Analysis Of Fundamental Aspects For Internet Security

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Today, we are living in a fast growing and modern information technological age. In every minute there are huge needs of information from one another and all around the world. This rapid transmission of information through some communication media is making source of hacking of secured information from the internet hackers on the way of traversing to its destination. In this research paper, we have worked to find out those areas of Computer network which can be the target in the breakdown of the internet security. Moreover, we have also worked to provide the mechanisms to make our network secure from outside hackers.

Key-word: Communication, information, viruses, hackers, detection system, internet security, firewall, encryption.

1. INTRODUCTION:

Time is said to be the mother of change. With time, almost every object on this earth will change its color or texture. It is for this reason that change is said to be a perfect law of nature. With time, even human beings grow from an infant stage to an adult stage of maturity.

In the past, the entire human race lived in agricultural societies. Today, many countries of the world have grown to industrial societies. In this age of industrialization, these countries are being transformed into information societies. The advent of computers has introduced a revolution in the

practice of information technology. The focus of this paper is on the subject of INTERNET SECURITY as a salient aspect of the practice of modern information technology. The field of Internet Security is not only vast, but highly technical and complex. This paper is our humble attempt to articulate the concept of Internet Security. We have adopted the simple approach , of identifying some fundamental definitions, principles and processes. Furthermore, we have attempted for a critique of the practice of Internet Security.

2. THE INTERNET:

Literally speaking, the word Internet is the shortened form for interconnected network. The Internet is a collection of computer networks that connect millions of computers around the world. It is a vast spider web of computers that are all linked together. To get a graphic picture of the system, consider the setup of your landline telephone connection.

From your house, a line connects you to your local exchange. Your local exchange is linked to other exchanges. When you make a long distance call, your signal hops from one exchange to another exchange, until it gets to the other person’s local exchange. From there, the signal is sent to that person’s phone and it begins to ring. When he picks the phone, the line is opened and you can speak.

Now, imagine that your line is connected to your home computer, and that you can receive or send information from your PC to another computer at the other end of the phone line. That is the picture of the Internet. Once you are connected to the Internet, you can access a wealth of information, including pages on the World Wide Web, News groups, Weather information, Games, etc. The Internet is commonly used for communication, such as e-mail, commercial transactions, research [1].

The Internet standards describe a framework known as the Internet protocol suite. This is a model architecture that divides methods into a layered system of protocols (RFC 1122, RFC 1123). The layers correspond to the environment or scope in which their services operate. At the top is the application layer, the space for the application-specific networking methods used in software applications, e.g., a web browser program. Below this top layer, the transport layer connects applications on different hosts via the network (e.g., client–server model) with appropriate data exchange methods. Underlying these layers are the core networking technologies, consisting of two layers. The internet layer enables computers to identify and locate each other via Internet Protocol (IP) addresses, and allows them to connect to one another via intermediate (transit) networks. Last, at the bottom of the architecture, is a software layer, the link layer, that provides connectivity between hosts on the same local network link, such as a local area network (LAN) or a dial-up connection. The model, also known as TCP/IP, is designed to be independent of the underlying hardware, which the model therefore does not concern itself with in any detail. Other models have been developed, such as the Open Systems Interconnection (OSI) model, but they are not compatible in the details of description or implementation; many similarities exist and the TCP/IP protocols are usually included in the discussion of OSI networking.

3. DEFINING SECURITY

The need for computer security existed long before the advent of the internet. Shortly after the computer was developed, the need to protect the computer became apparent. Presently, the well established field devoted to securing computers and other data is known as Information Security. The subject of Internet Security is merely a specialized aspect of Information Security. Hence, many of the principles and techniques of Internet Security were actually adopted from the practice of Information Security. However, the public nature of the Internet creates new challenges in the practice of Information Security.

Security as a concept can be quite nebulous. Security can encompass activities that protect your computer systems from viruses, restrict the use of hardware, software, or data, or prevent users from performing bad activities or actions of malice. The basic goal is to allow only legitimate users to do only what they are supposed to do. The point must be made that security is a means to an end, not an end in itself. The goal of the establishment is to enforce security, in order to conduct its business. The goal is not to be the most secured business on the planet. Properly used, security is merely a tool that minimizes and eliminates disruptions to your business [2].

Furthermore, there is nothing like full proof security. A 100% secure system does not exist. The standing joke is that the only system that is completely secured is one that is unplugged, switched-off, locked away and buried. That is a pretty secured system, but completely useless.

4. INTERNET CONTROLS:

In this age of hi-tech information technology, the Internet has provided the greatest access to freedom of information and communication. Like all kinds of freedom, the Internet has been exploited by many unscrupulous individuals to perpetrate their mischiefs. These range from sending unwanted and sometimes offensive e-mails, to credit card fraud, advanced fee fraud, having other systems infected with malicious virus, invasion of private information or communication, etc. The emergence of these unwholesome practices has necessitated the development of some forms of Internet Controls. These are control measures, to prevent abuses by users in the system. Some control measures provide security at the level of the computer system, while some others operate at multiple layers [3].

The categories of control measures are not closed. With continuous research in the field, new measures are being introduced. We may safely consider some of the operating controls in two broad categories: Intrusion Detection System (IDS) and Honey Pots.

Figure 4: An example of a role hierarchy and its extension with private roles.

5. INTRUSION DETECTION SYSTEM:

The Intrusion Detection System (IDS) is a type of monitoring, which is designed to specifically detect malicious activities at the earlier opportunity in order to respond appropriately. The IDS is divided into two categories: the Host-based Intrusion Detection System (HIDS) and the Network-based Intrusion Detection System (NIDS). The Host-based Intrusion Detection System (HIDS) uses software running in the system, to monitor the activity of the system itself – and to detect signs of malicious activity. HIDS runs at the level of the operating system, rather than at the network level, a common example is the anti-virus software, which is used to protect the system against computer virus attacks. On the other hand, the Network Intrusion Detection System (NIDS) uses software that examines network activity for signs of an intruder.

Research findings have shown that the most common type of IDS in use is the NIDS. Consequently, we shall examine some of the prominent Network based Intrusion Detection Systems:

5.1 SIGNATURE-BASED NETWORK INTRUSION DETECTION SYSTEM:

This type of system works much like the virus-detection software. A database of signatures is developed for known attacks. The network intrusion detection system package listens to all network traffic passing by, compares it to the stored signatures, and triggers an alarm if it detects a match.

5.2 ANALYSIS-BASED NETWORK INTRUSION DETECTION SYSTEM:

This system is based on the analysis of packets. Instead of using signatures to screen the network traffic, this system actually examines or analyses the packets for signs of malicious user activity. Upon detecting any such malicious user activity, the alert is issued. One of the first analysis based NIDS products was the shadow system which was designed by Stephen Northcutt and his crew for use at Navy Facilities. Shadow uses the freeware top dump to gather the headers from the network traffic. These headers are examined for signs of malicious activity.

5.3 FIREWALLS:

A firewall is a system (hardware, software or both), designed to control external access to a company’s internal systems and information. The firewall approach is that computers holding sensitive information are isolated from the Net, while still being capable of receiving consumer information from it. The server computer, which does all the communication with outside users, acts as a ‘middle man’, receiving any confidential information, without storing it and then passing it on, via an internal link, to the organization’s main computers. These main computers have no other link to the Net and are programmed to only respond to the server’s computer. Thus, there is a fire wall protecting the main computer.

5.4 ENCRYPTION PROGRAM:

As the use of the e-mail has increased, so too has concern over the issue of the privacy and confidentiality of the mails [4]. To solve the problem, the encryption program was developed. The approach of the program is to scramble your data before it leaves your browser. For this to work effectively, the recipient must have the same software with which to unscramble the message. The encryption program is not restricted to emails alone. It is also used to safeguard sensitive information in credit cards and other electronic cards, to prevent credit cards fraud.

5.4 HONEY POTS:

Honey pots are designed to attract potential hackers, the way honey draws insects. This idea is to cause would- be attackers to waste time and effort cracking what is (in effect) a fake target, giving you an opportunity to trace them, or decide how to respond to their attack. Honey pots vary widely in scope. They can be as simple as a trap you can construct yourself, using tools such as net cat, or as elaborate as the two commercial products currently in use – Man trap and Cyber Cop Sting. The examination of these alternatives is beyond the scope of this paper.

6. CRITIQUE OF THE PRACTICE OF INTERNET SECURITY:

As was earlier observed, no security system can be full-proof. Every system must have its chilles heel. Security is ultimately a process, not a product. It is an ongoing activity, not a once-and-for-all event. With the radical developments in the practice of information technology, there is the urgent need to beef up security in the sector. Intrusion Detection and Honey Pots are both effective security systems when used appropriately. But they have their drawbacks. For example from research findings, a major weakness of the signature based network intrusion detection system is that the software is unable to detect new attacks if the signature does not match exactly. Thus, a clever hacker may modify the attack in some fashion to beat the system. Also, it has been observed that when overloaded, the performance of the system suffers. Thus a skilled attacker can render the system ineffective by carrying out multiple attacks on packets. Another problem is that sometimes, the system is so sensitive, that they will not only pick up the activities of the hackers, but the activities of legitimate users may set off the alarm, thus constituting a nuisance. Honey Pots can be a useful security system, but they have proved to be more time and resource consuming. The cost of maintaining the system is not commensurate with the level of security which it provides [5]. Moreover, one of the early releases of Man Trap, a variant of the Honey Pots system, was found to have several security lapses. It would be an irony if your Honey Pot was used to break into your corporate network because of security holes in it.

7. CONCLUSION:

With the advent of the Internet, the world has become a global village. With the aid of the Internet, people can send and receive letters, files and information from all over the world. The web is the interactive

informative area with each area linked together so that you can move from one location to the other in an instant. This has posed a lot of challenges in the area of information Security. We have tried to articulate the need to beef up security in this area. The strengths and weakness of the Internet control system have been examined. Our conclusion is that like every human system, the possibility of full proof security is a mirage. We hope we have been able to stir the waters on this subject.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now