Internet security relies on specific resources and standards for protecting data that gets sent through the internet. This includes various kinds of encryption such as Pretty Good Privacy(PGP).
Other aspects of a secure web setup includes firewalls, which block unwanted traffic, anti-malware, anti-spyware & anti-virus programs that work from specific networks or devices to monitor internet traffic for dangerous attachments.
Internet security is generally becoming a top priority for both businesses & governments. Good internet security protects financial details & much more of what is handle by a business or agency’s servers & network hardware. Insufficient internet security can threaten to collapse an e-commerce business or any other operation where data gets routed over the web.
Web security may be termed as technological & managerial procedures applied to computer systems to ensure the availability, integrity & confidentiality of computer assets & services from associated threats & vulnerabilities.
Three basics security concepts important to information on the internet are confidentiality, integrity & availability. Concepts relating to the people who use that information are authentication, authorization & non-repudiation. Integrity and confidentiality can also be enforced on web services through the use of transport layer security(TLS).
The concept of integrity is divided in 2 forms:
- Data integrity:
This property, that data has not been altered in an unauthorized manner while in storage, during processing or while in transit. another aspect of data integrity is the assurances that data can only be accessed and altered by those authorized to do so. often such integrity is insured by use of a number referred to as message integrity code or message authentication code. This are abbreviated as MIC and MAC respectively.
- System integrity:
This quality states that a system has when performing the intended function in an unimpaired manner, is free from unauthorized manipulation. Integrity is commonly an organizations most important security objective, after availability. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers ,air traffic control ,and financial accounting.
Confidentiality is the requirement that private or confidential information should not be disclosed to unauthorized individuals. Confidentiality protection is applies to data in storage, during processing ,and while in transit. For many organizations ,confidentiality is frequently behind availability and integrity in terms of importance.
For some types of information, confidentiality is a very important attribute.
Examples includes research data ,medical and insurance records ,new product specifications ,and corporate investments strategies. In some locations ,there may be a legal obligation to protect the privacy of individuals.
Suggested Read: Mostly Used Terms Related to Digital and Internet Security
This is particularly true for banks and loans companies; debt collectors; businesses is that extend credit to their customers or issue credit cards ; hospitals ,doctor offices ,and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes.
Availability is a requirement intended to assure that system works promptly and services is not denied to authorized users. This objective protects against , intentional or accidental attempts to either perform unauthorized deletion of data otherwise cause a denial of service or data.
Availability is frequently an organizations foremost security objective. To make information available to those who need it and who can be trusted with it, organizations used authentication and authorization.
Types internet Security:
The Security of the web s divided into two
- Computer Security, and
- Network Security.
In generic terms, computer security is the process of securing a single, standalone computer, while network security is the process of securing an entire network of computers.
a) Computer Security:
technology and managerial procedures applied to computer systems to ensure the availability integrity , and confidentiality of data managed by the computer.
b) Network security:
Protection of network and their services from unauthorized modification destruction, or disclosure and provision of assurance that the network performs its critical functions correctly and there are no harmful side effects.
The major points of weakness in computer system are hardware, software, and data however ,other components f the computer system may be targeted.
Internet privacy is the privacy and security level of personal data published via the internet. It is a broad term that refers to a Variety of factors, techniques and technology use to protect sensitive and private data, communication ,and preference.
Internet privacy and anonymity are paramount to users, especially as a E-commerce continues to gain attraction, privacy violation and threat risks are standard considerations for any website under development internet privacy is also known as online privacy.
Ethical Issues In Internet Security
Ethics in everyday life serves as moral guide posts, comprising a code that defines behavior as right or wrong. The web offers a vast store of information coupled with extensive communications capabilities, and unethical users can harness this capabilities for personal and financial gains at others expense.
Web ethics provide a guide to appropriate online behavior, adapting familiar ethical standards to provide a moral framework for navigating the internet’s virtual environment.
1) Intellectual Property
Using material properly without properly citing its source constitutes plagiarism when applied to written works, and the same standard applies to documents and websites on the internet. The creator of the original work is still due acknowledgement of her efforts.
File-sharing sites and applications may also provide a means for Web surfer to infringe on other intellectual properties by offering copy righted works for downloading. While illegally downloading copyrighted material is no different form theft, the anonymity which the internet provide coupled with ease of access to artist creation can embolden users who would never think of stilling a physical copy from a store.
Netiquette concerns basic rules and ethics of online social interaction when a person is interacting with other in chat rooms or other social environment, he/she should conduct there selves as if they where face to face with the other sharing venue.
Even when a person is engaged in a heated disagreement, it is mandate to remain respectful and refrain from the use of inflammatory invective, or flaming.
If somebody is new to a chat room or a forum, then it is there responsibility to make sure to learn the site standards of conduct and read its frequently asked questions page to ensure that they do not commit any breaches or netiquette.
3) Respecting Privacy
A persons computer should be inviolate, a safe place to store data and information, but unethical individual employ a variety of mean to breach network security and access personal data.
Hacking not only represent a gross breach of privacy, it can also personally and financially damaging to the people whose information is accessed. Online businesses routinely collect personal and financial information from there customer and many respect there customers need for confidentiality and security.
However, unethical merchants may share information on there customers contact information, income and spending with third parties without there customers knowledge, abusing there trust in the merchant.
4) Cultivating web ethics
Parents and teachers should become knowledgeable enough about the internet capabilities and venues for social networking to be able to teach children ethical standard for web use.
Children should understand that in addition to being unethical action such as piracy and harassment can carry substantial civil and criminal penalties. Organizations such as businesses and schools should develop a clearly articulated acceptable use policy governing permissible internet use among within the institution.
The AUP must be written a document an ideally, every member in the organization should sign a document attesting that he’s read the AUP and agrees to abide by it.