942 resultados para Internet security
Resumo:
Relatório de estágio de mestrado em Ensino de Informática
Resumo:
Peer-reviewed
Resumo:
Arbor Network's annual Internet security report for 2011/12. We will discuss this report in INFO6003 lectures.
Resumo:
O comércio eletrônico já é uma realidade brasileira. Contudo, esta modalidade de negócio eletrônico ainda não atingiu o seu pleno potencial, especialmente nas negociações orientadas para o consumidor (B2C). Vários fatores são apontados como restrições ao seu crescimento, mas nenhum deles é tão destacado e controvertido quanto a segurança na Internet, especialmente nas transações eletrônicas. Este trabalho analisa a questão da segurança do ponto de vista dos usuários de Internet, uma vez que a percepção de segurança dos internautas determina a sua confiança, e a sua confiança influencia a sua decisão de compra eletrônica e a abrangência das compras realizadas através da Internet. A segurança, vista freqüentemente como a grande vilã no mundo digital, passa a ser entendida alternativamente como um dos fundamentos do comércio eletrônico e, conseqüentemente, uma grande vantagem competitiva para os negócios eletrônicos.
Resumo:
One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. The notion is to redesign specific functionality, based on principles discovered in research on distributed systems in the decades since the initial development of the Internet. Because of the problems in retrofitting new technology across millions of clients and servers, any options with prospects of success must support backward compatibility. This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. To maintain backward compatibility, initial implementation could offer a web browser-based front end but the longer-term approach would be to implement the system using appropriate models of replication. (C) 2005 Elsevier Ltd. All rights reserved.
Resumo:
In this study, we examine an important factor that affects consumers' acceptance of business-to-commerce (B2C) electronic commerce - perceived risk. The objective of this paper is to examine the definition of perceived risk in the context of B2C electronic commerce. The paper highlights the importance of perceived risk and the interwoven relation between perceived risk and trust. It discusses the problem of defining perceived risk in prior B2C research. This study proposes a new classification of consumers' perceived risk based on sources. It highlights the importance of identifying the sources of consumer's risk perceptions in addition to the consequences dimensions. Two focus group discussion sessions were conducted to verify the proposed classification. Results indicate that Internet consumers perceive three sources of risk in B2C electronic commerce: technology, vendor, and product. © 2003 Elsevier B.V. All rights reserved.
Resumo:
Es descriu el disseny i posterior implementació de la nova plataforma d’automatització del servei ofert per Internet Security Auditors, S.L. destinada a l’anàlisi de dominis d’Internet amb la finalitat de detectar possibles infeccions que afectin a usuaris de la web. El sistema actual conté algunes deficiències, de manera que aquest text presenta una nova versió, la qual aporta millores molt significatives com ara una gestió més òptima, o un disseny renovat i escalable de la informació i els diferents processos. Així mateix es dota al sistema d’un control d’errors centralitzat, amb enviament d’alàrmes en temps real, i una agrupació i centralització dels resultats.
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
Resumo:
Peer-reviewed
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.