Internet & Security. Information Systems Today Jessup & Valacich, Chapter.6 . How the Internet Works – Web Addresses & Domains. Domain Identifies the Website (host) Comes in many suffixes such as: .edu(educational institutions) .org (organizations; non-profit) .mil (military)
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Internet & Security
Information Systems Today
Jessup & Valacich, Chapter.6
Example: Sending a message from Computer A to D
Reads IP Address of packet, routes message to Network 2 and Computer D
TCP - Breaks message
into data packets
IP - Adds address of
destination Computer D
TCP - Checks
for missing packets,
Precautions taken to keep all aspects of information systems safe from unauthorized use access
A number of organizations exist to raise awareness, research, develop standards, and advise on solutions for Internet security (e.g. CERT/CC, CSD, CSIT)
A system of software, hardware or both designed to detect intrusion and prevent unauthorized access to or from a private network
Programs that can attack a computer and/or a network and delete information, disable software, use up all system resources, etc.
AntiVirus software: install this software which is designed to block all known viruses and offers automatic or manual updates to virus patterns to block future viruses
No Disk Sharing – Viruses can be transferred to clean computers by inserting disks containing infected files
Delete Suspicious Email Messages – Do not open suspicious e-mail messages…Delete Only!
Report Viruses – If you get a virus, report it to you network administrator immediately!