Categories: Lesson Notes

SS2 Second Term Data Processing Lesson Note – The Internet II

The content is just an excerpt from the complete note for SS2 Second Term Data Processing Lesson Note – The Internet II. Check below to download the complete DOCUMENT

WEEK: 4      

CLASS: SS 2

TOPIC: THE INTERNET II

CONTENT: ­ (a) Internet Security (b) Abuse of the internet

SUB-TOPIC 1:

Internet Security

Is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.

Its objective is to establish rules and measures to use against attack over the internet. The internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.

Other methods of Internet Security are

  1. Use of cryptographic methods and protocols that have been developed for securing communication over the internet.
  2. IPSec Protocol- This provides security and authentication at the IP layer by using cryptography to protect the content.

Types of Internet Security

  1. Network Layer Security: TCP/IP can be made secured with the aid of cryptographic methods and protocol that have been put in place to protect communication over the internet.
  2. IPSec Protocol: This protocol is designed to protect communication in a secure manner using TCP/IP, and it provides security and authentication at the IP layer by transforming data using encryption.

iii.       Security token:  Some online sites offer customers the ability to use a six-digit code which randomly changes every 30–60 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account.

  1. Firewall: A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections
  2. Antivirus: Antivirus softwareand Internet security programs can protect a programmable device from attack by detecting and eliminating viruses; Antivirus software was mainly

To gain full access to the note: DOWNLOAD FILE

Sunday

Share
Published by
Sunday

Recent Posts

List of Universities Offering Veterinary Medicine in Nigeria

Veterinary medicine is the branch of medicine that deals with the prevention, diagnosis, and treatment…

3 months ago

List of Universities Offering Anthropology in Nigeria

Anthropology is the scientific study of human beings and their cultures. It encompasses a wide…

3 months ago

List of Universities Offering Sociology in Nigeria

Sociology is the scientific study of human society, culture, and behavior. It examines the social…

3 months ago

List of Universities Offering Social Work in Nigeria

Social Work is a profession dedicated to helping individuals, families, and communities to cope with…

3 months ago

List of Universities Offering Religious Studies in Nigeria

Religious studies is an academic discipline that explores the beliefs, practices, and history of various…

3 months ago

List of Universities Offering Public Administration in Nigeria

Public administration is the field of study and practice that focuses on the organization and…

3 months ago