THE INTERNET AND SECURITY Chapter 4 SIX MAJOR ROLES AND GOALS OF IT 1. Increase employee productivity by reducing time, errors and costs using 2. Enhance decision making 3. Improve team collaboration 4. Create business partnerships and alliances 5. Enable global reach all over the world taking into consideration the culture of each nation or society. 6. Facilitate organizational transformation as the organization evolves and responds to the ever-changing marketplace. 2 KEY TERMS ______________________ Transmission of all forms of communication including digital data, voice, fax, sound, and video from one location to another over some type of network ______________________ A group of computers and peripheral devices connected by a communication channel capable of sharing information and other resources among users ______________________ Is the carrying capacity of a telecommunications network. (i.e. the size of the telecommunications channel or pipeline) 4-3 SAMPLE OF INTERPERSONAL USE OF TELECOMMUNICATIONS Email with teeth 4-4 SAMPLE OF INTERPERSONAL USE OF TELECOMMUNICATIONS 4-5 SAMPLE OF BUSINESS USE OF TELECOMMUNICATIONS 4-6 SAMPLE OF BUSINESS USE OF TELECOMMUNICATIONS 4-7 HISTORY OF THE INTERNET NSFNET 1986(National Science Foundation Network) • Connected to ARPANET and many others (BITNET, CSNET, etc) to become a major component of the Internet Internet Support • Ongoing support comes from many universities, federal and state governments, and national international research institutions and industry 4-8 ARPANET 1960 (Advanced Research Project Agency Network) HOW THE INTERNET WORKS – PACKET SWITCHING Warriors Packet Switching • Allows millions of users to send large and small chucks of data across the Internet concurrently • Based on the concept of turn taking, packets from each user are alternated in the shared network (below) • Networks connected to the Internet use this concept 4-9 HOW THE INTERNET WORKS – TCP/IP & ROUTERS TCP/IP Approach TCP – Transmission Control Protocol IP – Internet Protocol Routers • Connect one network to another • Identify each device on a network as unique using IP protocol • Serve as the “Traffic Cop” directing packets to their destination 4-10 HOW THE INTERNET WORKS – CONNECTING NETWORKS Example: Sending a message from Computer A to D 2 (Router) Reads IP Address of packet, routes message to Network 2 and Computer D 1 (Computer A) 3 (Computer D) TCP - Breaks message into data packets IP - Adds address of destination Computer D TCP - Checks for missing packets, reassembles message, discards duplicate packets 4-11 HOW THE INTERNET WORKS – WEB ADDRESSES & DOMAINS IP Address • Each domain is associated with one or more IP addresses • Format: a 32-bit address written as 4 numbers (from 0255) separated by periods Example: 1.160.10.240 Domain • Identifies the Website (host) • Comes in many suffixes such as: .edu .org .mil .net (educational institutions) (organizations; non-profit) (military) (network organizations) Example: microsoft.com (URL) Uniform Resource Locator • Identifies particular Web pages within a domain Example: http://www.microsoft.com/security/default.mspx 4-12 HOW THE INTERNET WORKS – MANAGING Internet Registry THE INTERNET • Central repository of all Internet-related information • Provides central allocation of all network system identifiers • Managed by Internet Assigned Numbers Authority (IANA) Domain Name System (DNS) • Maintained by the Internet Registry • Used to associates hosts or domains with IP addresses • Root DNS database is replicated across the Internet InterNic Registration Service • Assigns Internet Domains and IP addresses • Internet Corp. for Assigned Names and Number (ICANN) has responsibility for managing IP addresses, domain names, and root server system management 4-13 HOW THE INTERNET WORKS – CONNECTING TO THE INTERNET Modem (stands for Modulate/Demodulate) Internet Service Provider (ISP) Network Access Points (NAPs) Internet Backbone 4-14 NETWORK CONNECTION TYPES POTS (Plain Old Telephone Service) ISDN (Integrated Services Digital Network) DSL (Digital Subscriber Line) Cable Modem IoS (Internet over Satellite) Wireless • Fixed wireless • Mobile wireless 4-15 NETWORK CONNECTION TYPES T1/T3 (Trunk Level 1 or 3) ATM (Asynchronous Transfer Mode) SONET (Synchronous Optical Network) 4-16 CURRENT STATE OF THE INTERNET 4-17 WORLD WIDE WEB 4-18 HTTP (Hypertext Transfer Protocol) • A _____________ used to process user requests for displaying Web pages from a Web server Web Servers • A special computer that is specifically designed to store and “_____________” Web pages • This machine contains special _____________ and _____________ to perform its many specialized functions INFORMATION SYSTEM SECURITY Managerial Methods Several techniques are commonly used to manage information systems security: • _____________ Assessment • Controlling _____________ • Organizational Policies and Procedures • Backups and _____________ 4-19 _____________ Precautions taken to keep all aspects of information systems safe from unauthorized access INFORMATION SYSTEM SECURITY – MANAGERIAL TECHNIQUES Assessing Risk Security Audit • Risk Analysis • Alternatives based on Risk Analysis: • Risk Reduction • Risk _____________ • Risk Transference – Controlling Access Keeping information safe by only allowing access to those that require it to do their jobs • _____________ – • Access Control – 4-20 INFORMATION SYSTEM SECURITY – MANAGERIAL TECHNIQUES _____________ Policies and Procedures • Acceptable Use Policies – formally document how systems should be used, for what, and penalties for non-compliance _____________ and _____________ Recovery • Backups – taking periodic snapshots of critical systems data and storing in a safe place or system (e.g. backup tape) • Disaster Recovery Plans – spell out detailed procedures to be used by the organization to restore access to critical business systems (e.g. viruses or fire) • Disaster Recovery – executing Disaster Recovery procedures using backups to restore the system to the last backup if it was totally lost 4-21 Identity theft STATE OF IS SECURITY - SECURITY THREATS Security Threats& TECHNOLOGIES • _____________ Theft – • _____________ _____________– • Others: Spyware, Spam, Wireless Access, Viruses Security Technologies Companies and research organizations continue to develop and refine technologies to prevent security breaches. Some Include: • _____________ • _____________ • _____________ and Encryption 4-22 IS SECURITY: TECHNOLOGY 4-23 _____________ A system of software, hardware or both designed to detect intrusion and prevent unauthorized access to or from a private network Firewall Techniques • Packet Filter – examine each packet entering and leaving network and accept/reject based on rules • Application Level Control – Performs certain security measures based on a specific application (e.g. file transfer) • Circuit Level Control – detects certain types of connections or circuits on either side of the firewall • Proxy Server – acts as, or appears as, an alternative server that hides the true network addresses FIREWALL CAPABILITY Firewall can Focus for security _____________ Enforce security _____________ Log internet _____________ Limit _____________ keeps one section of intranet separate from another Firewall can not Protect Protect Protect Protect against against against against malicious _____________ connections that do not go through it new _____________ _____________ 24 SECURITY THREAT: SPYWARE, SPAM, AND COOKIES _____________ Any software that covertly gathers information about a user through an Internet connection without the user’s knowledge _____________ Electronic junk mail or junk newsgroup postings usually for purpose of advertising some product and/or service _____________ A message passed to a browser from a Web server. Used by legitimate programs to store state and user information 4-25 Biometrics SECURITY TECHNOLOGY: _____________ _____________ A sophisticated authentication technique used to restrict access to systems, data and/or facilities • Uses biological characteristics to identify individuals such as fingerprints, retinal patterns in the eye, etc. that are not easily counterfeited 4-26 SECURITY THREAT: ACCESS TO WIRELESS Unauthorized Access to Wireless Networks With the prevalence in use of wireless networks this threat is increasing • Problems - _____________ _____________ - an attacker accesses the network, intercepts data from it, and can use network services and/or send attack instructions without entering the building • Prevention - _____________ between network and user devices 4-27 28 On 8 February, 1587 Elizabeth I of England SECURITY TECHNOLOGY: VPN AND _____________ _____________ The process of encoding messages before they enter the network or airwaves, and then decoding at the receiving end • _____________ - known and used to scramble messages (SSL) • _____________ - not known and used by receiver to descramble • _____________– a third party that issues keys 4-29 HOW ENCRYPTION WORKS 4-30 VIRTUAL PRIVATE NETWORK Virtual private network (VPN): a secure _____________ between two points across the Internet _____________ : the process by which VPNs transfer information by encapsulating traffic in IP packets over the Internet 31 SECURITY THREAT: VIRUSES Viruses Programs that can attack a computer and/or a network and delete information, disable software, use up system resources, etc. Prevention Steps: AntiVirus software: No Disk Sharing – Delete Suspicious Email Messages – Report Viruses – 4-32