Study Notes

 

What is it?

What is it used for?

Advantages

Disadvantages

Cookies

Information stored as ‘text-strings’ on a user’s computer that stores a user’s ID and returns it to the server the next time they open the page.

It is used identify users and customise the webpage (for example, in online shopping, the website would recognise your location, currency and name)

Allows websites to cater information for their users.

Allows websites to track visitors to the website and specific page views.

There is infrastructure available to gather information from cookies to a variety of sites, creating accurate descriptions of interests, habits, jobs, political views etc. This poses a privacy threat when linked with personal information.

Encryption

Prevents unauthorized access to data by changing it into a form what is unreadable without a ‘key’

Transmitting personal data such as credit card details when online shopping

Protects privacy.

Expensive start-up cost.

Pressure on protecting the security of the ‘key.’

Proxy Servers

A computer or web server used to block access to sites or cache (store) frequently accessed data.

Keep machines behind it anonymous for security, log usage, scan content, prevent downloading the same content multiple times, restrict access to websites.

Stores data so you don’t have to download it multiple times.

If a network has restrictions about which websites are not allowed, a computer inside the network that knows an open proxy can use it to bypass those restrictions. This compromises the network, because malicious software can attack the computer through the open proxy and get inside the network.


Firewalls

A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set.

 

A Firewall is a software or hardware barrier, intended to prevent the spread of virus’ within a network. A hardware Firewall is a piece of hardware dedicated to preventing the spread of virus’. They are usually found in larger networks, such as a company’s intranet, and usually works for multiple machines at once. A software firewall is usually found for individual computers.

Firewalls work like a filter between your computer/network and the internet. There are many different ways firewalls use to filter out information which determines how specific the filter options can be.

Firewalls can be used to add security to your home or business. Many large corporations have very complex firewalls to protect these important networks from viruses.

Protects against viruses and malicious data.

-Ability to monitor and record information

-Can automatically block threats

-Can calculate the amount of internet data being transferred

-Firewalls can enforce company internet policies

 

No protection against the ‘inside attacker’ or a person within a corporation who attacks the network.

 

 

Virus Protection

A program that protects your computer against viruses that delete and damage files.

It recognises fragments of code that belong to a known virus. It can then remove the virus and repair damaged files.

Protects computers against viruses.

Needs constant updating to keep up with new viruses.

Digital Certificates

Binds a person or organisation to a ‘public key’ (large number) which can be used for encryption and confidentiality. It is distributed by a trusted authority and verifies the owner of the site and data.

 The digital certificate shows a serial number, digital signature, validity (dates to and from), issuer and the public key. In this way, a person viewing the certificate can ascertain if the website is trusted and who created it.

Allows the visitor to a site to know who is responsible for the site and its data. It is important for e-commerce (online shopping, banking etc)

It is based on trust and the establishment of certificate authorities to provide the digital certificates.

Built in ‘root certificates’ within the browser force the internet browser to accept any certificate from that organisation.  This means that the user has to trust on their chosen web browser and the organisations they have selected for their ‘root certificates.’

ĉ
Joseph Lai,
6 Aug 2014, 21:01
Comments