Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
Mastering the Internet, XHTML, and JavaScript Chapter 6 Security and Privacy Outline Goals and Objectives Chapter Headlines Introduction Fraud Crackers Firewalls P3P Sniffing and Web Bugs Stalking Censorship TRUSTe EPIC .NET Passport Liberty Alliance Project Chapter 6 - Security and Privacy 2 Goals and Objectives Goals Understand and master the important issues of web security and privacy, know your online rights, configure browsers for tighter security and better privacy, and find out how to protect the exchange of sensitive data online. Objectives Web security and privacy issues Fraud, crackers, and firewalls P3P Sniffing, stalking, and censorship EPIC TRUSTe .NET Passport Liberty Alliance Project Chapter 6 - Security and Privacy 3 Chapter Headlines 6.1 Introduction Find out what effects your security and privacy on the Web 6.2 Fraud Do not fall victim to internet fraud; check online resources for help 6.3 Crackers They use system identity to launch attacks 6.4 Firewalls Put a wall between a network and internet to prevent computer fire 6.5 P3P P3P helps web surfers protect their privacy 6.6 Sniffing and Web bugs It allows unauthorized information access Chapter 6 - Security and Privacy 4 Chapter Headlines 6.7 Stalking Fight web stalking and ask for help immediately 6.8 Censorship Internet is the worst enemy of censorship 6.9 TRUSTe This seal of approval ensures maximum online privacy 6.10 EPIC EPIC views content filtering as a form of suppression of speech 6.11 .NET Passport Reduces the burden of online registrations 6.12 Liberty Alliance Project Provides security and efficiency to use web services Chapter 6 - Security and Privacy 5 Introduction Web security is a complex issue that deals with : A breach of web security causes financial and other damage Web security includes : Computer and network security Authentication services Message validation Cryptography Personal privacy issues Authentication Authorization Privacy A user must view a web site’s privacy policy Chapter 6 - Security and Privacy 6 Fraud Internet fraud is most common in credit card use and internet investing Consumer protection is offered by credit card companies The four schemes of investment frauds are : 1. 2. 3. 4. Pump and Dump Scam: urges investors to buy/sell stock urgently Pyramid Scam: how to earn money by working from home Risk free Fraud: offers investors low-risk investment opportunties Off-shore Fraud: takes advantages of currency fluctuations and economic systems of other contries Internet Fraud Complaint Center (IFCC), Internet National Fraud Information Center (INFIC), and Fraud Bureau (FB) are organizations that alert users and avoid frauds Chapter 6 - Security and Privacy 7 Crackers Crackers disable networks by launching attacks through web servers and other public access nodes The motivation is Personal Satisfaction or Social Attention Firewall provides protection from crackers An administrator’s job is to create a cracker-resistant system and not a cracker-proof one A cracker can : Erase data files Modify data files Sell them to others Use system identity to attack other computers Chapter 6 - Security and Privacy 8 Firewalls Firewalls are used for security purposes Firewalls use one or more the following three methods to control traffic flow : 1. Packet filtering : analyzes TCP packets against a set of filters 2. Proxy service : the firewall sends/receives information 3. Stateful inspection : compares key parts of packets to a database of trusted information Firewalls are customizable, an administrator can set the level of security provided by a firewall according to system needs Chapter 6 - Security and Privacy 9 P3P P3P protocol is all about getting the server and the client to be up front about which personal data is collected and used P3P does not give users more privacy, it only allows them to exercise personal data preferences P3P policy editors are important to developers Major browsers and web sites are P3P enabled and compliant Cookies are viewed as precursors to P3P P3P 1.0 specs. tells servers and clients how to implement the P3P protocol P3P complements existing security and privacy efforts Chapter 6 - Security and Privacy 10 Sniffing and Web Bugs Sniffing is the act of collecting information about web surfers without their prior knowledge Sniffing may be good or bad Sniffing is used to monitor and analyze network traffic and detect and avoid bottlenecks Web bug is a piece of invisible code or file in a web page to collect data about web users Web bugs can install files on users’ computer Three types of bugs can be identified Image file Executable bugs Script based executable bugs Chapter 6 - Security and Privacy 11 Stalking Stalking on the web means to harass someone by spamming, flaming and other such activities Web stalkers hide their true personalities To fight stalking : Work as a team Be patient Ignore stalkers Change ISPs Avoid meeting strangers online To report stalking problem go to http://www.cybercrime.gov/reporting.htm Chapter 6 - Security and Privacy 12 Censorship Internet is the best medium for freedom of speech The internet eliminates awkward ways of smuggling information across foreign borders The attempt to ban or regulate access to information is censorship Oppressive regimes can censor the internet There are ways to fight internet censorship : Smuggle information via networks of underground correspondents Chapter 6 - Security and Privacy 13 TRUSTe TRUSTe is an independent, non-profit privacy auditing service It promotes trust of privacy between users and web sites TRUSTe logo on a web site ensures protection of information It advocates users’ privacy rights Consumer Privacy Protection guidelines have 6 tips Read privacy policy Look for approved seals Credit card purchase protection laws are same for online shopping and malls Use secure servers Use common sense Teach children to be “cybersmart” Chapter 6 - Security and Privacy 14 EPIC EPIC stands for Electronic Privacy Information Center It is a public interest research center established to protect privacy EPIC has many interesting publications in the form of books and reports Two important publications are : Privacy Law Source book Filters and Freedom 2.0 : Free speech perspectives on internet content and controls EPIC works for web users Chapter 6 - Security and Privacy 15 .NET Passport .NET Passport is a Microsoft service that allows users to perform online purchases with the use of one single login name .NET Passport consolidates web services A user must create a .NET Passport Profile to register .NET passport needs to use personal information and cookies to operate .NET Passport is a member of TRUSTe privacy program Visit http://www.passport.net for registration and information Chapter 6 - Security and Privacy 16 Liberty Alliance Project LAP is a collaboration of companies and organizations to develop and deploy an open, federated solution of internet identitys LAP is important to the future of web services LAP enables consumers and businesses to maintain personal information securely LAP specifications define a principal that mediates authentication between and identity provider and a service provider The LAP concept can bring great financial and other benefits to both consumers and businesses Chapter 6 - Security and Privacy 17 • • • • • • • • • • • • Summary Web security is a complex issue A user must be aware of web based frauds One must try to build a cracker-resistant system Firewalls prevents unauthorized access to a computer P3P works with existing privacy and security efforts Sniffing and web bugs may be good or bad Stalking on the web is an important issue A user must fight internet censorship Visit http://www.truste.org for information about TRUSTe EPIC works for web users .NET passport consolidates web services LAP is important to the future of web services Chapter 6 - Security and Privacy 18