Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Individual Assignment
(Wireless Security, Internet Security, Internet Viruses)
Name
UCD Number
NIBM Number
Batch
:
:
:
:
P.V.N. Withanage.
08297126
B08140
2008/2010
Table of Content
WIRELESS SECURITY ........................................................................................................................... 3
Computer Network ..........................................................................................................................................................3
Types of Computer networks ..........................................................................................................................................3
What is Wireless Networking? ........................................................................................................................................4
The Use of Wireless Networking ....................................................................................................................................4
The benefits of wireless Networking includes.................................................................................................................4
How Does Wireless Work? .............................................................................................................................................5
Wireless Network System Components ..........................................................................................................................5
Users of wireless network ...............................................................................................................................................6
Computer Devices ...........................................................................................................................................................6
What is wireless security? ...............................................................................................................................................6
Why Wireless Security is important? ..............................................................................................................................7
How to eliminate the above risks security risks ..............................................................................................................8
Possible steps towards securing a wireless network include ...........................................................................................8
Some of the other methods of protecting wireless network are: ......................................................................................8
The key players of wireless network security..................................................................................................................9
INTERNET SECURITY.......................................................................................................................... 10
What is Internet? ...........................................................................................................................................................10
The Internet Society ......................................................................................................................................................10
Internet Security ............................................................................................................................................................11
REFERENCES ...................................................................................................................................... 17
NOTES ................................................................................................................................................. 17
Wireless Security
Computer Network
A computer network is an interconnection of a group of computers. Networks may be classified by
what is called the network layer at which they operate according to basic reference models
considered as standards in the industry such as the four-layer Internet Protocol Suite model. While
the seven-layer Open Systems Interconnection (OSI) reference model is better known in academia,
the majority of networks use the Internet Protocol Suite (IP) as their network model.
Deployment
Initial setup of an infrastructure-based wireless network requires little more than a
single access point. Wired networks, on the other hand, have the additional cost and
complexity of actual physical cables being run to numerous locations (which can
even be impossible for hard-to-reach locations within a building).
Expandability
Wireless networks can serve a suddenly-increased number of clients with the
existing equipment. In a wired network, additional clients would require additional
wiring.
Cost
Wireless networking hardware is at worst a modest increase from wired
counterparts. This potentially increased cost is almost always more than outweighed
by the savings in cost and labor associated to running physical cables.
Computer Devices
Many types of computer devices, sometimes referred to as clients, operate on a wireless
network. Some computer devices might be specifically designed for users, whereas some
computer devices are end systems. In generally, any computer device might communicate
with any other computer device on the same wireless network. Below figure illustrates an
assortment of computer devices for wireless networks.
TKIP
This stands for Temporal Key Integrity Protocol and the acronym is pronounced as teekip. This is part of the IEEE 802.11i standard. TKIP implements per-packet key mixing
with a re-keying system and also provides a message integrity check. These avoid the
problems of WEP.
CISCO
Symantec
Check Point
Juniper
Trend Micro
D-Link
MacAfee
Currently the devices which is used for wireless networking doesnt contain all the
security features which is needed to secure the wireless network you need more than
one unit to include reasonable amount of security features. We expect new devices to
be developed which includes all the necessary security features such as - MAC ID
filtering, Static IP addressing, WEP encryption, LEAP, PEAP, TKIP, RADIUS,
WAPI, WPA, WPA2 etc.
Also these features should enabled by default. So that even a non computer professional
user want to implement a wireless network at his/he home! They can make sure that the
network is secured
We expect the all the wireless routers to distribute a trusted radio waves which doesnt
fade for a given geographic distribution location.
Internet Security
What is Internet?
The Internet, sometimes called simply "the Net," is a worldwide system of computer
networks - a network of networks in which users at any one computer can, if they have
permission, get information from any other computer (and sometimes talk directly to users at
other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of
the U.S. government in 1969 and was first known as the ARPANET. The original aim was to
create a network that would allow users of a research computer at one university to be able to
"talk to" research computers at other universities. A side benefit of Arpanets design was that,
because messages could be routed or rerouted in more than one direction, the network could
continue to function even if parts of it were destroyed in the event of a military attack or
other disaster.
Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds
of millions of people worldwide. Physically, the Internet uses a portion of the total resources
of the currently existing public telecommunication networks. Technically, what distinguishes
the Internet is its use of a set of protocols called TCP/IP (for Transmission Control
Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and
the extranet, also make use of the TCP/IP protocol.
The most widely used part of the Internet is the World Wide Web (often abbreviated
"WWW" or called "the Web"). Its outstanding feature is hypertext, a method of instant crossreferencing. In most Web sites, certain words or phrases appear in text of a different color
than the rest; often this text is also underlined. When you select one of these words or
phrases, you will be transferred to the site or page that is relevant to this word or phrase.
Sometimes there are buttons, images, or portions of images that are "clickable." If you move
the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that
you can click and be transferred to another site. The standards for internet have been created
by the internet society.
10
Internet Security
Internet security is the prevention of unauthorized access and/or damage to computer
systems via internet access. Most security measures involve data encryption and
passwords. Data encryption is the translation of data into a form that is unintelligible
without a deciphering mechanism. A password is a secret word or phrase that gives a
user access to a particular program or system.
Internet security has become a serious issue for anyone connected to the net. Even if you
don't think you have anything worth protecting on your computer, it's still important that you
keep it locked down.
Your files are not the only thing at stake here. If someone gains access to your computer, it
can be used as a "zombie" for hacking into other computer, hiding the trail of the person who
is actually doing it.
How would you like to get a call from your local police telling you that there's been a virus
attack that has been traced back to your computer?
No, even if your computer isn't used for anything critical you need to run security software
such as an antivirus and a firewall.
These programs will keep your computer "hidden" from prying eyes over the internet, as well
as protected from viruses and other malware that can be spread through email or other
methods.
You also need to make sure you're familiar with the different types of security threats so you
can deal with them if they ever come up.
Penetration testing
Intrusion Detection
Incidence Response
What devises or what method should be used to secure the threats from
internet.
Routers
Network Address Translation (NAT) typically has the effect of preventing connections
from being established inbound into a computer, whilst permitting connections out. For a
small home network, software NAT can be used on the computer with the Internet
connection, providing similar behavior to a router and similar levels of security, but for a
lower cost and lower complexity.
11
Firewalls
A firewall blocks all "roads and cars" through authorized ports on your computer, thus
restricting unfettered access. A stateful firewall is a more secure form of firewall, and
system administrators often combine a proxy firewall with a packet-filtering firewall to
create a highly secure system. Most home users use a software firewall. These types of
firewalls can create a log file where it records all the connection details (including
connection attempts) with the PC.
Virus Guards
A virus guard will prevent your computer been infected by viruses, spy ware, malware
etc. Virus guard will protect your computer from been infected from the above
mentioned threats both when you are on the net as well as when you are offline and also
it will clean and disinfect the existing viruses on your computer if it exists. When you
consider the current situation a virus guard has become essential resource for computer.
Above figure will illustrate how to implement a security system to prevent the threats from the
internet.
Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's
why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading
from one area to the next. As you read through this article, you will learn more about firewalls,
how they work and what kinds of threats they can protect you from.
12
Currently internet contains millions of malicious pages! And mainly these sites are
used for purposes such as theft! We w expect the Internet Society to try and implement
a method eliminate these pages from the internet.
Also we expect the internet browser to be more intelligent in regard to these security
issues on the internet.
IBM.
Symantec.
Trend Micro
AVG
Sophose
MacAfee
13
Internet Viruses
What is a Virus?
A program or piece of code that is loaded onto your computer without your knowledge and
runs against your wishes. Viruses can also replicate themselves. All computer viruses are
manmade. A simple virus that can make a copy of itself over and over again is relatively easy
to produce. Even such a simple virus is dangerous because it will quickly use all available
memory and bring the system to a halt. An even more dangerous type of virus is one capable
of transmitting itself across networks and bypassing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defense
Department and many universities, many antivirus programs have become available. These
programs periodically check your computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of
virus that can replicate it self and use memory, but cannot attach itself to other programs but I
consider worm as a virus.
Types of Viruses
Malware
Malware is software designed to infiltrate or damage a computer system without the
owner's informed consent. It is a portmanteau of the words malicious and software. The
expression is a general term used by computer professionals to mean a variety of forms
of hostile, intrusive, or annoying software or program code.
Metamorphic code
In computer virus terms, metamorphic code is code that can reprogram itself. Often, it
does this by translating its own code into a temporary representation, edit the temporary
representation of itself, and then write itself back to normal code again. This procedure
is done with the virus itself, and thus also the metamorphic engine itself undergoes
changes. This is used by some viruses when they are about to infect new files, and the
result is that the "children" will never look like their parents. The computer viruses that
use this technique do this in order to avoid the pattern recognition of anti-virus
software: the actual algorithm does not change, but everything else might.
Computer worm
A computer worm is a self-replicating computer program. It uses a network to send
copies of itself to other nodes (computer terminals on the network) and it may do so
without any user intervention. Unlike a virus, it does not need to attach itself to an
existing program. Worms almost always cause harm to the network, if only by
consuming bandwidth, whereas viruses almost always corrupt or modify files on a
targeted computer.
14
Trojan horse
This article refers to a form of malware in computing terminology. For other meanings,
see Trojan horse (disambiguation)
In the context of computing and software, a Trojan horse, or simply Trojan, is a piece
of software which appears to perform a certain action but in fact performs another such
as a computer virus. Contrary to popular belief, this action, usually encoded in a hidden
payload, may or may not be actually malicious, but Trojan horses are notorious today
for their use in the installation of backdoor programs. Simply put, a Trojan horse is not
a computer virus. Unlike such malware, it does not propagate by self-replication but
relies heavily on the exploitation of an end-user (see Social engineering). It is instead a
categorical attribute which can encompass many different forms of codes. Therefore, a
computer worm or virus may be a Trojan horse. The term is derived from the classical
story of the Trojan horse.
Spy Ware
Spy ware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction with the computer, without
the user's informed consent.
While the term spy ware suggests software that secretly monitors the user's behavior,
the functions of spy ware extend well beyond simple monitoring. Spy ware programs
can collect various types of personal information, such as Internet surfing habit, sites
that have been visited, but can also interfere with user control of the computer in other
ways, such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses, or diverting
advertising revenue to a third party. Spy ware can even change computer settings,
resulting in slow connection speeds, different home pages, and loss of Internet or other
programs. In an attempt to increase the understanding of spy ware, a more formal
classification of its included software types is captured under the term privacy-invasive
software.
Macafee
Symantec
Trend Micro
AVG
Sophose
Kaspersky
Zone Alarm
Panda
F-Secure
According to my knowledge most of these viruses on the internet comes when you
brows porn sites so my fact is to eliminate these porn sites or warn the owner of them
for their content of viruses on their web sites. This is a responsibility of all the ISPs
around the world.
Have more sophisticated online virus scanners to eliminate viruses once they are
available on the World Wide Web.
Currently most of these virus guards doesnt protect computers from each and every
type of viruses. Therefore we create Lithium Pen Pal virus guards to consider this
fact and develop an efficient virus guards which does not take much of the computer
recourses.
16
References
Wireless Security, Internet Security
Data Communication and Networking (Fourth Edition)
Author -: Forouzan
Internet Viruses
Lithium Pen Pal (The first Sri Lankan Antivirus Software)
Visit: www.lithium.lk
Notes
17