Monday, December 9, 2019

Electronic Message Analysis for Malware Detection

Question: Discuss about the Electronic Message Analysis for Malware Detection. Answer: Introduction The Internet keeps on developing exponentially till date. Governments, Individuals and business organizations rely on the Internet, as it provides quick remuneration to end users of the services. With all these benefits it also poses some security and privacy risks. The services through the internet will depend on the bandwidth of the connection, use of security mechanisms and the used type of connection. The following report explores the different processes important to connect to the internet and the risks related to it. Some of the most important roles of ISP are providing Internet access, providing personal web space on internet or web hosting services and providing mailing services Description of services provided by ISPs Providing Internet access: The most important role of the ISPs is, they help the users to connect their workstations to the internet. This enables the users to send and receive data from the different resources available on internet. Providing personal web space on internet or web hosting services: Most of the ISPs also host private websites and provide allocate domains (web space) to the private or public organizations. Providing mailing services: ISPs also provide Email services to the users or its clients. The amount of storage for this e mail services by the ISPs differ according to the different ISPs. Prices for Web space from two ISPs Name Price Features eirhost.com 33.00 Provides 10 GB/mo bandwidth. Daily backup.600 email accounts. nua.ie 125.00 Provides 15GB/mo bandwidth .5 MySQL databases.1000 email accounts.Domain name The domain name can be thought as a unique name that is used to identify a site using the domain name system (DNS). This is used to represent a specific internet protocol or a server system that is used for the hosing of a website. For Crumlin, as the company wants to secure its client data, the domain name, crumlinsec.ie is available with the annual fees of 24.99 on eirhost.com. For the websites, the bandwidth is defined as the amount of data that can be transmitted through a medium in a fixed amount of time. The example of a site that has a high bandwidth is Netflix. Digital signature In order to protect the computer system at the organization it should train its employees not to open the emails and attachments in it to avoid the infection of the virus on the system. Additionally the company should use latest antivirus programs. The users can use the digital signatures that are used to provide the information about the owner of the information by generating a one way hash key. The senders and receivers private and public keys are used to encrypt and decrypt data before sending the data. The cookies are some kind messages that are received by the web browsers from any web server. The cookie stores the personal information of the users which they inserted on the website and is packed and sent back to the web browsers from the server. If the user frequently visits a specific site then the cookies are helpful in logging in to the site. The encryption is another technique to protect the confidentiality of the users information. The encrypted data can be only decrypted by the intended users public or private key. A firewall is a framework intended to keep unapproved and un-authenticated users access to or from a private/ organizational computer networks. Firewalls are much of the time used to keep unapproved Internet users from getting to private systems associated with the Internet (frequently denoted as intranets for the organizations). All the data packets entering or leaving the intranet go through the firewall, which looks at every message for some predefined criteria. The filtering softwares mainly depends on the three main activities theses are, key word blocking, web rating systems and site blocking. The key word blocking works on principle of blocking the content or the site if it contains some specific key words. The web rating system works on the emerging techniques that rates the websites depending upon the offensive content, violence etc, the higher the rating is the more the site is objectionable. The last one is, site blocking. In this technique the filtering software blocks the sites that are listed by the users. Methods of internet connection their usage levels, speed and cost In case of the wired broadband connection, the service providers use the fibre optic technology that converts the electrical signal into light and transmits through this medium. Service provider Usage level Speed cost Imagine 20GB/day 70Mb/sec 59.99/mo Eir Unlimited 100Mb/sec 60/mo For the wireless broadband connection, Service provider Usage level Speed cost Virgin media unlimited 240Mb/sec 35/mo eir unlimited 100Mb/sec 35/mo Pure Telecom unlimited 100Mb/sec 29/mo Evaluation of internet as a research tool The internet is considered as the powerful medium for accessing and sharing of the information. As a research tool, the internet enables us prompt access to a lot of data with reference to a specific point or subject. Search engines with web crawler can recover in no time flat a rundown of sites positioned by their significance to that specific subject. Be that as it may, pertinence is for all intents and purposes the main parameter considered via web indexes. This implies selecting what data is helpful and which not can be tedious and frequently non-gainful without an attentive screening of those results. Through the Internet individual users can get to a lot of data with reference to a required subject in a brief span and without worrying about the geographic obstructions, permitting them to counsel diverse point of views of different individuals on that particular subject. The web is likewise adaptable and simple to access, without geographic and time limits. By the by the dependability of a source can be questionable and insecure. Institutional locales confirm the unwavering quality of the data and its auspiciousness has a tendency to be stable in nature. Logical recommendations based on the analysis of information The organization is connecting to the internet for the first time; therefore it should carefully connect its workstations of the employees to the internet. In order to do this, the company should build an intranet of the systems at the organization. Additionally, it should implement the firewalls so that only the authorized users can use the systems. As the speed is related to the bandwidth depending on which the ISPs determine the prices for the connection. Therefore, with the higher bandwidth for the connection the price for the connection also increases. The mail boxes, web servers and the databases containing the client data needs to be protected from the un-authorized users and cyber attacks. For the home use the wireless broadband connection is suitable as there is less amount of risks of cyber attacks on the contrary the organizations should considers about adopting the wired broadband connections that provides better speed and better security mechanisms. Conclusion As new company that is going to connect with to the internet in order to provide better client survives, the Crumlin also have to confront the different issues related to it. As a new organization that is going to connect with the internet; along with the benefits, these system based applications and administrations can pose security threats and risks to people and to the information assets of organizations Like the confidentiality, security and privacy of the clients data. Thus patching the applications, use of encryption and wired connection can provide a secured IT infrastructure for the company. Bibliography Aziz, A., Uyeno, H., Manni, J., Amin, M. and Staniford, S., Fireeye, Inc., 2015.Electronic message analysis for malware detection. U.S. Patent 9,106,694. Chen, Z., Dong, W., Li, H., Zhang, P., Chen, X. and Cao, J., 2014. Collaborative network security in multi-tenant data center for cloud computing.Tsinghua Science and Technology,19(1), pp.82-94. Gan, C., Yang, X., Zhu, Q., Jin, J. and He, L., 2013. The spread of computer virus under the effect of external computers.Nonlinear Dynamics,73(3), pp.1615-1620. Kaur, T., Malhotra, V. and Singh, D., 2014. Comparison of network security tools-firewall, intrusion detection system and Honeypot.Int. J. Enhanced Res. Sci. Technol. Eng, pp.200-204. Lin, D., Emc Corporation, 2015.Anomaly detection system for enterprise network security. U.S. Patent 9,112,895. Peng, M., He, X., Huang, J. and Dong, T., 2013. Modeling computer virus and its dynamics.Mathematical Problems in Engineering,2013. Wang, L., Jajodia, S., Singhal, A., Cheng, P. and Noel, S., 2014. k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities.IEEE Transactions on Dependable and Secure Computing,11(1), pp.30-44. Zhang, C. and Huang, H., 2016. Optimal control strategy for a novel computer virus propagation model on scale-free networks.Physica A: Statistical Mechanics and its Applications,451, pp.251-265.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.