Issues Associated With Access to Online Services

(1) The internet has become one of the most relied on resources in the modern age; in fact, more than 3 billion people have access to it (2). Many people today have fully entrusted the services on the internet and have allowed access to private information that they wouldn't share with anyone else. While some of the services on the internet may be convenient, there are serious threats online that take your information and use it against you.

Reliability of Passwords
Network Security
Identity Theft
Permanence of Information Released Onto the Internet
Questions and Answers

Network security is any form of hardware or software implemented to counter-act threats designed to enter and spread on your network.

Anti-virus

Anti-virus software scans files on your computer's memory for certain patterns that may indicate the presence of malicious software (13). Anti-virus technology is built around exterminating already existing viruses, so it is important that you update the software regularly to keep up with newly found viruses and malware patterns (13). If detected, the software may ask you to clean/remove the malicious file if it hasn't done so by itself (13).

(17)
Firewalls

A firewall is a component of network security hardware or software that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules (14). For a long time, firewalls have been used by companies as a first line of defense for many years, some of them include:

  • Proxy Firewalls - A proxy firewall is a network security system that protects network resources by filtering messages at the application layer (15).
  • Stateful Inspection Firewalls - Classifies traffic by looking at the destination port and Tracks the state of the traffic by monitoring every interaction of each particular connection until that connection is closed (15).
  • Unified Threat Management - Unified Threat Management (UTM) solutions are considered to be the consolidation of stateful inspection firewalls, antivirus, and IPS (Intrusion Prevention System) into a single appliance (15).

(18)
Intrusion Prevention System

An IPS is a system that monitors network traffic for malicious activities such as security threats or policy violations (16). If a security threat has been identifed, it is the IPS's responsibillity to log the information and then attack the threat based on rules set by the network administrator (16).

(19)