Internet security
Introduction
Have you ever seen a home or institution or company does not have a network?The answer is no. The network has become necessary , and we can find it everywhere around us with a different type of usage among the people , and also helped us to develop our lives to become a modern life , network allowed us to transfer information and data in large quantities and confidentially and more safe than before but still there is some risks not as much as before but we can avoid it .
And here we are trying to clarify the importance of the security of information networks and what are the risks that threatened? And how we deal with these risks ?
Definition of networks
When two or more devices connected to each other for the exchange of information and data between devices , this is what we called it network . The network also allows its members to
communicate with other members of other networks
The need of networks
When information network was invented there was many reasons of why did we invent it, and we can not stop use it in our daily life until it become an important factor in our life, and here is the answer of why did we invent the networks?
1-Exchange the information
The main objective of information networks is the operations of exchanging the information and data between the edge of the network society easily and as soon as possible, and this is how it work between the parts of the institutions they are working to achieve ease of access and exchange the information among workers in the company.
Networks help to achieve the possibility of participating in the programs available in the community among all members of the network, and it provide financial expenses in buying multiple copies of those programs.
3-Sharing Hardware
One of the advantages of networks it allows the users to share devices such as printers, cameras, fax machines and many others resources .
4-E-Mail
One of the features of information networks is to provide the possibility of using e-mail for the members of the network society, which allows sending and receiving messages, documents and work orders among themselves.
5-Security
Where the administrator can control the System Enter and Access operations.

6-Improve Productivity
Where information networks working to improve cooperation between the members of the society leading
to improved productivity among individuals.
Internet security
We have already shown the great importance of information networks and what they offer of great services at all levels, and from that importance stems the importance of networks security trying to protect the users information.
In recent years many of the problems and crimes that related to information security and penetration of many information networks in the world have spread ,and it came to penetrating the most secret networks in the world such as the American CIA intelligence network and other networks, we can imagine what could be threat this poses for countries in an era where war become a war of information and not war of weapons as it was before.
The Definition of internet security
A set of actions that prevent people who are not allowed to access to the information that stored in
.And provide maximum protection of information in many and many ways and tools and different
Why the internet security is important ?
We have finished in the above paragraphs explain the importance of information networks for all,
to answer this question, we must show you some examples of that, to show the importance of communication and the risks that can happen in the absence of security.
-In Feb 2015 published that a Russian hacker managed to hack British banks and they are thought to have lost £650 million and the hacker spend two years hacking them.[for more info]
-In April 2011 a group of hackers have hacked Sony's Playstation Network and Sony confirmed that 77 million accounts personally identifiable information may have been exposed and the hackers spend 3 days attacking Sony's Playstation Network which force Sony to turn off the PlayStation Network , Sony stated that the outage costs were $171 million.[for more info]
There are many other cases, such as breach the network of the US Department of State for Defense Information, and we can imagine the size of the losses represented by such security breaches of information networks, whether if monetary losses as is the case for corporate information or intelligence losses is priceless, and that can be affect the independence of the major countries like America, here are some of the reasons that led to the interest in Internet security recently in the following points :-
-Technological improvement. communication technology have led to the existence of minds working to find security holes in these networks and exploit the bad exploitation.
-Grudge and hatred, where some of the motives have a childish personalities and implosive for
information unlawfully sense just ecstatic victory and break the barriers of secrecy and safety imposed
on information networks.
- Spread of information crimes. It has prevailed in recent obsession with cyber-crimes which from the people, organizations, competing companies and states, and that is what called by "information war"
Internet Crimes
Technology has brought us many benefits and services and facilities ,on the other hand it has also brought new kind of crimes , which was unfamiliar before .
Now a days criminals can use the technology to crime many crimes such as embezzlement, theft, and forgery crimes , and the common safety means become not enough to achieve the high level of protection from these criminals and recently appeared a new terms such as (Cybercrime) which is a new type of crime which the criminals use computers and information networks .
Hence it can be said that the information crimes are "a crime involving the use of information and communication technology in order to achieve a certain goal or win."
Classified information crimes
We can classify the crimes that take place through the use of information technology into several sections and each section regard to a particular type of crime that can be committed as follows: -
1. Crimes aimed to disseminate information.
hacking to obtained a secret information illegally using information networks and publish this information to the public , for example , publishing bank credit card information , bank account numbers , and intelligence information related to countries as what happened in hacking US intelligence agency CIA.
2. Crimes aimed to promote rumors.
In here the main goal is to published a wrong and incorrect information concerning a person or beliefs or countries in order to disturb the peace in the country as well as spread rumors about some things that cause confusion in the communities.
3. Electronic fraud crimes.
And in here the use of technology in the fraud in order to falsification of credit cards, passports and other official documents and identity papers, , as well as fake bank transfer operations from accounts to another by hacking the banking networks.
4. IT crimes.
The most important example is hacking programs of the computer that are original and make copies of them to be sold in the markets rather than the originals, such as drivers or application programs that are expensive.
Internet security elements
First: Data Confidentiality
is a necessary procedures and measures to prevent reporting unauthorized information that is applied to the secret ingredient or sensitive information needed , this is the meaning of security and confidentiality of the information with a different degree of mystery , according to the policy of the place and examples of the information that must be kept secret : personal information to individuals , the financial budget of the companies before the announcement , information on military sites in the country and military data
Second: Data Integrity
This aspect in maintaining the integrity of this information from fraud and change after announcing . for example : Ministries declaration or universities for the names of students admitted to work out , it is for the protection of these lists can be locked against change and forgery delete names and put other names , causing embarrassment and problems of legal institutions , and also to get financial information by changing the amount of financial 0.100 to 1 million people , and this is very important because of the huge loss of funds
Third: information Availability
Importance of the third aspect of information security components of access to information in a secure manner to persons authorized to access them through the provision of safe channels and rapid means of obtaining that information in this aspect vandals works through various means to deny and prevent users from accessing information such as deletion of information prior to the arrival or even the attack on the storage of information and the destruction or at least sabotage devices.
The motives of the attacker on the internet
It can come to mind a question as to why the vandals or hackers penetrating operations such as information networks and information security threat? What are the motives that can be had in order to carry out such acts? Must of everyone motivated to do something, here we will learn about some of the motives monitored by specialists to monitor intrusion and crime information to the organizers of the attacks.
First, the existence of motivation
Incentive or reason for doing this work lead us to a number of factors and many of them odd, ones for the purpose of fame and put their names in the news headlines earn fame in social Media, retaliation and And more factors, ratio is physical purpose
Second: Plan
The plan is the basis of the operation's success or failure Process such their operations is not an easy and you will surprised that some plans take prepared 2-3 years and some hacker planning process, we saw her easy, but their take 6 months to avoid on mistakes because less miss leads him to prison, plans are monitor the sacrificing and know the smallest details with him and etc
Third: Vulnerabilities
And we mean here be Vulnerabilities is the weaknesses in the information as a whole or in the information network or devices that operate within the network, or even software that is made available on the network information system , and these gaps can be in network design, or in the network configuration or software or databases contained in the network, and through these weakness gaps the attacker can penetrate the information networks and make damages , and the system administrator and managers of network have to carry out and checking constantly for any weaknesses or gaps can occur and work immediately on processing these gaps in order to avoid detection by some of the abusers.
Danger to the sources of internet
After all of the above to talk about the dangers faced by internet and protection systems , we are here to supply sources which they can pose a threat of internet.
The risk of jamming
Computer viruses are programs that are written by professional programmers for the purpose of damage another computer, or control or steal sensitive data, and are written in a certain way. computer viruses consider the most common problems in the information and internet security .
The poor design
Sometimes there may be some technical errors in the design of networks or systems that are working on these networks, The hacker exploit these errors to hacked .
The risk of misuse
There are some errors that result from the misuse of individuals to information networks inflict damage of the security and integrity of the data network, and whether this neglect, misuse intentional or unintentional, it eventually that leads expose your device to hacked
The risk of natural disasters
Information networks is a part of the world we live in that affected by other things and what could be a danger to the networks and their structure is the natural disasters that can fall without warning and without any human intervention, such as earthquakes, volcanic eruptions, explosions, fires, etc., and so you must reserve and work backups on a regular basis of the contents of the network and these backups in a place far away from the main venues of the network so that it can protect and retrieve information.
Hackers
The hacker generally the word describe the specialist and Capable of skills in the field of computer security and information, Our focus here by hacker is a person who uses his skills for sabotage and damage for a lot of purposes such as spying, stealing money, revenge, and as mentioned previously to prove breakthrough capabilities as a kind of technical challenge.
Viruses
Computer viruses are programs that are written by professional programmers for the purpose of damage another computer, or control or steal sensitive data, and are written in a certain way. computer viruses consider the most common problems in the information and internet security .
Internet Protection
Previously it has been reviewed by the most important risks information systems and experienced, and
we have seen that it is divided into several sections of which can be controlled, and what is happening
without human intervention, and the question now is how to avoid these risks and damages? What are the ways to avoid such problems in the information networks that belong to us?.
we have seen that it is divided into several sections of which can be controlled, and what is happening
without human intervention, and the question now is how to avoid these risks and damages? What are the ways to avoid such problems in the information networks that belong to us?.
Passwords
Without password no one unauthorized access to the information network, and the password is your
passport user to the network, password demonstrate to the network you are a person authoritative to
enter. It is more basic types of protect the information in the network which they work on the
protection of personal information and records your own and other data, you should be careful when
choosing them, and must be seven things are:
1-Make Password mixed between letters and numbers.
2-Do not share your password with other
3-Change it time to time.
4-Do not make it one word like (Muhammad).
5-Does not contain personal data, such as date of birth.
6-It should not be less than ten password boxes.
7-Choose password which is difficult and not easy to think about.
Firewalls
Firewall Be either software or hardware used to protect the network and server from hackers, knowing
that a lot of networks and servers come with a firewall system, but be sure whether he was doing factor
effective filter for all the things that you need, or if you are not able to do so, you must buy a firewall is
stronger than this.
Of course, there are many types of firewalls that will fit all types of information networks according to the
size of the network and the organization you are working on, and there are firewalls government
institutions and large companies with the speeds and capabilities are very high, such as that offered by
Cisco, as there are firewalls for small businesses limited companies and there are also firewalls that are
loaded on personal computers to protect all device.
Automatic Update
Automatic update programs and operating systems are the most important information network
security, because the construction of these complex systems is very practical and has some errors that
occur in the construction periods and companies usually work to create a persistent weaknesses
improvements in these programs and systems and those known as updates improvements, here it
comes importance of updating.
Backup
Backup to back up the contents of computers and information networks and save these backups in a
safe place, so you can refer to in case of breakdowns or accidents of the network and usually these
copies are taken on time and on a regular basis in accordance with the user on a weekly or monthly.
This method is one of the most important and easiest ways in which they can maintain the integrity of
information on internet especially in the case of total destruction of the network or attack and the
specialists provide several tips must be followed when doing backup copies of the information :
1-Save backups in a far and secure venue
2-Select storage media with high quality resist the factors of time
3-Do backups very often and should not exceed a month.
Conclusion
Internet security issue and exchanged across networks concern researchers , specialists, the international organizations and the world also , in view of the importance of information technology in various spheres of life in this age,There is no doubt that the increasing the reliance on information and networks also increases the influence of the dangers, and therefore we must continue to strive to face these dangers and develop methods and technical necessary to confront these dangers operations,and even seek to get rid of them if possible.
by:
Turki mohammed
Abdulaziz mohammed
Omar salem
Mohammed abdullah
Faiz Ibrahim







Bullshit there always be risk with new programmers and coders coming
ReplyDeleteexcellent subject����
ReplyDeletegood luck...badr
Good job👏🏻
ReplyDeleteI think this research is very important in our life, and I would thank you for described information in details. Keep going .