Page 135 - Web Applications (803) Class 11
P. 135

Cyber Crime

                 Theft, fraud, and forgery are examples of cybercrimes that include the misuse of computers or the Internet. Cybercrime,
                 according to the IT Act, is an illegal act in which a computer is used as a tool, a target, or both. Some of these offences
                 are listed below:

                 Ð ÐSending spam emails to those who aren’t interested.

                 Ð ÐHacking into another person’s account or system.
                 Ð ÐPhishing is a method of stealing someone’s personal information.
                 Ð ÐHosting a malware-infested website or serving as a conduit for the dissemination of malware.
                 Ð ÐHarassment of someone by e-mail, text messages, or social media.
                 Ð ÐPosting or transmitting offensive content to anyone on any website.

                 Ð ÐUsing the Internet to defame someone.
                 Ð ÐForgery of a person’s digital signature
                 Ð ÐUsing Internet resources to provide misleading information to clients/the general public in order to engage in
                   fraudulent financial transactions

                 Ð ÐPlagiarism, illegal downloads, and intellectual property theft

                   1.11 NETWORK SECURITY TOOLS AND SERVICES
                 Since the Internet became a popular tool for sharing resources and accessing data, an ever-increasing number of
                 people have been using it for both good and negative purposes. Everyone who uses the Internet should be aware of
                 security concerns and take precautions to resolve them.

                 Firewall

                 A firewall protects an organization’s, home’s, or individual’s internal network against malicious traffic from outside
                 networks. For this reason, a router or a computer (typically devoted to function as a firewall) may be deployed between
                 the exterior and internal networks. The network traffic is inspected by the firewall, and only data that does not break
                 the security constraint is allowed to pass through. Malicious malware is prevented from entering your network using
                 hardware firewalls in the form of routers. Software firewalls built on home computers, on the other hand, prevent
                 unwanted access or malware from obtaining access to them. In addition to providing additional security, network
                 firewalls can encrypt incoming data by transforming it to an unreadable format.

                                                                 Network based FIREWALL          Host based FIREWALL










                           Legitimate Traffic
                                                                                                  LAN








                         Non-Legitimate Traffic




                                                                            Basics of Networking and Web Architecture  133
   130   131   132   133   134   135   136   137   138   139   140