ROLES OF Internet service providers
Internet service provider (ISP) is a company that provides Internet connections and services to individuals and organizations. In addition to providing access to the Internet, Internet service providers may also provide software packages (such as browsers), e-mail accounts, and a personal Web site or home page. Internet service providers can host Web sites for businesses and can build the Web sites themselves. Internet service providers are all connected to each other through network access points, public network facilities on the Internet backbone.
Internet service providers should use different subnet in network access hardware from the main server(s).
This will minimize the risk of intrusions, as the attacker must force to pass through
switching and Intrusion Prevention system or Intrusion Detection system.
Internet service providers should implement Access Control List
The Access Control List uses IP address and port number to deny access or allow access.
Access control lists can serve as a first line of defense against port scans and other malicious activity that originates from the Internet or from home users.
- They should Place a firewall between the Internet service providers servers, the Internet, and the Internet service providers users.
A firewall creates another level of security that must be overcome before gaining access to the servers on the interior network.
- Internet service providers should implement a strong password policy.
All passwords should be at least six characters long, and contain alphas, numeric, and special characters.
- Internet service providers should keep logs of information, such as which user was connected at what time, and from which IP address.
Logs of information allow them to monitor the trends in the logs and help to protect them against Legal action.
- Internet service providers should implement Secure Shell Layer (SSL) on mail and web servers, if they provide such services to their subscribers.
- They should implement Network based Intrusion Detection System (NIDS).
This security tool monitors network traffic and watch for packets that violate a specific set of rules. It then alerts the administrator andcan proactively destroy any bad packets.
Internet service providers have a duty to make sure that their contact information, in “Whois”, in routing registries (RFC1786) or in any other repository, is complete, accurate and reachable
- Every Internet service provider SHOULD have an Appropriate Use Policy (AUP).
Whenever an Internet service provider contracts with a customer to provide connectivity to the Internet that contract should be governed by an AUP. The AUP should be reviewed each time the contract is up for renewal, and in addition, the Internet service provider should proactively notify customers as policies are updated.
“Defamation” is a catch-all term for any statement that hurts someone’s reputation. Written defamation is called “libel,” and spoken defamation is called “slander.” Defamation is not a crime, but it is a “tort” (a civil wrong, rather than a criminal wrong). A person who has been defamed can sue the person who did the defaming. (For in-depth information on defamation claims)
- Defamation law tries to balance competing interests: On the one hand, people should not ruin others’ lives by telling lies about them; but on the other hand, people should be able to speak freely without fear of litigation over every insult, disagreement, or mistake. Political and social disagreement is important in a free society, and we obviously don’t all share the same opinions or beliefs. For instance, political opponents often reach opposite conclusions from the same facts, and editorial cartoonists often exaggerate facts to make their point.
- What the victim must prove to establish that defamation occurred
The law of defamation varies from state to state, but there are some generally accepted rules. If you believe you are have been “defamed,” to prove it you usually have to show there’s been a statement that is all of the following:
Published, false, injurious, unprivileged
- 1. First, the “statement” can be spoken, written, pictured, or even gestured. Because written statements last longer than spoken statements, most courts, juries, and insurance companies consider libel more harmful than slander.
- 2. “Published” means that a third party heard or saw the statement — that is, someone other than the person who made the statement or the person the statement was about. “Published” doesn’t necessarily mean that the statement was printed in a book — it just needs to have been made public through television, radio, speeches, gossip, or even loud conversation. Of course, it could also have been written in magazines, books, newspapers, leaflets, or on picket signs.
- 3. A defamatory statement must be false — otherwise it’s not considered damaging. Even terribly mean or disparaging things are not defamatory if the shoe fits. Most opinions don’t count as defamation because they can’t be proved to be objectively false. For instance, when a reviewer says, “That was the worst book I’ve read all year,” she’s not defaming the author, because the statement can’t be proven to be false.
- 4. The statement must be “injurious.” Since the whole point of defamation law is to take care of injuries to reputation, those suing for defamation must show how their reputations were hurt by the false statement — for example, the person lost work; was shunned by neighbors, friends, or family members; or was harassed by the press. Someone who already had a terrible reputation most likely won’t collect much in a defamation suit.
Pornography, or porn, refers to sexually explicit material intended to sexually arouse. Today porn is viewable at the click of a button by anyone with an Internet connection.
Pornography and age-inappropriate content is perhaps the biggest disadvantage of the Internet. The worst being underage porn, which is largely rampant in the deeper parts of the web. It is the lack of control over the distribution and unrestricted access of pornographic material, that is detrimental to children. All that parents can do, is lock harmful sites and monitor the sites viewed by their children.
Pornography is not just frowned upon by most societies, it’s also banned by some. The Internet makes uploading shocking content so easy, that we end up coming across inappropriate words and images, despite not wanting to
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send — most of the costs are paid for by the recipient or the carriers rather than by the sender.
TYPES OF SPAM
Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.
Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.
Email spam targets individual users with direct mail messages.
Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.
Email spams typically cost users money out-of-pocket to receive. Many people – anyone with measured phone service – read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for Internet service providers and online services to transmit spam, and these costs are transmitted directly to subscribers
- Freelancing tips for beginnersHow to start freelancing with no experience is a very challenging experience. Online Freelancing is a new way to make money from home and on your own terms. Everyone working online must know these 7 tips aimed at beginners.
- Software Test Metrics and MeasurementsSoftware Test Metrics and Measurements In software projects, it is most important to measure the quality, cost and effectiveness of the project and the processes. Without measuring these, project can’t be completed successfully. This uses Software Test Metrics and Measurements to measure.
- Distributed system Communication techniquesCommunication techniques in Communication techniques distributed system
- Distributed systems in computer ScienceOverview of distributed systems in computer Science Basic Algorithms Various characteristics of distributed systems in computer Science Design issues of distributed systems in computer Science
- Computer MisuseThe Computer Misuse Act is designed to protect computer users against willful attacks and theft of information. Offences under the act include hacking, unauthorized access to computer systems and purposefully spreading malicious and damaging software (malware), such as viruses. The act makes it an offence to access or even attempt to access a computer system without the appropriate authorization. Therefore, even if a hacker tries to get into a system but is unsuccessful they can be prosecuted using this law. The act also outlaws “hacking” software, such as packet sniffers, that can be used to break into or discover ways to get into systems.