The content is just an excerpt from the complete note for SS2 Second Term Data Processing Lesson Note – The Internet II. Check below to download the complete DOCUMENT

WEEK: 4      

CLASS: SS 2

TOPIC: THE INTERNET II

CONTENT: ­ (a) Internet Security (b) Abuse of the internet

SUB-TOPIC 1:

Internet Security

Is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.

Its objective is to establish rules and measures to use against attack over the internet. The internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.

Other methods of Internet Security are

  1. Use of cryptographic methods and protocols that have been developed for securing communication over the internet.
  2. IPSec Protocol- This provides security and authentication at the IP layer by using cryptography to protect the content.

Types of Internet Security

  1. Network Layer Security: TCP/IP can be made secured with the aid of cryptographic methods and protocol that have been put in place to protect communication over the internet.
  2. IPSec Protocol: This protocol is designed to protect communication in a secure manner using TCP/IP, and it provides security and authentication at the IP layer by transforming data using encryption.

iii.       Security token:  Some online sites offer customers the ability to use a six-digit code which randomly changes every 30–60 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account.

  1. Firewall: A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections
  2. Antivirus: Antivirus softwareand Internet security programs can protect a programmable device from attack by detecting and eliminating viruses; Antivirus software was mainly

To gain full access to the note: DOWNLOAD FILE

Copyright warnings! Do not copy.