Safeguard Network  «Prev  Next»
Lesson 13

Secure Systems Conclusion

This module pinpointed the main tools, techniques, and requirements used to secure Internet, intranet, and extranet systems from suspicious activities. By now, you should be able to:
  1. Explain the need for security
  2. Identify the characteristics of a good security plan
  3. Explain the basic methods used to keep connections to the Internet secure
  4. Describe the differences between the security needs for the Internet, intranets, and extranets
  5. Describe the various types of attacks that an Internet server is vulnerable to
  6. Describe the various types of technologies available to counteract server attacks

Glossary

In this module, you were introduced to the following terms:
  1. Access control: The basic purpose of access control is to monitor access to information and sites.
  2. Firewall: Network security device that blocks a specific type of data or prevents data from specified sources from entering the network.
  3. Encryption: The process of disguising information to make it unreadable.
  4. Public-key encryption: A means to ensure user authorization. Public-key encryption has two keys: one to encrypt the material, the other to decrypt it.
  5. Secure Electronic Transactions (SET): A standard enabling secure credit card transactions on the Internet.
  6. Secure Sockets Layer (SSL): A protocol for secure network communications using a combination of public and secret key technology.
  7. Auditing: Reading and interpreting log files to identify hacker activity.
  8. Authentication: Proof that the user is who they claim to be. Generally achieved through a Digital Signature and validated through a Certificate Authority.
  9. Virtual Private Network (VPN): An alternative to a WAN that uses special software on client computers to connect across an intranet or the Internet to special software on a dedicated server.
  10. Non-repudiation: A service that documents the identities of both the sender and receiver of a data transmission so that neither can deny sending/receiving the message.
The next module is the course wrap-up.
The following section discusses security measures.

Computer and Internet Security

Security Measures

  1. Access Control: Used to restrict entry into a system to only authorized users. It usually consists of a common login screen, but may use voice or fingerprint recognition, or even more exotic techniques such as hair analysis and retinal scans.
  2. Data Confidentiality: Ensures that only authorized parties can view the contents of a message.
  3. Data Integrity: Safeguards a message from alteration by unauthorized parties.
  4. Nonrepudiation: Safeguards used to prove that communications activities have occurred between two or more parties.
  5. Authentication: Proof that the user is who they claim to be. Generally achieved through a Digital Signature and validated through a Certificate Authority.

  • System Security Measures When security is discussed, it is done within the context of safeguarding your information.
    An integrated system of industry best practices and technologically advanced safeguards includes the following:
    1. SSL and encryption: SSL and encryption. We use an industry-standard technology called Secure Sockets Layer (SSL) to encrypt the information flowing between your computer and our servers. Encryption works by scrambling words and numbers before they travel across the Internet so they cannot be read or altered. Several levels of encryption are available. A higher number indicates more secure communication. Browsers that support 128-bit encryption or higher currently offer the best protection.
    2. Firewall: Firewall. A firewall is a combination of hardware and software deployed to control the information that can pass from the Internet into our internal systems and servers. Firewalls enforce a set of rules intended to bar intruders and viruses from gaining entry.
    3. Monitoring: Monitoring. We continually monitor our systems for evidence of attempted break-ins. Our monitoring methods combine internal resources and security companies we pay to help safeguard your information.
    4. Automatic logout: Automatic logout and account lock. The automatic logout is intended to protect your account information from passersby if you are interrupted and leave your computer before logging out. Typically, you'll be automatically logged out 30 minutes after your last click in a secure session.

Security Issues - Quiz

Click the Quiz link below to test your knowledge of security issues.
Security Issues - Quiz

SEMrush Software 13 SEMrush Banner 13