Latest topicsTop posters
Future of the NetSearch | Internet SecurityInternet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.
Web browser statistics tend to affect the amount a Web browser is exploited. For example, Internet Explorer 6, which used to own a majority of the Web browser market share, is considered extremely insecure because vulnerabilities were commonly exploited due to its former popularity. Now, however, browser choice is more evenly distributed (Internet Explorer at 29.7%, Firefox at 44.1%, Google Chrome at 19.2%, and so on); vulnerabilities are commonly exploited in many browsers. Examples of Internet SecurityNetwork layer securityTCP/IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet. These protocols include SSL and TLS for web traffic, PGP for email, and IPsec for the network layer security.
IPsec ProtocolThis protocol is designed to protect communication in a secure manner using TCP/IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography. To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP). These two protocols provide data integrity, data origin authentication, and anti-reply service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer.
Electronic mail security (E-mail)
Email messages are composed, delivered, and stored in a multiple step process, which starts with the message's composition. When the user finishes composing the message and sends it, the message is transformed into a standard format: an RFC 2822 formatted message. Afterwards, the message can be transmitted. Using a network connection, the mail client, referred to as a mail user agent (MUA), connects to a mail transfer agent (MTA) operating on the mail server. The mail client then provides the sender’s identity to the server. Next, using the mail server commands, the client sends the recipient list to the mail server. The client then supplies the message. Once the mail server receives and processes the message, several events occur: recipient server identification, connection establishment, and message transmission. Using Domain Name System (DNS) services, the sender’s mail server determines the mail server(s) for the recipient(s). Then, the server opens up a connection(s) to the recipient mail server(s) and sends the message employing a process similar to that used by the originating client, delivering the message to the recipient(s). Protection OnlineThere are various methods to protect yourself online, including:
Firewalls A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
Antiviruses Antivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware. Such programs are used to detect and usually eliminate viruses; however, it is now common to see security suites, containing also firewalls, anti-spyware, theft protection, and so on to more thoroughly protect users. Traditionally, a user would pay for antivirus software; however, computer users now can, and do, download from a host of free security applications on the Internet. | Log inPublic ShoutBoxWho is online?In total there is 1 user online :: 0 Registered, 0 Hidden and 1 Guest None Most users ever online was 5 on Wed Aug 31, 2016 4:41 am |
|
|
Mon Mar 14, 2011 11:15 am by Foxxx3
» Example Topic
Mon Mar 14, 2011 8:16 am by Champion
» Forum Rules
Mon Mar 14, 2011 8:09 am by Wael
» google chrome tab problems
Mon Mar 14, 2011 8:07 am by softwareGEEK
» What is your favourite search engine?
Mon Mar 14, 2011 8:02 am by minister
» Antiviruses
Mon Mar 14, 2011 8:00 am by Ahm4ad123
» Forums Complete
Sun Mar 13, 2011 6:30 am by waelACCOUNT1
» New Website Up and Running
Sun Mar 13, 2011 6:29 am by waelACCOUNT1
» speaking of search engines...
Sun Mar 13, 2011 6:29 am by waelACCOUNT1