Saturday, November 10, 2012

Internet Security – Chapter 3


I found the chapter to very enlightening in that it started out with explaining how the internet works. Proceeding on to cover e-mail and the two protocols in which e-mail sends and receives messages. Outgoing is Simple Mail Transfer Protocol (SMTP) and receiving is Post Office Protocol (POP) more commonly known as POP3. The text reviews potential risks with e-mail attacks and specifically with malicious attachments and embedded hyperlinks.   

We learned about internet attacks and downloaded browser code and the most common examples of this code which are JavaScript, Java, and ActiveX. A defense against a hostile Java applet is a sandbox. There are two types of Java applets unsigned and signed, signed comes from a trusted source and unsigned does not. Unsigned Java applet is restricted to the sand box. All three of these types of download browser code are used with malicious intent by the attacker.

It goes on further to cover privacy attacks which include the two most common threats which are cookies and adware. Cookies are used to track the user’s previous visited sites. Whereas adware is software that delivers advertising content in manner that is unexpected and unwanted by the user.

The last portion of the chapter is all about internet defenses through applications and browser settings. Each section goes into detail explaining what precautions you can take to help secure your computer. 

The following topics relate to applications:
  •  Popup Blockers
  •  Spam filters
  •  E-mail Security Settings

The following topics relate to browser settings:
  •  Advanced security settings
  •  Restricting cookies
  •  E-mail defenses
  •  Security zones

The chart below provides a visual to help defend against internet attacks.


I found the chapter to have a lot of good information. It was presented in an organized manner that was understandable. It provided some helpful illustrations and examples throughout the chapter to help clarify different concepts.

No comments:

Post a Comment