Internet Security Overview

 

Internet Access provided by a series of companies known as Internet service providers (ISP). Our ISP is a company called Andrews and Arnold. The physical connectivity and layout is described in detail in the Network overview. As long as the link to Andrews and Arnold is up and the router is switched on, Internet access is available from all machines. 

An open Internet link is a doorway, and like any open doorway, raises certain security issues and concerns, which need to be addressed. Broadly, these fall into two main categories, abuse of the system from within, and security breaches from outside.

 

Abuse of the system

To prevent abuse of the Internet by users on the ECCP computers we have a 'voluntary code of practice', which is described in the Welcome. In addition we are currently evaluating packages that prevent access to certain sites, although this can prove difficult with the search criteria that is sometimes required by those attending the counselling course

 

Outside security attacks

These broadly fall into two types. Malicious attacks (including mail attacks, worms and viruses), aimed at destroying or modifying systems, which are generally used to cause problems for the computer user; and intruder attacks (including virus Trojans and hacking) where outside users try to gain access to a computer remotely to access secure data, often without leaving a trace that they have visited the site.

Malicious Attacks

All machines run the Norton anti-Virus software, which should prevent all known virus attacks. New Virus's are being created every day, and as a result, virus software companies are constantly updating their database on a minute-by-minute basis. Each time you logon to the Internet, the latest virus database will download in the background automatically. A real-time monitor runs to scan every file and mail copied to the machine. Additionally the monitor will also scan removable media such as diskettes and CD's. Remember, this will only prevent viruses. It does not prevent you from downloading a piece of software that is not deemed to be a virus. Such software includes, sales software, some spy software, ad software, or anything else, you choose to download. Be aware that part of the voluntary code of practice is that you do not install additional software without first getting clearance. For example, downloading some music software, will automatically download ad software the music companies have be paid for somehow obviously, and adverts do this).

 

Intruder Attacks

All PC's have access points for use by communications software called sockets. Think of it as a software equivalent of a many pronged power plug. Each socket can be used for a particular communication function and they are often used by hackers to circumnavigate security and access a computer remotely. To prevent unauthorised access through these sockets, we use a firewall called ZoneAlarm. This starts automatically when the computer is loaded.

What this software will do is inform you every time a use is made of a socket or an attempt is made to modify your system via a remote request. A popup panel will be displayed asking you what to do. Some of these requests are valid. For example if you change the default Home page. You can not only inform the system that a particular action is ok, you can also tell it to remember the reply for the next time it happens. Be careful when doing this. If you are unsure of what is happening, reject the request.

 

Irritations

As mentioned, sometimes if you do download certain software you will get things happening which can be termed irritants such as popup's. If these become a problem, detailed instructions to remove these can be found in the relevant Help on Browser problems.

 

For more detailed instructions on Virus and Firewall attacks, see the relevant section in this site.