Full width home advertisement

Post Page Advertisement [Top]

Project For Computer Science Students on Internet Security.

1. Introduction

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.

2. Types of Internet Securities
  • Network layer security.
  • Internet Protocol Security(IPsec).
  • Security Token
  • Electronic Mail Security (E-Mail).
3. Network Layer Security
TCP/IP Internet protocol suite can be made secure with the help of cryptographic methods and protocols developed for securing communications on the Internet. These protocols include Secure Sockets Layer SSL, succeeded by Transport Layer Security TLS for web traffic, Pretty Good Privacy PGP for email, and IPsec for the network layer security.

4. Security Token
Some online sites offer customers the ability to use a six-digit code which randomly changes every 30–60 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. The website would be made aware of that devices' serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 30–60 seconds the device will present a new random six-digit number which can log into the website.

5.Electronic Mail Security
Pretty Good Privacy:
 Provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such Triple DES or CAST-128. Email messages can be protected by using cryptography in various ways, such as the following:
Signing an email message to ensure its integrity and confirm the identity of its sender.
Encrypting the body of an email message to ensure its confidentiality.
Encrypting the communications between mail servers to protect the confidentiality of both message body and message header.

6. Firewalls:
A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol connections.

Types of Firewalls:
  • Packet Filter: Packet filter from a remote IP host.
  • Stateful packet inspection: Hides user IP to protect privacy.
  • Application level-gateway: Protect by forwarding known protocols.
7.Types of malicious software:
Malware: Those programs which trick user or force them to downloading software.

Virus: Computer Viruses are programs that can effects by infecting other files or structures on a computer.

Worms: Computer worms are programs that can replicate themselves throughout a computer network.

Trojan horse: It works same as malware.

Spyware: The term spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent.

8. Antivirus
Antivirus programs and Internet security programs can protect a programmable device from malware by detecting and eliminating viruses; Before 2000 a user would pay for antivirus , now computer users can choose free security applications on the Internet.
Some topmost antivirus which protect us from the malicious software:
  • Norton, Norton Internet Security.
  • ESET NOD32
  • Kaspersky.
  • Microsoft Essential
  • Windows Defender
  • Avast, etc.

No comments:

Post a Comment

Bottom Ad [Post Page]

| Designed by Colorlib