must be used a crypto system. Crypto system must be identified to each client or staff individually. These crypto systems' keys should be kept secretly. Apparently, transfers are executed online.

Additionally, at the present time all well-dealt workers are all the time online even when they leave their laptops at home or in the office rooms the connection gets left with status on. There are might come different reason of leaving with this condition. Let us tell some of them. The first one is to get an access to that device by using a phone in a distance then make any of transfer or get some information and etc. For this case, they definitely set up a strong kind of password on their computers though the password management also should be done.

Password Management - is the process when a user or server gets a special password. That time the passwords are picked out as much as possible hard. As everybody knows this gives much more better effect to be protected from variety of hackers or program bots which are penetrating by breaking the system. Consequently, there exists a branch which is provoked with name password management. In this branch a password management has been playing the main role. The exact explanation passwords should be checked out and taken the most powerful one. There are some specialized programs which a based on this function. Let give a brief detail. When a computer is provided with a password there get used merely a method of something you know. Because mind information is used for that case. Though the program of password management does it instead of human. What principle gets worked in this section? The password has been verified every two or three hours and will be replaced with new one. That time the informative message is going to be sent to phone then an application for this matter gets used and the laptop can be opened.

In fact majority computer users are using only fake or copied software types. That actually brings to the fail of procedure of working. There might come about many of the victims who will suffer from the usage of them. Not in vain these products are being shared among all faces. The exact point is to infect the devices and spread the nested viruses all around the world as soon as the connection of Internet is being started. That's why all informed people are trying to install only original products of software by not having any of risk with their data. Almost all impact able corporations and companies are prevented from that main disgusting occur by obtaining only original things. That is also one step over the protection.

Here one more of the fact which is about to be declared with specification. For the beginning I would like to tell one thing about the applications on our phones. They are all being downloaded from the common sources such play market and other left of them. Led information can tell if any application gets uploaded on the phone without having any type of documentation there will appear an accurate risk of getting malware on the device. Precisely, this malware is being appointed to overhearing. What overhearing does. Overhearing is a function which is being implicated by the hacker or like this face deliberately. The exact is to get the entire information from the phone conversation. As the result all presidents and in a high leveled dealers or business workers are attempting to use merely secured phones which are preserved from like these disgusting occurs. Let's take one an instance for this fact which was mentioned. In some newspapers there are posts where are written how the presidents are being followed or overheard by group of hackers. But that does not happen so often. What we can tell by this point in a conclusion. Not all the time not trusted of the applications should be downloaded. That leads to the failure of the working process. In most cases the necessary of the information might get lost because of one mistake of your side. For this case only needed applications should be downloaded and if it is possible only payable of them should be obtained which will be serviced fully. That means with an eased conscience you might go outside by holding conversation with anybody.

Let me give some of the lists of Information security policies. They are taken from the website and will be interpreted into the paper.

Hackers. As the hackers are implied to be into two categories. One of them is white-hat hacker and the other one is black-hat-hacker. Their function is in one goal. That is breaking the system and get the entire information. But white-hat-hacker is distinguished from that point. The main idea of this type hacker is to prone into the system by the asking of site or server owner whether it is stable against to the black-hat-hackers. If there comes some of the problems with defending, it will be solved immediately. That is taking any disgusting happen in advance. As black-hat-hacker is intended to steal all valuable information without having any permission and threat the owner.

Protection from Hackers:

I. For the beginning such a high level of encryption technology should be set up on the server of website.

II. The website should be secured with SSL certificates.

III. Restricted access to employees must be set up, only authenticated faces can get an access.

IV. Install special tools. For example, anti malware, anti phishing for scanning to detect vulnerabilities.

Infected websites. These days all websites are having different advertisings on the pages. The reason of having them is to get money for sharing. But not all of them are having the same type of structure. In some addresses when a user gets on the site there might appear a pop-up window where a simple clicking on cancel or ok is getting required. As soon as one of them gets clicked the storage of the system will be stored or abandoned by Trojans which are infecting the entire operation system. internet security protection hacking

Protection from that case. Need to escape of getting on not trustworthy website where nothing of the secured system is being assured. Unless it has a certificate or you have a special antivirus, they should not be visited at any time by not getting into the risk.

Not secured Wireless access point. Connecting to the wireless connection is not such a safe as we know about this. For foremost, the connection should be at first identified whether a person gets on exact connection by inputting the entire information so as to get an access to the communication. But there exists one an endangered situation. It's related to the Broadband router where majority of people are getting connected for free. In that case the rate of being attacked by any harmful dealer will be burgeoned unexpectedly. Moreover, when connection gets done any bad behaved person might catch your network and use your data by transferring into his/her data storage.

Protection from this disgusting occur:

I. Should keep the ID identifier as hidden

II. Blocking a pop-up MAC addresses

III. Encrypting the WEP and WAP all the time

Social engineering. In social engineering majority of the employees are having these tests where they should have a fast typing by practicing on the computer. Aftermath they have been improving their abilities. There are some of the programs where they should input their personal information however, only once it should be performed. There is also one tricky side after working with program there can be popped up an alert by asking a person to enroll an information by writing a bank account.

Protection from that case. I. Implement to close the access to all not authorized users to have this permission on working with program.

II. Educate or tell to all staff not input personal information whenever it gets asked by the machine unless a special specialist comes by verifying it.

Back Doors on the website. That is also the same as back-end. But there should all time be entered different codes so as to be prevented from distinguishable attacks by hackers.

There is also one more trick which is called as back door where a code is being interpreted into a simple text and an owner is required to confirm it. If a web site owner does not have knowledge by web site it will destroy the whole restrictions to the web site then it will be handle to breakers.

Protection from the back door:

I. Should call a special web developer or specialist by that sphere.

II. Must obtain merely authorized products where a warranty is provided by the company.

III. Must test when a fresh software product is installed.

Brute force. Brute force is not an easy hacking system. That demands much of time from hacker to identify the key of cryptology which is used on the website by exchanging various of data types. If it gets manifested by hacker, it will be broken down and the full of control of seeing the messages and other left information will be taken in the hands. Even the changing the passwords and IDs will not be affected to this.

Protection from the Brute force:

I. Such a strong of encryption technology must be installed and the passwords should be sophisticated.

II. The password system must be verified from time to time and the changing also must be done frequently.

III. The precautions of the users must be informed and their safety provided really hard so as to keep their data in a trustable service.

Denial of Service or abbreviated word (DOS):

That attacking style is regarded as the simplest and the most ancient one ever. Style of DOS is based on the simple attacking and that is sending so many requests so that server should be lagged by not having enough memory to operate or service them from once.

Defending from DOS:

I. Keep a data backup and place them at a safer place.

II. Specified tools must be installed and the going against to the DOS system program's structure should be defended.

Password guessing. That is a common way of getting on the system by predicting the password of the website or server in a distance or something like this. For this matter hackers are trying to use a special group of programs which are constructing algorithms which will start guessing the password. Possibilities of passwords will be structured.

Protection from the password guessing:

I. As a proven proof is choosing a strong password

II. As soon as the attempts number reach to 3 the ID identification should be deleted immediately by not giving a chance

III. Change the passwords on the sensitive network components

IV. Password must contain all of the characters such as capital and lower letters, numerical and short alphabets.

Random Dialing: That is based on the modem's connection. As the main basic side of connection is up to the modem and the modem is working due to the digital numbers. These digital numbers are used on the phones. The hijackers of virtual life might get the guessing by penetrating with dialed numbers of phone.

Protection from the Random dialing:

I. Modem must be secured with cryptology.

II. Modem must not be smashed up with other left of them.

Размещено на Allbest.ru

...

Подобные документы

  • Information security problems of modern computer companies networks. The levels of network security of the company. Methods of protection organization's computer network from unauthorized access from the Internet. Information Security in the Internet.

    реферат [20,9 K], добавлен 19.12.2013

  • Классификация вирусов, методы защиты от них. Виды и типы антивирусных программ. Антивирус Kaspersky Internet Security 2012, компоненты защиты и мониторинг сети, достоинства. Динамика изменения возможностей антивирусов по лечению активного заражения.

    курсовая работа [467,8 K], добавлен 06.09.2013

  • Practical acquaintance with the capabilities and configuration of firewalls, their basic principles and types. Block specific IP-address. Files and Folders Integrity Protection firewalls. Development of information security of corporate policy system.

    лабораторная работа [3,2 M], добавлен 09.04.2016

  • Data mining, developmental history of data mining and knowledge discovery. Technological elements and methods of data mining. Steps in knowledge discovery. Change and deviation detection. Related disciplines, information retrieval and text extraction.

    доклад [25,3 K], добавлен 16.06.2012

  • IS management standards development. The national peculiarities of the IS management standards. The most integrated existent IS management solution. General description of the ISS model. Application of semi-Markov processes in ISS state description.

    дипломная работа [2,2 M], добавлен 28.10.2011

  • История развития сети Internet. Общая характеристика сети Internet. Протоколы. Услуги предоставляемые сетью. Internet - мировая сеть. Компьютерная зависимость. Internet-2. Нехватка мощностей Internet. Создание Internet-2. Структура Internet-2.

    контрольная работа [19,5 K], добавлен 06.10.2006

  • Сrime of ciber is an activity done using computers and internet. History of cyber crime. Categories and types of cyber crime. Advantages of cyber security. The characteristic of safety tips to cyber crime. Application of cyber security in personal compute

    презентация [203,5 K], добавлен 08.12.2014

  • Internet. Протоколы сети Internet. Принцип работы Internet. Прикладные программы. Возможности в Internet? Правовые нормы. Политика и Internet. Этические нормы и частная коммерческая Internet. Соображения безопасности. Объем сети Internet.

    дипломная работа [128,8 K], добавлен 23.06.2007

  • Overview history of company and structure of organization. Characterization of complex tasks and necessity of automation. Database specifications and system security. The calculation of economic efficiency of the project. Safety measures during work.

    дипломная работа [1009,6 K], добавлен 09.03.2015

  • A database is a store where information is kept in an organized way. Data structures consist of pointers, strings, arrays, stacks, static and dynamic data structures. A list is a set of data items stored in some order. Methods of construction of a trees.

    топик [19,0 K], добавлен 29.06.2009

  • Проблемы оценки клиентской базы. Big Data, направления использования. Организация корпоративного хранилища данных. ER-модель для сайта оценки книг на РСУБД DB2. Облачные технологии, поддерживающие рост рынка Big Data в информационных технологиях.

    презентация [3,9 M], добавлен 17.02.2016

  • Что такое Internet? Internet, как средство массовой информации. Службы Internet. Сетевая пресса. Структура Полит.Ру. Статистика. Рейтинг. Из чего состоит Internet? ICQ – новая возможность общения. Административное устройство Internet.

    реферат [20,2 K], добавлен 10.05.2003

  • Исторические предтечи Интернет - ARPAnet, LAN, Ethernet, NSFNET. Взаимоотношение структуры Internet и пользователя. Потенциальные пользователи. Доступ в Internet. Работа Internet: организация, структура, методы.

    реферат [69,3 K], добавлен 12.06.2007

  • Административное устройство Internet. Потенциальные пользователи. Работа Internet: организация, структура, методы. Дозволенное в Internet. Наиболее распространенные возможности Internet. Удаленный доступ. Передача файлов. Электронная почта.

    статья [71,4 K], добавлен 28.11.2002

  • NANO Security - сплоченная команда молодых специалистов: программистов, аналитиков, тестировщиков, менеджеров. Предметная область, назначение разработки, требования к программному изделию, системы управления обучением. Обзор языков программирования.

    отчет по практике [1,1 M], добавлен 22.07.2012

  • Классификация задач DataMining. Создание отчетов и итогов. Возможности Data Miner в Statistica. Задача классификации, кластеризации и регрессии. Средства анализа Statistica Data Miner. Суть задачи поиск ассоциативных правил. Анализ предикторов выживания.

    курсовая работа [3,2 M], добавлен 19.05.2011

  • Основные характеристики технологии Server Side Includes (SSI), главные серверные включения и их атрибуты. Включение механизма SSI, базовые директивы и подстановка переменных. Формирование страницы из шаблона в SSI, пример начального файла сервера.

    курсовая работа [33,3 K], добавлен 15.05.2014

  • Понятие компьютерных вирусов, их виды и классификация. Основные признаки заражения компьютера. Антивирус Касперского, Dr.Web CureIt, Nod32, Avast, Norton AntiVirus, Panda, McAfee, Avira Free Antivirus, ADinf32, NANO Антивирус, 360 Total Security.

    презентация [2,8 M], добавлен 14.05.2016

  • Принципы формирования имен в сети Internet, элементы браузера Internet Explorer. Добавление Web-страницы в список избранных. Средства ускорения доступа к часто посещаемым страницам. Способы обеспечения доступа к ресурсам сети Internet в автономном режиме.

    лабораторная работа [3,4 M], добавлен 24.05.2015

  • Общие сведения об Internet/Intranet. Основы технологии Internet/Intranet. Принципы организации WWW. Корпоративные Intranet-сети. Преимущества и недостатки Internet/Intranet-технологии. Архитектура Internet/Intranet-приложений.

    реферат [27,6 K], добавлен 23.05.2007

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.