Categories: Lesson Notes

SS2 Second Term Data Processing Lesson Note – The Internet II

The content is just an excerpt from the complete note for SS2 Second Term Data Processing Lesson Note – The Internet II. Check below to download the complete DOCUMENT

WEEK: 4      

CLASS: SS 2

TOPIC: THE INTERNET II

CONTENT: ­ (a) Internet Security (b) Abuse of the internet

SUB-TOPIC 1:

Internet Security

Is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.

Its objective is to establish rules and measures to use against attack over the internet. The internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.

Other methods of Internet Security are

  1. Use of cryptographic methods and protocols that have been developed for securing communication over the internet.
  2. IPSec Protocol- This provides security and authentication at the IP layer by using cryptography to protect the content.

Types of Internet Security

  1. Network Layer Security: TCP/IP can be made secured with the aid of cryptographic methods and protocol that have been put in place to protect communication over the internet.
  2. IPSec Protocol: This protocol is designed to protect communication in a secure manner using TCP/IP, and it provides security and authentication at the IP layer by transforming data using encryption.

iii.       Security token:  Some online sites offer customers the ability to use a six-digit code which randomly changes every 30–60 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account.

  1. Firewall: A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections
  2. Antivirus: Antivirus softwareand Internet security programs can protect a programmable device from attack by detecting and eliminating viruses; Antivirus software was mainly

To gain full access to the note: DOWNLOAD FILE

Sunday

Share
Published by
Sunday

Recent Posts

ETM 312 Theory Questions: Land Law and the Consequences of Unauthorized Land Transfers in Nigeria

300 Level Estate Management and Valuation Department exam questions and detailed answers. Download the answers…

5 months ago

ETM 312 Theory Questions: Co-Ownership Structures and Land Acquisition Methods in Nigeria

200 Level Estate Management and Valuation Department exam questions and detailed answers. Download the answers…

5 months ago

ETM 312 Theory Questions: Rights in Community Land and Fundamental Land Concepts in Nigeria

200 Level Estate Management and Valuation Department exam questions and detailed answers. Download the answers…

5 months ago

ETM 312 Theory Questions: Customary Land Control and the Origins of Nigeria’s Land Use Act

200 Level Estate Management and Valuation Department exam questions and detailed answers. Download the answers…

5 months ago

ETM 312 Theory Questions: Land Ownership Principles and Transaction Laws in Nigeria

200 Level Estate Management and Valuation Department exam questions and detailed answers. Download the answers…

5 months ago

ETM 226 Theory Questions: Trespass: Types and Defenses in Property Law

200 Level Estate Management and Valuation Department exam questions and detailed answers. Download the answers…

5 months ago