Internet
Access provided by a
series of companies known as Internet service providers (ISP). Our ISP is
a company called Andrews and Arnold. The physical connectivity and layout
is described in detail in the Network
overview. As long as the link to Andrews and Arnold is up and the
router is switched on, Internet access is available from all machines.
An
open Internet link is a doorway, and like any open doorway, raises certain
security issues and concerns, which need to be addressed. Broadly, these
fall into two main categories, abuse of the system from within, and
security breaches from outside.
Abuse
of the system
To
prevent abuse of the Internet by users on the ECCP computers we have a 'voluntary
code of practice', which is described in the Welcome. In addition we
are currently evaluating packages that prevent access to certain sites,
although this can prove difficult with the search criteria that is
sometimes required by those attending the counselling course
Outside
security attacks
These
broadly fall into two types. Malicious attacks (including mail attacks,
worms and viruses), aimed at destroying or modifying systems, which are
generally used to cause problems for the computer user; and intruder
attacks (including virus Trojans and hacking) where outside users try to
gain access to a computer remotely to access secure data, often without
leaving a trace that they have visited the site.
Malicious
Attacks
All
machines run the Norton anti-Virus software, which should prevent all
known virus attacks. New Virus's are being created every day, and as a
result, virus software companies are constantly updating their database on
a minute-by-minute basis. Each time you logon to the Internet, the latest
virus database will download in the background automatically. A real-time
monitor runs to scan every file and mail copied to the machine.
Additionally the monitor will also scan removable media such as diskettes
and CD's. Remember, this will only prevent viruses. It does not prevent
you from downloading a piece of software that is not deemed to be a virus.
Such software includes, sales software, some spy software, ad software, or
anything else, you choose to download. Be aware that part of the voluntary
code of practice is that you do not install additional software without
first getting clearance. For example, downloading some music software,
will automatically download ad software the music companies have be paid for
somehow obviously, and adverts do this).
Intruder
Attacks
All
PC's have access points for use by communications software called
sockets. Think of it as a software equivalent of a many pronged power plug. Each socket can be
used for a particular communication function and they are often used by
hackers to circumnavigate security and access a computer remotely. To
prevent unauthorised access through these sockets, we use a firewall
called ZoneAlarm. This starts automatically when the computer is loaded.
What
this software will do is inform you every time a use is made of a socket
or an attempt is made to modify your system via a remote request. A popup
panel will be displayed asking you what to do. Some of these requests are
valid. For example if you change the default Home page. You can not only
inform the system that a particular action is ok, you can also tell it to
remember the reply for the next time it happens. Be careful when doing
this. If you are unsure of what is happening, reject the request.
Irritations
As
mentioned, sometimes if you do download certain software you will get
things happening which can be termed irritants such as popup's. If these
become a problem, detailed instructions to remove these can be found in
the relevant Help on Browser
problems.
For
more detailed instructions on Virus
and
Firewall
attacks, see the relevant
section in this site.
|