• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  • Level: GCSE
  • Subject: ICT
  • Word count: 6679

Information Security.

Extracts from this document...


Palestine Polytechnic University Department of Administrative Science and Informatics Information Technology Information Security By: Fadi Swate Mohammad A. Amro Mohammad M. Haddad Rana Al-Natsheh Somaya Al-Qwasmeh Presented to: Ms Ahlam Qura' 2004 Introduction What is computer security? Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. What's before applying security ? What resources are we trying to protect? A hacker who compromises or impersonates a host will usually have access to all of its resources; like files, storage devices, phone lines .. etc. and from a practical perspective , some hackers are most interested in busing the identity of the host , not only to reach its dedicated resources but also to have an opportunity to make a link or some connection to other target ,possibly more interesting targets. Other might actually be interested in the data on your machine , weather it is sensitive company material or government secrets. Many enhanced techniques enable the entering your computer although you have a security system. The strength of ones computer security defenses should be suitable to the threat outsiders. So computer security is not a goal it's a means toward a goal that is "Information Security". The last question to be answered before deploying a security is: How much security can be offered? We can spilt the cost in two parts direct financial expenditures such as building a firewall. so as a solution , machines with sensitive files may require extra level of passwords or file encryption , and we will talk about this later in this study. The fact is one or every one wants to protect all such resources , here the obvious answer is to stop attackers at the front door or not let them into the computer system in the first place. ...read more.


Back door and remote administration programs On Windows computers, three tools commonly used by intruders to gain remote access to user computer are BackOrifice, Netbus, and SubSeven. These back door or remote administration programs, once installed, allow other people to access and control user computer. Denial of service Another form of attack is called a denial-of-service (DoS) attack. This type of attack causes user computer to crash or to become so busy processing data that he is unable to use it. In most cases, the latest patches will prevent the attack. Being an intermediary for another attack Intruders will frequently use user computers for attacking other systems user computer is just a convenient tool in a larger attack. Unprotected Windows shares Unprotected Windows networking shares can be used by intruders in an automated way to place tools on Windows-based computers attached to the Internet. Mobile code (Java/JavaScript/ActiveX) There have been some problems with mobile code (e.g. Java, JavaScript, and ActiveX). These are programming languages that let web developers write code that is executed by your web browser. Although the code is generally useful, it can be used by intruders to gather information (such as which web sites you visit) or to run destructive code on your computer. It is possible to disable Java, JavaScript, and ActiveX in your web browser. its recommend that you do so if user are browsing web sites that he are not familiar with or do not trust. Chat clients Internet chat applications, such as instant messaging applications, provide a mechanism for information to be transmitted bi-directionally between computers on the Internet. Because many chat clients allow for the exchange of executable code, they present risks similar to those of email clients. As with email clients, care should be taken to limit the chat client's ability to execute downloaded files. As always, user should be wary of exchanging files with unknown parties. ...read more.


>> Confidentiality (a party to the transaction is assured of the identity of the other part) >> Nonrepudiation ( neither party can deny that the transaction took place) In an SET transaction , the merchant dose not have access to the credit card number because it is encrypted .The merchant forwards the encrypted credit card number to an authorization center , where it is decrypted and the purchase is authorized. This differs from the SSL approach, in the which the merchant has access to the credit card number. Security in e-commerce:- Established encryption methods such as Secure Sockets Layer (SSL), a protocol developed by Netscape Communications Corporation, encode credit card numbers and other information to foil would-be thieves. Shoppers can determine if the site they are using is secure by noting the "secure" icon at the bottom of their browser window. Also, the address bar of Internet browsers will carry the "https" prefix instead of the standard "http" prefix when the site is secured. Nevertheless, some consumers are reluctant to divulge credit card information over the Internet, and this reluctance has hindered the growth of e-commerce. An alternative to credit card information is digital cash, or e-cash. In this arrangement, shoppers pay for a number of virtual credits through a single source, then use those credits as dollars when shopping. After checkout, the online retailer ships the goods to the buyer and adds shipping costs to the purchase price. Few e-commerce sites, however, offer e-cash. Privacy :- In addition to credit card security, many shoppers worry about privacy. To put them at ease, many Internet stores post "privacy statements" that explain their policy of sharing or not sharing customer information with other businesses. This privacy policy may include refusing to give the customer's name and e-mail address to companies that send unsolicited and unwanted commercial e-mail messages, often known as junk mail or spam. The U.S. Congress is considering legislation to force online companies to safeguard the privacy of online shoppers. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Email and Email Security.

    4 star(s)

    Mail-VPN capabilities include: The Only Comprehensive Security Solution For Email Systems IronMail, an all-inclusive email security appliance, sits at the mail gateway between your network firewall and mail servers. Every connection to your mail server(s) passes through IronMail. IronMail is the first product designed to provide application-level security for email.

  2. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    HTML is broadly used to describe the content of web pages in the World Wide Web. HTML was designed for standard desktop computers with relatively high performance, a colour high-resolution display, mouse, sound system, and large hard disks. Web pages using the current HTML often ignore these differences in end-systems.

  1. ICT Systems in Everyday Life: Your Local Community

    Mrs Saville-Brown, who resigned as Devizes town center manager in November, set the momentum for the Devizes CCTV project and rose just under �60,000 form 39 organisations and businesses. She said: "The Calne CCTV project, together with a better communication strategy, will enhance the service and benefit the whole community.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    (viral marketing7) 3. Promotions and discounts offered Individually tailored to customer Customer can earn bonus points by joining the SK-II club and by purchasing SK-II products. The bonus point can be redeemed for either product discounts or free beauty services/ consultancy. Free samples can also be provided to customers for trial or with every purchase.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    Those who have virtual presence are called the E-tailers. Customers tend tend to expect a fast delivery service from Internet shopping. Also the introduction of EPOS systems, Supermarkets have put huge amounts of investment into these areas, this particular useful in providing businesses with detail information on sales. This system effects the supply chain and the channel for distribution.

  2. Unit 23: Investigating Communications and Networks

    than CAT5e Bad contact, Difficult manipulation, Slow for many computers, in general used in linear topology Category Type Spectral B/W Channel Length LAN Applications Cat3 UTP 16 MHz 100 meters 10Base-T, 4Mbps Cat4 UTP 20 MHz 100 meters 16Mbps Cat5 UTP 100MHz 100 meters 100Base-Tx,ATM,CDDI Cat5E UTP 100MHz 100 meters

  1. Defining computer viruses

    Third is the Macro Virus. It is written using a simplified macro programming language, these viruses affect Microsoft Office applications, such as Word and Excel, and account for about 75 percent of viruses found in the wild. A document infected with a macro virus generally modifies a pre-existing, commonly used command (such as Save)

  2. Bussines and Communication Systems

    problems, no paper in the printer or fax machine or a low battery in the phone lines. Section 2d: Effects of bad Communication in places of business i.e. work/school Good communication is essential to run an organisation like a school.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work