StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internet Safety: How to Protect Yourself - Case Study Example

Cite this document
Summary
This paper "Internet Safety: How to Protect Yourself" discusses how to protect an organization network that has a connection to the internet. This will help organizations to make some changes or improvements in their system and to be more secure and safe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Internet Safety: How to Protect Yourself
Read Text Preview

Extract of sample "Internet Safety: How to Protect Yourself"

This report is designed to describe how to protect organization network which has a connection to the internet. This will help organizationsto make some changes or improvements in their system and to be more secured and safe. The report uses some useful internet websites and articles which contains important and relevant information security. The results show the security issue include vulnerability and social engineering and how it becomes a threat for any organization which has a connection with the internet. It also shows cross site scripting (abbreviated as CSS or XSS) as one of the most common application level attacks that hackers use to slink into web applications today. The report presents some recommendations such as apply some policy, training their employers and employing softwares for security checks. 1. Introduction With the advanced technology that we have right now, security issue has become an essential problem for any organization, which uses the Internet, around the world. As stated by Charles and Shari (23, 2002), the security of an organization is important to protect it from any criminal damage. The software vulnerabilities and social engineering in an organization system that cyber-criminals target is the most important issue in security measures. The aim of this research is to investigate how to protect an organization that uses Internet connection from being targeted because of the vulnerability of their system. This report will discuss general issues related to Internet connectivity, software vulnerabilities, social engineering and specific vulnerability which is Cross Site Scripting (XSS). It will also provide a discussion and recommendation that will help organizations against hackers and other criminal activities directed in breaching their security. 2. Discussion General issues related to Internet connectivity 2.1.1 Information security issues Hacking a system or a database is the largest threat to network security for most organizations. IP addresses can easily be obtained through search engines like Google and Yahoo. As a result, the Internet gives easy access to an organization’s system or database for millions of unknown users in the world. And because the users are unknown, it creates additional challenges to the security departments. In addition to the countless unknown users, the links of different systems and database between organizations through the use of the World Wide Web makes it easier for one to access the linked systems. Moreover, the linked access introduces a considerably magnified potential for virus spread. The vulnerability of the system is the primary weakness of an organization’s system. This actually helps the attacker to access the system. And a security risk with one or more well-known examples of working and fully-implemented attacks is categorized as an exploit. An exploit damages the system and database of an organization and there needs to be a security repair deployed. The period from when the security risk is identified to the time of its repair is called a vulnerability window (SANS 2007). An example of an exploit is the deployment of Internet worms. Between 2002 and 2005, Microsoft Windows worms such as Blaster, Nachi, Sasser and Zotob contaminated a lot of systems on the Internet (Wang 2008). Vulnerabilities that established anti-virus, support or other application software, can lead to a problem with worms. The most recent year buzzed with news regarding a worm exploiting the Symantec anti-virus buffer overflow flaw (Microsoft). According to Microsoft, the vulnerable systems on their client side were found in the office software, media players, browser and other desktop applications. Another security risk is the access of Internet by the users. Majority of the vulnerabilities, around fifty percent, can be found in the Web application. Reliable websites are being used and changed into malignant servers for exploits and phishing scams. The defaulting formations for a lot of services and operating systems are weak since most contains default passwords. Consequently, in 2007 a lot of systems have been broken by brute-force password guessing attacks and via dictionary (SANS 2007). Moreover, attackers are discovering more inventive ways to get sensitive data from organizations. For that reason, it is important to make sure of the nature of the data leaving and going into the organization’s database is secured and safe. 2.1.2 Software vulnerabilities Vulnerability is a weakness in system which lets an attacker to break the integrity of that system. Vulnerabilities might result from weak passwords, software bugs, a computer virus or other malwares, a script code injection, a SQL injection or misconfiguration (Kannan, 2009). Software vulnerability could be described as a bug in the software which may let an attacker to gain illegal access to some sources. The Web application as a software is threatened by attackers in many ways. The Open Web Application Security Projects (OWASP) explores the top ten vulnerabilities that present the highest risk to Web application environments. The top ten vulnerabilities in the second version (2007) are Cross Site Scripting (XSS), Injection Flaws, Malicious File Execution, Insecure Direct Object Reference, Cross Site Request Forgery (CSRF), Information Leakage and Improper Error Handling, Broken Authentication and Session Management, Insecure Cryptographic Storage, Insecure Communications, Failure to Restrict URL Access (Black 2008). a. Injection Flaws: Injection Flaws is one of the main attacks against web applications by using a form of code. The attacker achieves his aim by injecting a malicious code when data is passed to a web application. The malicious code will then be executed. There are many types of injection flows such as SQL injection, XML injection, Command injection, AJAX injection, and SSI injection (Popa 2009). b. Malicious File Execution: Malicious File Execution is prevalent with its attacks to PHP applications. The attacker uploads the malicious content that will be performed by the host application. The web server runs an arbitrary code managed by the attacker by altering the unseen areas from the PHP expressions(Popa 2009). For example, a prevalent vulnerable construct is: include $_REQUEST[filename’]; Accessing local file server can be used by the code above. Another code is: Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Internet Safety: How to Protect Yourself Case Study, n.d.)
Internet Safety: How to Protect Yourself Case Study. Retrieved from https://studentshare.org/information-technology/1555364-information-security-issues-associated-with-internet-connectivity
(Internet Safety: How to Protect Yourself Case Study)
Internet Safety: How to Protect Yourself Case Study. https://studentshare.org/information-technology/1555364-information-security-issues-associated-with-internet-connectivity.
“Internet Safety: How to Protect Yourself Case Study”, n.d. https://studentshare.org/information-technology/1555364-information-security-issues-associated-with-internet-connectivity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internet Safety: How to Protect Yourself

Do We Need More or Less Regulation in the Internet

The time has come for us to decide which is more important to us: Digital safety or artificial freedom.... In a world which is slowly accepting the rule of the internet for all practical purposes – ranging from cutlery shopping to money transfer – firm legislation for the internet is of prime importance.... The increasing number of crimes on the internet, such as hacking, 'selling' confidential information to rivals, credit-card theft, child abuse, and many, many other crimes are still not dealt with properly, with the requisite level of seriousness....
12 Pages (3000 words) Research Paper

Internet Fraud and the Need For Public Education

While the overall number of crimes reported has experienced a slight drop in recent years, combined losses for the US and the UK is on the rise and topped $12 billion in 2007 when as many as 1 in 13 people unwittingly gave out personal information to scammers (Johnson 2008; 'protect yourself online').... 3; 'protect yourself online').... In the paper  “internet Fraud and the Need for Public Education,” the author discusses internet fraud, which is an important issue based on the magnitude of the economic cost and the number of people who are at risk of becoming a victim of fraud....
10 Pages (2500 words) Essay

Risk Planning Management

The essay "Risk Planning Management" aims to carry out a critical reflection regarding the interconnection among the construction industry, risk planning management and fire and rescue operations.... This is significant as it affords new insights regarding the connection of construction industry....
12 Pages (3000 words) Essay

The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem

The paper "The Analysis of Various Dimensions of Cybercrimes and Possible Solutions to This Problem" highlights the modern ways to commit cybercrime, global trends in cybercrime, ways to protect cyberspace from the likelihood of cyberattacks, legislation to prosecute cybercrimes.... Therefore, it has become extremely important to prevent, control as well as investigate cyber activities in order to protect the informational, financial and other assets of an individual or an organization....
5 Pages (1250 words) Research Proposal

The Marketing Strategy of the Small and Medium Enterprise

If you can grow in times of economic recession you will find yourself on the other side of the crisis – ahead of your competition.... The paper "The Marketing Strategy of the Small and Medium Enterprise" states that developing a marketing strategy without efforts to attract customers is likely to be haphazard and inefficient....
21 Pages (5250 words) Case Study

Sun Safety

The procedures and strategies that the center has put, in place, to protect young children from the sun was another consideration in researching this report.... 295 of parents also agreed that wearing a hat and protective clothing helps protect the child from the sun, with 715 saying that a hat, protective clothing, and sunglasses helps protect children from the sun.... The purpose for writing a report on sun safety was because of a strong belief in preventing the body from the harm, coming from the sun and the curiosity to discover how aware staff and parents at a child day care center were about sun safety....
9 Pages (2250 words) Research Paper

Internet Security and Privacy

It is the high time people are made aware of security and privacy concerns… The internet today has evolved to such an extent it has become ubiquitous in daily life.... It is a great tool mainly for communications but there are now many other applications too, such as doing a myriad of daily tasks like banking, shopping, chatting with friends, reading the news online or meeting new friends on social networking sites People use the internet today in many ways and the media available has multiplied....
5 Pages (1250 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us