I found the chapter to very enlightening in that it started
out with explaining how the internet works. Proceeding on to cover e-mail and
the two protocols in which e-mail sends and receives messages. Outgoing is
Simple Mail Transfer Protocol (SMTP) and receiving is Post Office Protocol
(POP) more commonly known as POP3. The text reviews potential risks with e-mail
attacks and specifically with malicious attachments and embedded hyperlinks.
We learned about internet attacks and downloaded browser
code and the most common examples of this code which are JavaScript, Java, and
ActiveX. A defense against a hostile Java applet is a sandbox. There are two
types of Java applets unsigned and signed, signed comes from a trusted source
and unsigned does not. Unsigned Java applet is restricted to the sand box. All
three of these types of download browser code are used with malicious intent by
the attacker.
It goes on further to cover privacy attacks which include
the two most common threats which are cookies and adware. Cookies are used to
track the user’s previous visited sites. Whereas adware is software that
delivers advertising content in manner that is unexpected and unwanted by the
user.
The last portion of the chapter is all about internet
defenses through applications and browser settings. Each section goes into
detail explaining what precautions you can take to help secure your computer.
The following topics relate to applications:
- Popup Blockers
- Spam filters
- E-mail Security Settings
The following topics relate to browser settings:
- Advanced security settings
- Restricting cookies
- E-mail defenses
- Security zones
The chart below provides a visual to help defend against internet
attacks.
I found the chapter to have a lot of good information. It was presented in an organized manner that was understandable. It provided some helpful illustrations and examples throughout the chapter to help clarify different concepts.

No comments:
Post a Comment