Preview

Internet Filters

Satisfactory Essays
Open Document
Open Document
442 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Filters
Peter Kimbrell
Dr Beth Gibbs
Microcomputers CIS146
October 21, 2014
Internet Filters
When browsing the Internet, users may encounter a filter. Filters are programs that remove or block certain items from being displayed. Four widely used Internet filters are anti-spam programs, web filters, phishing filters, and pop-up blockers.
An anti-spam program is a filtering program that attempts to remove spam before it reaches an Inbox or forum. Spam is an unsolicited email message or posting sent too many recipients or forums at once. The content of spam ranges from selling a product or service, to promoting a business opportunity, to advertising offensive material. Spam also may contain links or attachments that contain malware. If an email
…show more content…
Some restrict access to specific websites; others filter websites that use certain words or phrases. Many businesses use web-filtering software to limit employee’s web access CITATION Fin14 \l 1033 (Finch and Redder). Some schools, libraries, and parents use this software to restrict access to minors.
A phishing filter is a program that warns or blocks users from potentially fraudulent or suspicious websites. Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain someone’s personal and/or financial information. Some phishing messages ask people to reply with their information; others direct them to a phony website or a pop-up window that looks like a legitimate website, which then collects their information CITATION Lan14 \l 1033 (Lane). Some browsers include phishing filters.
A pop-up blocker is a filtering program that stops popup ads from displaying on webpages. A pop-up ad is an Internet advertisement that suddenly appears in a new window on top of a webpage. Many browsers include a pop-up blocker. People also can download pop-up blockers from the web at no cost CITATION Fin14 \l 1033 (Finch and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 2 Quiz 2

    • 662 Words
    • 3 Pages

    18. Internet access is limited by filters which use several methods to screen out unwanted material. Some of these methods include…

    • 662 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Here you can alter the level of security you want to set for the internet and block websites that you may feel are inappropriate. You need to protect data with a safe password. A password that includes numbers as well as letters will be a lot safer than just a normal word.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Ethical School Filters

    • 1268 Words
    • 6 Pages

    And statistics vary on the extent to which children have been exposed to inappropriate material on the Internet at school. A Consumer Reports test of popular filter software found most allowed access to as many as one in five objectionable Web pages while blocking access to legitimate ones. Filters have blocked Web sites about the movie "Babe," a film about a pig, and the catering service "Let's Have an Affair. In some cases, filters block harmless sites merely because their software does not consider the context in which a word or phrase is used. At Intermediate School 93 in Ridgewood, students were researching the election stalemate today when an eighth grader came across a web site that used foul language. It slipped through the board of education's Internet filter and so did suggestive photos. But most of the time, students are frustrated because the filter limits their resources. One seventh grader wanted to study Tino Martinez. He couldn't. Same for Jackie Robinson. Also, ancient Olympic games were access denied because the board of education software blocks sports as a subject (American). These issues should be taken up with the school district itself. They are the ones who determine what will be blocked and can override certain subject areas and words. It is important to keep in mind that some sites use incorrect names or deliberately misspell words for their website so that it can bypass a filter. It is these types of people that children need to be protected…

    • 1268 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Children are also at risk through technology so procedures must be put in place to ensure they are safe while using the internet. One of the polices in our setting to reduce the risk of exposure to potentially harmful or inappropriate material is to block access to unsuitable sites and content. This is called E-safety.…

    • 1161 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internet is an amazing place where people can communicate, transfer and research information, and find entertainment sites. It also allows freedoms that major media enterprises did not have. The concern with the Internet is it contains sites that are not appropriate for children. Some people believe the Internet should be free from censorship while other argue the Internet should be controlled.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    First, there are children in the libraries, and we should protect them from seeing things that they should not see. Children can learn a lot from the internet. There are many sites they can visit to help them with homework. However, their curiosity may lead them to websites not viable for children. The internet filters software can protect them from this danger. Also, most library filters leave the choice of what to block in the hands of the filter administrator who selects the categories to block, so the people ask library staffers the permission to access the websites that are blocked.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Windows Firewall

    • 13700 Words
    • 55 Pages

    A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.…

    • 13700 Words
    • 55 Pages
    Better Essays
  • Satisfactory Essays

    Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Packet filtering is the earliest technology developed to protect the network from dangers in the Internet. It works at network transport layer. A data is split in to several packets and then reassembled back once it has reached its destination. Administrators creates a set of rules which will then be configured to the router, router will then act as a security guard, will either deny or allow packets from passing through. However packet filtering has only limited function, it can only analyze header information in IP packets. For an instance it can all allow or deny specific functions of FTP such as the use of “GET” and “PUT” command (Ogletree, 2000). Packet filtering susceptible to IP Spoofing (Webopedia, 2011). IP Spoofing is used by unauthorized people to gain access to a network, it is a technique done by using the IP address of an authorized or trusted host to enter the network. Advantages of packet filtering Mainly increases the efficiency level by eliminating the processing of overhead by higher level firewall such as proxies. It helps implement choke point as a security strategy because packet filter is installed and monitored in a single location. It also protects network against network sweeping threats and also resolver certain spoofing attacks (Preetham, 20002). Disadvantages of packet filtering Packet filter only checks what protocol, source and destination is used but won’t check on who is trying to access the network. Besides that Trojan horses or viruses can enter into the network using HTTP tunneling (Preetham, 2002).…

    • 1000 Words
    • 4 Pages
    Good Essays