Preview

Internet Security - Problems and Solutions

Good Essays
Open Document
Open Document
1242 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security - Problems and Solutions
[pic]

Internet Security: Problems & Solutions

Table of contents:

Introduction: 3

Internet Vulnerabilities and Threats: 3

• Digitial “Eavesdropping” or Password sniffing 3
• Denial of Service (DoS) 4
• Viruses 5
• Trojans 5
Spyware 6

Security solutions: 7

• Passwords 7
• Security Token 7
Antivirus software 8

Conclusion: 8

References: 9

Introduction:

“The Internet is a global network of interconnected computers, enabling users to share information along multiple channels.” (1) It was introduced to the public in the 1990s and became a part of everyday life. The internet enables people from different locations to connect and share data and files. The internet is also used to transfer important and sensitive information such as credit card numbers and passwords. Because of that many people try to exploit the vulnerabilities of the internet in order to gain access to this information or simply to cause malicious damage or use your computer for illegal purposes. In this report I will discuss some of the vulnerabilities and talk about the solutions used such as software and hardware.

Internet Vulnerabilities and Threats:

Vulnerabilities are perceived threats. If they were exploited, the system would no longer be reliable. For example, a virus infecting a computer is a threat if this virus deletes all the system files on the computer then this computer will no longer be useful.

There are many internet threats, I will list some of them and explain what they are:

• Digitial “Eavesdropping” or Password sniffing

A password sniffer is a program that watches all the traffic on the network, paying particular attention to packets that carry the password.The hacker will then use the sniffer to collect a list of users and their passwords.

EXAMPLE:

SniffPass:

An example of a password sniffer software is SniffPass. According to the creators it “listens to your network, capture the passwords that pass through your



References: 1) http://en.wikipedia.org/wiki/Internet 2) http://www.cert.org/tech_tips/denial_of_service.html 3) http://www.netalert.gov.au/advice/security/trojan/what_is_a_trojan.html 4) http://en.wikipedia.org/wiki/Security_token ----------------------- 1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    Vulnerabilities and Threats - any weakness in a system that makes it possible for a threat to cause harm.…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Network eavesdropping, configuration file sniffing, attacker can read sensitive data out of memory or from local files…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Associated messages including passwords are sent in cleat text so if a hacker is using a packet sniffer then he now has access to any usernames or passwords.…

    • 316 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Study Guide

    • 790 Words
    • 4 Pages

    7. Vulnerabilities and Threats - any weakness in a system that makes it possible for a threat to cause harm.…

    • 790 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Recover passwords

    • 632 Words
    • 3 Pages

    This will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit. 
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. 
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free. 
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. 
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new internet Explorer 7.0, as well as older versions of internet explorer, v4.0 - v6.0 
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more… 
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your…

    • 632 Words
    • 3 Pages
    Good Essays