Title: Internet Security issues
1Internet Security issues
- What looms in future ?
- Malathy Sundaram
- John Patrick Cullen
2Firewall
- A firewall is a component placed between computer
and networks to help eliminate undesirable access
by the outside - Privacy Versus Security
- Security Confidentiality, integrity and
availability of data - Privacy inadvertent disclosure of information
- Usually result of security breakdown in
confidentiality
3Intrusions by an employer to control employee use
of the computers and internet
- Is the email on a company computer personal and
private Can an employer read all personal emails
sent on the company computers? - Is the communication on the computer in the email
a private protected communication or does it
belong to the employer? Store only information we
provide
4Internet Security Intrusions by the government
- Patriot Act Activities- Anti-terrorism or
Sacrifice of Individual Civil Rights? - Can the FBI read all internet connected computer
related communications at any time by issuance of
a letter to the employer without going to a judge
for permission?
5Invasions for destruction by hackers
- Viruses arrive in email. The destroyer arrives as
a separate program. The email carries a program
and awaits activation orders and when activated
destroys according to its programmed plan
6Worms as attackers of internal systems
- Worms destroy data on the receiving computer
- Worms can formulate so many emails to be sent out
that it creates a zombie, a non-functioning
computer
7Security Tool to Combat Improper Users of the
internet
- Radio Frequency Identification - RFID
- Eye Pupil Analysis- Possible changes in addition
to passwords for access to company computers
8Protection from Intrusions ID Thefts
- Place a firewall between your PC and hackers
trying to steal your data - If you spot fraud online, file a complaint with
the FBI - Share scam tips and stories with other AOL
members. - Don't click a link in an e-mail message to visit
a Web site.
9Cookies.
- Remembers the settings or track surfing habits
- Third party cookies can circumvent security
- Store only information we provide
- Cookies leave a record of the computer sites
visited
10Security and E-Commerce
- Information transferred via routing packets can
be intercepted - Scams and Fraud
- Company can track purchase
- Always do business with SET or SSL
- Verify that encryption is used
- Check for digital certificate
- Verify that organization is legitimate
11Protecting Your Privacy
- Avoid filling online information
- Check with the Better Business Bureau
- Always look for symbol Truste
- Disable auto complete
- Disable the cookies
- Disable personal information
12Top 10 common mistakes
- Failing to understand exposure to attacks on
information and infrastructure - Failing to understand and address the
relationship between network and operating system
security - Architecting a system that issues too many false
alarms - Inadequately addressing the risk of security
breaches from within own organization
13Top 10 common mistakes contd
- Presuming the one line of defense is adequate
- Insufficient understanding of technology build
security that apply the problem - Think enablement as opposed to disablement
- Forgetting security is part of lifecycle
- Over looking physical aspects of security
- Relying on excessively weak trust or
authentication mechanism
14Future of Internet security
- Attackers
- Threats
- Platforms
- Solutions
- Future, there will be a greater dependence
control of critical infrastructure (power
generation, communications, transportation,
etc.). attact will in internet will be greater.
15Future of internet security cont
- the total number of new, documented
vulnerabilities in 2002 was 81.5 higher than in
2001. - Three blended threats (namely Klez, Bugbear, and
Opaserv) were the source of 80 percent of
malicious code submissions to Symantec Security
Response over the previous six months
16Future of Internet security contd..
- Increasing number of threats Targeted at
disabling security software - retro viruses that attack antivirus software by
deleting virus definition tables or memory
resident scanners - Windows has been the primary conduit for Internet
security attacks - emerging platforms that could become targets
17Future of Internet security contd..
- Simple Object Access Protocol (SOAP) typically
runs on top of HTTP can inherit any http bugs - IM systems lack encryption capabilities, and most
have features to bypass traditional corporate
firewalls - the possibility of an "over-the-air" Code
Red-type threat - significant number of unauthorized corporate
wireless networks will be exploited by hackers
18Future of Internet security contd..
- Broadband Code Red to tens of millions of home
machines - Peer-to-peer networks - circumvent security by
decentralizing security - Linux Slapper worm emerged and caused
significant outbreaks - Grid computing - their inherent connectedness and
distributed model - significant number of unauthorized corporate
wireless networks will be exploited by hackers - Online gaming - "always on" like IM is more
vulnerable to attacks
19Tips
- http//www.grc.com - the site will perform a
benign probe of your PCs ports communications
gateways to reveal whether vulnerable for attack
or not - http//www.kidmail.net
- A handy web interface lets you see the email
before kids do
20Suggestions
- organizations must employ a more holistic
strategy to incorporate the core objectives of a
comprehensive security environment. - the infrastructure needs integrated security
solutions to provide protection at all tiers - To maintain continuous service frameworks that
incorporate both technology and hands-on
expertise - Finally, organizations will have to bring their
alerting, protection and response systems
together under a central, open security
management system to ensure both reactive and
proactive protection .
21references
- Computer Privacy annoyances Dan Tynan
- Protect yourself online Mathew Danda
- Future source http//www.extremetech.com/artic
le2/0,1697,1164545,00.asp - http//thomas.loc.gov/cgi-bin/query/F?c1031./tem
p/c103UTyNEue4546 - http//www.advancedimagingpro.com/article/article.
jsp?siteSection34id2012
22 - Thank you !
- Have a safe surfing !