4.1 How password and Authentication
system work?
One of an intranet's first lines
of defense is to use password protection. A variety of security
techniques, including encryption, helps ensure that passwords
are kept secure. It is also necessary to require that passwords
are changed frequently, are not easily guessed or common dictionary
words, and are not simply given out. Authentication is the additional
step of verifying that the person providing the password is the
person authorized to do so.
4.2 What is a Virus?
A virus is a piece of programming
code inserted into other programming to cause some unexpected
and, for the victim, usually undesirable event. Viruses can be
transmitted by downloading programming from other sites or be
present on a diskette. The source of the file you're downloading
or of a diskette you've received is often unaware of the virus.
The virus lies dormant until circumstances cause its code to
be executed by the computer. Some viruses are playful in intent
and effect ("Happy Birthday, Ludwig!") and some can
be quite harmful, erasing data or causing your hard disk to require
reformatting.
4.3 How do i prevent from
virus infection?
To avoid damage from viruses,
write-protect the boot disk and other important disks, check
new software or disks for viruses, and have virus protection
software installed on the computer at all times. Disinfectant
programs must be updated periodically because new viruses get
into circulation over time. There are some virus protection programs
available on the Internet for free. Disinfectant for Macintosh,
written by John Norstad of Northwestern University, is freeware;
McAfee Anti-Virus for PC is a shareware program. Knowingly spreading
a computer virus is a crime punishable by law.
4.4 What is Firewall? How
does it works?
All intranets are vulnerable
to attack. Their underlying TCP/IP architecture is identical
to that of the Internet. Since the Internet was built for maximum
openness and communication, there are countless techniques that
can be used to attack intranets. Attacks can involve the theft
of vital company information and even cash. Attacks can destroy
or deny a company's computing resources and services. Attackers
can break in or pose as a company employee to use the company's
intranet resources.
Firewalls are hardware and software
combinations that block intruders from access to an intranet
while still allowing people on the intranet to access the resources
of the Internet. Depending on how secure a site needs to be,
and on how much time, money, and resources can be spent on a
firewall, there are many kinds that can be built. Most of them,
though, are built using only a few elements. Servers and routers
are the primary components of firewalls.
4.5 How encryption works?
One means of securing an intranet
is to use encryption-altering data so that only someone with
access to specific decryption codes can understand the information.
Encryption is used for storing and sending passwords to make
sure that no snoopers can understand them. Encryption is used
as well when data is sent between intranets on Very Secure Private
Networks (VSPNs). Encryption is also used to conduct commerce
on the Internet to protect credit card information during transmission.
4.6 What is a Hacker?
A hacker is a person who makes
use of his knowledge about computer systems, networking and telecommunication
to try to gain unauthorised access to (usally known as 'breaking
into') a computer system. A hacker's intention of breaking (hacking)
into a computer systems is usually just to proce that he is technically
more knowledgeable and skillful than others but some may carry
out malicious activities like illegal access or modification
of information.