you key in lot of personal information on websites you visit and the social networking websites that you are a part of. Through this information and details are password protected, yet these are vulnerable to be stolen and misused by thieves on the internet.

Identity Theft

When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as Identity Theft. In other words, Identity Theft is any kind of deception scam, or crime that results in the loss of personal data such as usernames, passwords, banking information, credit card numbers, Aadhars ID a Unique Identity Numbers (UID), which is then used without your permission to commit fraud and other crime, In today's world, the biggest challenge for every Iternet user is to safeguard his or her identity, which is constantly under threat from cyber thieves, hackers, and keyloggers.

SECURE DATA TRANSMISSION


Secure data transmission is imperative to privacy and protection from cyber and identity theft. This stop ensures that the users data travels through a secure environment that is resistant to penertration and hacking.

Following techniques may be applied to ensures secure transmission of data via the Iternet.

AUTHENTICATION AND AUTHORISATION:- Authentication is the basis of access control mechanism which is essential in securing data. When an idividual introduces herself/himself to the security system, then his or her identity has to be verified. This is called authentication. A username and a password are the most common forms of identification and authentication respectively. However, in present times, only this information is not adquate. Authorisation is also required to access network. The administrative polices determine what information and computing services can be accessed by whom and under what conditions.



INTRUSION DETECTION SYSTEM:- An Intrusion Detection System (IDS) checks all network movement and identifies doubtful patterns that may indicate a network or system attack from someone attempting to break into a system, for example, a Firewall.

CRYPHOTOGRAPHY/ENCRYPTION :- Any confidential data needs to be transferred over a secured channel. It needs to be encrypted or coded before being transmitted. Encryption is



Learning Computers with Kips

205

Previous page Home Next page