Wednesday, 22 August 2012

Internet Security Procedures

By Karen Carter


Over last three decades, the internet has become a very risky means of communication in all sectors of daily life. It starts from very familiar virus attacks and now its approach to hacking, and spam attack are alarming and increasing day by day. The Drug and Crime Prevention Committee Report (2004) submitted to the Parliament of Victoria, Australia stated that 79% breach to their e-commerce system would most likely occur via the Internet or other external accesses.

Apart from increased connectivity and a wide range of new technologies, the Internet has also given intruders the opportunity to carry out a variety of attacks, and it also threatens the integrity of the infrastructure and violates the privacy of the users. Thus the matter of Internet Security is the main obstacle in the way of best performance of Internet Service Providers.

Internet security can be breached by different types of malicious software. Malware is a type of virus that forces itself into your computer system in the form of viruses, Trojan horses and worms. Viruses are usually simple programs that replicate their structure by infecting files on a computer system. Trojan horses pretend to be something harmless so the user is tricked into thinking that they are downloading something safe. This is how it gets into the system and infects it.

Some different types of internet security are as follows. Network layer security (TCP/IP) is developed to carry a secure communication on the internet with the help of a cryptographic method. SSL is this type of protocol. Electronic mail security is when a client uses MUA to create a user agent which is then sent to MTA. After that the message is extracted by the server. A multipurpose internet mail extension is a non ASCII data that are transformed at the senders site into a Network Virtual Terminal and then delivers it to the client through the internet.

Thus the Internet security can be defined as and designed for management of a procedure of security techniques such as encryption, authentication, physical security, line protection, and firewalls to prevent the Internet system, software, hardware, and other network communication from outside invasion. Different institution uses different solutions for their own problems which are raised from the security threats to retain their performance and survivability. If we want to have secure system we should take into consideration all of those above mentioned factors.




About the Author:



No comments:

Post a Comment