IWPD
CHAPTER-8 : Web Publishing and Internet Security
The www is an information system designed specifically for posting useful information which can be used with ease and with document interchange in mind.
HTML (HyperText Markup Language ) is developed for this purpose.
Web Hosting
Depending upon the software given by the web service provider. You may to able to host your website on the internet.
Before you can upload your web page you need to have the following ;
i) Space on web Server
ii) Procedures for Uploading web files.
iii) the software you need for Uploading web files.
Website Planning
Before creating a website you need to do planning in the case of house building.
You start constructive a website with the basic steps that help planning a website are the following ;
i) Define your Target Audience.
ii) Organised your concept and material
iii) Create a sketch of web pages you intended to create a directory structure.
Network Security
Network Security means the network communication falling in unauthorized people the send of data may want to be assured that only the intended party actually receive the designation people.
Also, a person with a PC at a remote place can use a telephone line and illegally connect collect confidential data from a computer without leaving any clues.
The network security method adopted must address the following issue ;
i) The information in a computer system showed only be accessed by authorized people.
ii) The sharable resources must only be used by authorized members.
Traffic Analysis
The observation of information about communication between users such as absence, present, direction, routing and sequence of data inflow and overflow.
Internet Security
Maintaining security become more important when we use the internet as a commercial transaction.
Method of internet security is following ;
i) Authentication
ii) Authorization
iii) Auditing
iv) Firewall
v) Cryptography
Authentication
It is the process of determining the identity of a user who is attempting to access the system.
Also for security purpose, the verification of the person or process is necessary.
Authentication method
- Password
- One Time Password (OTP)
- Call back
Authorization
It is the process of determining how the authenticating user is permitted to use specific resources.
Auditing
It is the process of collecting and analysis that allows the administrator to verify that the user is producing the defined result as per the company policy.
Firewall
- A firewall is a networked security device
- It is a combination of software and hardware.
- The firewall monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on some predefined rules.
Type s of firewall
i) Proxy firewall
ii) Packet filtering firewall
iii) Stage full inspection firewall
Proxy Firewall
It acts as an intermediate user request, setting up a new connection to the desired resource either at the application layer or at session layer or transport.
They are restrictive when it comes to allowing or denying or new types of applications.
Packet Filtering
This type of firewall examines all the packet it comes across. It forwards them drops them based on certain pre-defined rules.
Packet filtering firewall is restrictive since network managers can only define a few rules.
Packet filtering can be implemented in two ways ;
i) Static filtering
ii) Dynamic filtering
Stage full Inspection Firewall
These are the new generation of firewall technology.
Stage full inspection provides full application awareness without requiring a separate proxy for every service to be secure.
A stage full inspection firewall allows or blocks traffic based on state, port and protocol.
It monitors all activity from the opening of a connection until it is closed.
Filtering decision is made based on administrator rules as well as a context which refers to using information from previous connections and packets belonging to the same connection.
Cryptography
Cryptography means of protective private information against unauthorized access in those situations where it is difficult to ensure access control.
Thus, even if the user somehow manages to gain access to some information that he/she is not authorized to access away.
Cryptography is most often associated with scraping plane text (ordinary text) into ciphertext text, then back again to ordinary text.
Cryptography includes two corresponding processes. These are encryption and decryption.
Encryption
It is the process of translating plain text data into something that appear to be random and meaningless data called ciphertext.
Decryption
It is the reverse process of encryption where ciphertext is translating to plane text using public and private key.
**You reached end of lecture**
Your feedback is important for us :)

Post a Comment
0 Comments