Intranet and Internet Security

 

 

4.1 How password and Authentication system work?

One of an intranet's first lines of defense is to use password protection. A variety of security techniques, including encryption, helps ensure that passwords are kept secure. It is also necessary to require that passwords are changed frequently, are not easily guessed or common dictionary words, and are not simply given out. Authentication is the additional step of verifying that the person providing the password is the person authorized to do so.

 

4.2 What is a Virus?

A virus is a piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event. Viruses can be transmitted by downloading programming from other sites or be present on a diskette. The source of the file you're downloading or of a diskette you've received is often unaware of the virus. The virus lies dormant until circumstances cause its code to be executed by the computer. Some viruses are playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting.

 

4.3 How do i prevent from virus infection?

To avoid damage from viruses, write-protect the boot disk and other important disks, check new software or disks for viruses, and have virus protection software installed on the computer at all times. Disinfectant programs must be updated periodically because new viruses get into circulation over time. There are some virus protection programs available on the Internet for free. Disinfectant for Macintosh, written by John Norstad of Northwestern University, is freeware; McAfee Anti-Virus for PC is a shareware program. Knowingly spreading a computer virus is a crime punishable by law.

 

4.4 What is Firewall? How does it works?

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

 

4.5 How encryption works?

One means of securing an intranet is to use encryption-altering data so that only someone with access to specific decryption codes can understand the information. Encryption is used for storing and sending passwords to make sure that no snoopers can understand them. Encryption is used as well when data is sent between intranets on Very Secure Private Networks (VSPNs). Encryption is also used to conduct commerce on the Internet to protect credit card information during transmission.

 

4.6 What is a Hacker?

A hacker is a person who makes use of his knowledge about computer systems, networking and telecommunication to try to gain unauthorised access to (usally known as 'breaking into') a computer system. A hacker's intention of breaking (hacking) into a computer systems is usually just to proce that he is technically more knowledgeable and skillful than others but some may carry out malicious activities like illegal access or modification of information.

Company Info
Content
Marketing
Message Board
FeedBack
User Guide
Manager's Guide
 

1 Introduction

2 Electronic Mail

3 WWW & Internet

4 Security Issue