Top Banner
Internet Safety
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internet safety

Internet Safety

Page 2: Internet safety

11 tips on Internet

By Jose Luis Viega

Page 3: Internet safety

Never use your real name in web site strange

Page 4: Internet safety

Use signos in your Password

Page 5: Internet safety

Use a good antivirus

Page 6: Internet safety

Not chat with strangers

Page 7: Internet safety

Not exhibit personal date

Page 8: Internet safety

Not visit strangers web site

Page 9: Internet safety

Not send e-mails not funny, you may be helping to spread virus

Page 10: Internet safety

Delete the cookies of your computer

Page 11: Internet safety

Not download software from strangers sites

Page 12: Internet safety

You can buy with your bank numbers and passwords only on sites with "shttp" or "https" in the URL.

Page 13: Internet safety

Caution with unknown computers

Page 14: Internet safety

Report all cyber crimes that you witness

Page 15: Internet safety

* Internet Safety* Security Level Network* Passive attacks* Active Attacks

By Eric Delgado

Page 16: Internet safety

Internet Safety Trying to communicate a secret in an environment with millions of potential witnesses such as the Internet is difficult, and the likelihood that someone will hear a conversation between two partners increases as does the distance

between them. Because the Internet is truly global, no secrets in value should be communicated through it without the help of cryptography.

In the business world, information such as credit card numbers, authentication of clients, including emails and phone calls just to be routed over the Internet. Since much of this corporate information should not be heard by others, the need for security is obvious.

However, Internet Safety is not only a business concern. Everyone has the right to privacy when it accesses the Internet your privacy need not go away. Privacy is not only confidentiality, but also includes anonymity. What we read, the pages you visited, the things we buy and the people we talked to represent information that most people do not like to publicize. If people are forced to present information that would normally want to hide the fact connect to

the Internet will probably reject all network related activities.

Page 17: Internet safety

Security Level Network-To understand the types of security threats that exist, we give some concepts of security requirements. Computer security and networking involves three requirements.

- Secret requires that information on a computer is accessible for reading only to authorized users. This access includes the printing, display and other forms to include any method of making known the existence of an object.-Integrity: The resource requires a computer to be modified only by authorized users. Modification includes writing, changing state, delete and create.

- Availability: Requires that a computer's resources are available to authorized users.

-The types of aggression to the security of a computer system or network are best characterized by observing the system function as an information provider. In general, there is a flow of information from a source, such as a file or a region of main memory to a destination such as another file or a user.

Page 18: Internet safety

Passive attacks Passive aggression is the type of eavesdropping or monitored transmissions hidden. The opponent's goal is to obtain information that is being transmitted. There are two types of aggression: disclosure of the contents of a message or traffic analysis.

The disclosure of the contents of a message is easily understood. A telephone conversation, email or a transferred file may contain sensitive or confidential information. Thus, it would be desirable to prevent the opponent aware of the content of these transmissions.

The second type of passive attack, traffic analysis is more subtle. Suppose we have a means of masking the contents of messages or other data traffic, but the messages are captured, we could not extract information from the message. The most common technique to mask the content is encrypted. But even if we have encryption protection, the opponent might be able to observe patterns in these messages. The opponent could determine the location and identity of the computers that are

communicating and the frequency and length of messages exchanged. This information can be useful for extracting the nature of the communication is taking place.

Passive aggression very difficult to detect because it does not involve the alteration of the data. However, it is feasible to prevent the success of these attacks. Thus, the emphasis for dealing with these attacks is prevention rather than detection.

Page 19: Internet safety

Active Attacks The second category of attacks is that of active attacks. These attacks involve the modification of the data stream flows or creating false and is subdivided into 4 categories: masquerading, replay,

message modification and denial of service.Masking occurs when one entity pretends to be something different entity. A masquerade attack usually includes one of the other forms of active aggression. For example, you can capture a sequence

of authentication and replace it with a valid authentication sequence, thus enables other authorized entity with few privileges to get extra privileges by impersonating an entity that has them.Repetition involves the passive capture of data units and its subsequent retransmission to produce an unauthorized effect.

Message modification simply means that some part of a legitimate message is altered, or that the message is delayed or rearranged to produce an unauthorized effect.The denial of service prevents or inhibits the normal use or management of communications facilities. This aggression may have a specific purpose: for example, an entity can delete all messages

addressed to a particular destination. Another type of denial of service is the disruption of an entire network, disabling or overloading it with messages so as to degrade performance.

Page 20: Internet safety

Internet safety lawsBy Nadir Mohamed

Page 21: Internet safety

Internet Safety LawsA federal law, the Children's Online Privacy Protection Act (COPPA), was created to help protect kids online. It's designed to keep anyone from obtaining a child's personal information without a

parent knowing about it and agreeing to it first.

COPPA requires websites to explain their privacy policies on the site and get parental consent before collecting or using a child's personal information, such as a name, address, phone number, or Social Security number. The law also prohibits a site from requiring a child to provide more personal information than necessary to play a game or participate in a contest.

But even with this law, your kids' best online protection is you. By talking to them about potential online dangers and monitoring their computer use, you'll help them surf the Internet safely.

Page 23: Internet safety

Video of internet safety

Page 24: Internet safety

Jose LuisViega

Eric DelgadoNadir

Mohamed