Internet Security: Problems & Solutions
Table of contents:
Introduction: 3
Internet Vulnerabilities and Threats: 3
• Digitial “Eavesdropping” or Password sniffing 3
• Denial of Service (DoS) 4
• Viruses 5
• Trojans 5
• Spyware 6
Security solutions: 7
• Passwords 7
• Security Token 7
• Antivirus software 8
Conclusion: 8
References: 9
Introduction:
“The Internet is a global network of interconnected computers, enabling users to share information along multiple channels.” (1) It was introduced to the public in the 1990s and became a part of everyday life. The internet enables people from different locations to connect and share data and files. The internet is also used to transfer important and sensitive information such as credit card numbers and passwords. Because of that many people try to exploit the vulnerabilities of the internet in order to gain access to this information or simply to cause malicious damage or use your computer for illegal purposes. In this report I will discuss some of the vulnerabilities and talk about the solutions used such as software and hardware.
Internet Vulnerabilities and Threats:
Vulnerabilities are perceived threats. If they were exploited, the system would no longer be reliable. For example, a virus infecting a computer is a threat if this virus deletes all the system files on the computer then this computer will no longer be useful.
There are many internet threats, I will list some of them and explain what they are:
• Digitial “Eavesdropping” or Password sniffing
A password sniffer is a program that watches all the traffic on the network, paying particular attention to packets that carry the password.The hacker will then use the sniffer to collect a list of users and their passwords.
EXAMPLE:
SniffPass:
An example of a password sniffer software is SniffPass. According to the creators it “listens to your network, capture the passwords that pass through your
References: 1) http://en.wikipedia.org/wiki/Internet 2) http://www.cert.org/tech_tips/denial_of_service.html 3) http://www.netalert.gov.au/advice/security/trojan/what_is_a_trojan.html 4) http://en.wikipedia.org/wiki/Security_token ----------------------- 1