Contact on: info@huryy.com

Computer ScienceTech

ROLES OF Internet service providers

5 Mins read
Internet service provider

ROLES OF Internet service providers

Internet service provider (ISP) is a company that provides Internet connections and services to individuals and organizations. In addition to providing access to the Internet, Internet service providers may also provide software packages (such as browsers), e-mail accounts, and a personal Web site or home page. Internet service providers can host Web sites for businesses and can build the Web sites themselves. Internet service providers are all connected to each other through network access points, public network facilities on the Internet backbone.

Internet service providers should use different subnet in network access hardware from the main server(s).

This will minimize the risk of intrusions, as the attacker must force to pass through

switching and Intrusion Prevention system or Intrusion Detection system.

Internet service providers should implement Access Control List

The Access Control List uses IP address and port number to deny access or allow access.

Access control lists can serve as a first line of defense against port scans and other malicious activity that originates from the Internet or from home users.

  • They should Place a firewall between the Internet service providers servers, the Internet, and the Internet service providers users.

 A firewall creates another level of security that must be overcome before gaining access to the servers on the interior network.

  • Internet service providers should implement a strong password policy.

 All passwords should be at least six characters long, and contain alphas, numeric, and special characters.

  • Internet service providers should keep logs of information, such as which user was connected at what time, and from which IP address.

 Logs of information allow them to monitor the trends in the logs and help to protect them against Legal action.

  • Internet service providers should implement Secure Shell Layer (SSL) on mail and web servers, if they provide such services to their subscribers.
  • They should implement Network based Intrusion Detection System (NIDS).

This security tool monitors network traffic and watch for packets that violate a specific set of rules. It then alerts the administrator andcan proactively destroy any bad packets.

Internet service providers have a duty to make sure that their contact information, in “Whois”, in routing registries (RFC1786) or in any other repository, is complete, accurate and reachable

  • Every Internet service provider SHOULD have an Appropriate Use Policy (AUP).

Whenever an Internet service provider contracts with a customer to provide connectivity to the Internet that contract should be governed by an AUP. The AUP should be reviewed each time the contract is up for renewal, and in addition, the Internet service provider should proactively notify customers as policies are updated.

Internet service provider
Internet service provider

DEFAMATION

“Defamation” is a catch-all term for any statement that hurts someone’s reputation. Written defamation is called “libel,” and spoken defamation is called “slander.” Defamation is not a crime, but it is a “tort” (a civil wrong, rather than a criminal wrong). A person who has been defamed can sue the person who did the defaming. (For in-depth information on defamation claims)

  • Defamation law tries to balance competing interests: On the one hand, people should not ruin others’ lives by telling lies about them; but on the other hand, people should be able to speak freely without fear of litigation over every insult, disagreement, or mistake. Political and social disagreement is important in a free society, and we obviously don’t all share the same opinions or beliefs. For instance, political opponents often reach opposite conclusions from the same facts, and editorial cartoonists often exaggerate facts to make their point.
  • What the victim must prove to establish that defamation occurred

The law of defamation varies from state to state, but there are some generally accepted rules. If you believe you are have been “defamed,” to prove it you usually have to show there’s been a statement that is all of the following:

Published, false, injurious, unprivileged

  • 1. First, the “statement” can be spoken, written, pictured, or even gestured. Because written statements last longer than spoken statements, most courts, juries, and insurance companies consider libel more harmful than slander.
  • 2. “Published” means that a third party heard or saw the statement — that is, someone other than the person who made the statement or the person the statement was about. “Published” doesn’t necessarily mean that the statement was printed in a book — it just needs to have been made public through television, radio, speeches, gossip, or even loud conversation. Of course, it could also have been written in magazines, books, newspapers, leaflets, or on picket signs.
  • 3. A defamatory statement must be false — otherwise it’s not considered damaging. Even terribly mean or disparaging things are not defamatory if the shoe fits. Most opinions don’t count as defamation because they can’t be proved to be objectively false. For instance, when a reviewer says, “That was the worst book I’ve read all year,” she’s not defaming the author, because the statement can’t be proven to be false.
  • 4. The statement must be “injurious.” Since the whole point of defamation law is to take care of injuries to reputation, those suing for defamation must show how their reputations were hurt by the false statement — for example, the person lost work; was shunned by neighbors, friends, or family members; or was harassed by the press. Someone who already had a terrible reputation most likely won’t collect much in a defamation suit.

PORNOGRAPHY

Pornography, or porn, refers to sexually explicit material intended to sexually arouse. Today porn is viewable at the click of a button by anyone with an Internet connection.

Pornography and age-inappropriate content is perhaps the biggest disadvantage of the Internet. The worst being underage porn, which is largely rampant in the deeper parts of the web. It is the lack of control over the distribution and unrestricted access of pornographic material, that is detrimental to children. All that parents can do, is lock harmful sites and monitor the sites viewed by their children.

Pornography is not just frowned upon by most societies, it’s also banned by some. The Internet makes uploading shocking content so easy, that we end up coming across inappropriate words and images, despite not wanting to

SPAM

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send — most of the costs are paid for by the recipient or the carriers rather than by the sender.

TYPES OF SPAM

Usenet spam

Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.

Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.

Email spam

Email spam targets individual users with direct mail messages.

Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.

Email spams typically cost users money out-of-pocket to receive. Many people – anyone with measured phone service – read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for Internet service providers and online services to transmit spam, and these costs are transmitted directly to subscribers

Internet service provider
Internet service provider
  • How to Become a Data Analyst – Salary, Qualifications, skills.
    How to Become a Data Analyst – Salary, Qualifications, skills. Hello, hope you are doing great. Let’s start by defining what a data analyst is? Whether it’s sales figures, audience demographics, and market…
  • The truth about Crypto-Currency.
    The truth about Crypto-Currency.  What to Know About Cryptocurrency. What is cryptocurrency? Cryptocurrency is a type of digital currency that generally only exists electronically. There is no physical coin or bill unless you…
  • Basic Computer Operations
    Basic Computer Operations. A computer as shown in the figure below performs basically five major operations or functionsirrespective of its size and make. These are 1) it accepts data or instructions by way…
  • Classification of Computers
    Classification of Computers. i. Classification of Computers by Size a) Micro-Computers • Micro –Computers are the Smallest class of Computers• Micro- Computers have one micro-processor in its Central Processing Unit• Micro-Processor refers to…
  • History of Computers
    History of Computers i. First generation computers (1946-1956) Overview of the Intelligent System They made use of vacuum tubes to store and process information. The tubesconsumed a lot of power and generated a…
Related posts
Computer ScienceGUITechUX

How to Become a Data Analyst - Salary, Qualifications, skills.

4 Mins read
How to Become a Data Analyst – Salary, Qualifications, skills. Hello, hope you are doing great. Let’s start by defining what a data analyst is? Whether it’s sales figures, audience demographics, and market research, or…
BusinessComputer ScienceTech

The truth about Crypto-Currency.

5 Mins read
The truth about Crypto-Currency.  What to Know About Cryptocurrency. What is cryptocurrency? Cryptocurrency is a type of digital currency that generally only exists electronically. There is no physical coin or bill unless you use a…
Computer ScienceTechUX

Basic Computer Operations

2 Mins read
Basic Computer Operations. A computer as shown in the figure below performs basically five major operations or functionsirrespective of its size and make. These are 1) it accepts data or instructions by way of input,…

Leave a Reply

Your email address will not be published. Required fields are marked *