1. Application Layer Security
At this level each application is responsible for providing
security. Implementation Involves at this level only the client and server.
Security at this level is more simple communication only via the Internet only
Involves two parties items, namely the sender and recipient (ie the email
application. The sender and receiver can agree to use the same protocol and use
various types of security service available.
2. Transport Layer Security
At this level of security that apply more complicated. One
method of security at this layer is the Transport Layer Security (TLS). TSL is
a protocol developed by Netscape for security on the Internet
For transactions on the Internet, security include:
- Customers need to be sure that the server in question is
actually owned vendor, not a cheater
- Customers need to be sure that the content of the message
it sends is not modified during the transaction. Message integrity must be
maintained
- Customers need to be sure that no unauthorized persons who
can receive it sends sensitive information, such as credit card numbers
In addition to the three above, TLS can also provide
features to vendor (receiver) authenticates the customer.
3. Security at the IP Layer
At the IP layer, the implementation of security features
(security) is very complex Because many devices are Involved. Security at this
level using IP Security (IPSec). IPSec is a set protocol designed by the IETF
(Internet Engineering Task Force) to provide security to the packets of the
data sent via the Internet. IPSec does not define any particular method of
encryption or authentication, but menyedikan framework and security mechanisms.
While the user who chooses the method of encryption / otentifikasinya.
4. Firewall
An organization can protect him from the outside world by a
firewall. Firewall is a router that is placed between an organization's
internal network and the Internet. Firewalls designed to skip Certain of data
packets and filter (block) the others.
There are 2 kinds Firewall as follows:
a. Packet-filter firewall
Ie skip or block of the data packets based on information on
heder in network-layer or transport layer, the IP address of the sender and
receiver, the port address of the sender and receiver, and the type of protocol
used (eg TCP or UDP) , A packet-filter firewall is a router that uses a table
to Determine the which packets should be discarded.
b. Proxy firewall
Packet-filter firewall restrict the data packet based on
header information, but can not choose based on what the actual content of a
particular message. For example an organization apply the wisdom that only
partner that can transmit the data, while the data coming from the outside
partner will be rejected. This can not be done by packet-filter firewall
Because it is not Able to distinguish all the of data packets that come in on
TCP port 80 (the default port used for Internet)
Sousinya is to install a proxy on the computer (also known
as a gateway) that beada between the client computer and the server of the
company. When someone sends a message, the proxy will send a message to the
server to receive the message. The server will skip packets at the application
level and find out if the package is acceptable. If not then the message will
be discarded and an error message will be sent.
5. Access Control
Access control is a preventive effort to provide security on
a data network. An organization needs access control rules to protect its
resources from unauthorized users. There are three methods that can be used for
access control items, namely passwords, tokens and biometrics.
6. Password
UUM technique is used to authorize the use of passwords.
Each user requires a password to access the system. Effective Passwords have
the following criteria:
1. Have at least 6 characters long
2. Determined by the administrator Because The user can
choose Easily guessed passwords
3. Passwords should be changed Periodically
7. Token
Token is a small device (for example, cards, keys, etc.)
that contains electronic circuitry untuksecurity control
8. Biometric
Ie some user characteristics are used to gain access to a
system. Can be a voice, fingerprints, retina pattern or structure of the face.
Belum ada tanggapan untuk "All Sorts of Internet Security"
Post a Comment