{"id":120,"date":"2009-11-18T14:26:17","date_gmt":"2009-11-18T08:56:17","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=120"},"modified":"2024-11-09T16:06:28","modified_gmt":"2024-11-09T10:36:28","slug":"things-you-ought-to-know-it-security-ii","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/","title":{"rendered":"THINGS YOU OUGHT TO KNOW (IT SECURITY) &#8211; II"},"content":{"rendered":"<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">The Internet was built on trust. Back in the mid 1960s, computers were very expensive and slow by today\u2019s standards, but still quite useful. To share the expensive and scarce computers installed around the country, the U.S. government funded a research project to connect these computers together so that other researchers could use them remotely. This project was called the <\/span><a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#ARPAnet\" target=\"new\" rel=\"noopener noreferrer\"><strong><em><span style=\"font-size: 10pt; color: windowtext; font-family: 'Verdana','sans-serif';\">ARPAnet<\/span><\/em><\/strong><\/a><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">, named after the government research agency \u2013 ARPA, the Advanced Research Projects Agency \u2013 that funded and managed the project. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">Key to the ARPAnet was the level of trust placed in its users; there was little thought given to malicious activity. Computers communicated using a straightforward scheme that relied on everybody playing by the rules. The idea was to make sharing ideas and resources easy and as efficient as the technology of the day provided. This philosophy of trust colors many of the practices, procedures, and technologies that are still in place today. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">Only within the last few years, when Internet commerce (known as <\/span><a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#e-commerce\" target=\"new\" rel=\"noopener noreferrer\"><strong><em><span style=\"font-size: 10pt; color: windowtext; font-family: 'Verdana','sans-serif';\">e-commerce<\/span><\/em><\/strong><\/a><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">) began to spread, it has become inadequate to rely principally on trust. Since the days of the ARPAnet, we\u2019ve changed the way we use computer networks while others have changed the underlying technologies, all in an attempt to improve the security of the Internet and the trust we place on it. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">Let\u2019s dig deeper into examples of what we trust in our daily lives. When you receive mail through the post office, many envelopes and the letters in them contain the sender\u2019s address. Have you ever wondered if those addresses were valid; that is, do they match the address of the person or persons who really sent them? While you could check to see that those addresses are valid and refer to the person they name, it\u2019s not an easy task. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">How would you go about it? Would you call the phone number provided with the letter? That number could also be invalid, and the person that answers the phone could be as misleading as the original address. Perhaps you could call directory assistance or the police department that has jurisdiction over the town where the letter was supposedly from. They might be helpful, but that is likely to take lots of time. Most people wouldn\u2019t bother. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">And it\u2019s not just return addresses either. How about advertisements, news stories, or the information printed on groceries? Suppose you were on a low-fat diet. You\u2019d want to buy foods low in fat. To select the right foods, you\u2019d read the product label at the grocery store. How do you know that the label information is valid? What\u2019s to say it\u2019s not forged? And how would you know? <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">The Internet has many of the same issues, and email is one of the best examples. In an email message, an intruder can easily fabricate where the came from. But this information forging \u2013 called <\/span><a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#spoofing\" target=\"new\" rel=\"noopener noreferrer\"><strong><em><span style=\"font-size: 10pt; color: windowtext; font-family: 'Verdana','sans-serif';\">spoofing<\/span><\/em><\/strong><\/a><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\"> by intruders and security professionals \u2013 is not limited to just email. In fact, the basic unit of information transferred on the Internet \u2013 called a <\/span><a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#packet\" target=\"new\" rel=\"noopener noreferrer\"><strong><em><span style=\"font-size: 10pt; color: windowtext; font-family: 'Verdana','sans-serif';\">packet<\/span><\/em><\/strong><\/a><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\"> \u2013 can also be easily forged or spoofed. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">What does this mean and why should you care? It means that any information you receive from some other computer on the Internet should not be trusted automatically and unconditionally. When you trust an email message that turns out to have a harmful virus attached to it, your computer can be infected, your <\/span><a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#files\" target=\"new\" rel=\"noopener noreferrer\"><strong><em><span style=\"font-size: 10pt; color: windowtext; font-family: 'Verdana','sans-serif';\">files<\/span><\/em><\/strong><\/a><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\"> destroyed, and your work lost. And that\u2019s why you should care. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">This is how the Internet works. It was built on trust. Over time, there have been technological changes that are worthy of a higher level of our trust than before. Nonetheless, a true sense of insecurity is better than a false sense of security. So, think about the information you trust. Be critical and cautious. <\/span><\/p>\n<p><span style=\"font-size: 10pt; font-family: 'Verdana','sans-serif';\">Source: <a href=\"http:\/\/www.cert.org\">www.cert.org<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet was built on trust. Back in the mid 1960s, computers were very expensive and slow by today\u2019s standards, but still quite useful. To share the expensive and scarce computers installed around the country, the U.S. government funded a research project to connect these computers together so that other researchers could use them remotely. This project was called the ARPAnet, named after the government research agency \u2013 ARPA, the Advanced Research Projects Agency \u2013 that funded and managed the project. Key to the ARPAnet was the level of trust placed in its users; there was little thought given to malicious activity. Computers communicated using a straightforward scheme that relied on everybody playing by the rules. The idea was to make sharing ideas and resources easy and as efficient as the technology of the day provided. This philosophy of trust colors many of the practices, procedures, and technologies that are still in place today. Only within the last few years, when Internet commerce (known as e-commerce) began to spread, it has become inadequate to rely principally on trust. Since the days of the ARPAnet, we\u2019ve changed the way we use computer networks while others have changed the underlying technologies, all [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-120","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Internet Trust and Security: A Critical Look<\/title>\n<meta name=\"description\" content=\"Explore how the Internet&#039;s trust-based foundation affects security today. Understand why being critical and cautious is essential.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet Trust and Security: A Critical Look\" \/>\n<meta property=\"og:description\" content=\"Explore how the Internet&#039;s trust-based foundation affects security today. Understand why being critical and cautious is essential.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2009-11-18T08:56:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-09T10:36:28+00:00\" \/>\n<meta name=\"author\" content=\"Spam Prats\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spam Prats\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/\"},\"author\":{\"name\":\"Spam Prats\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"headline\":\"THINGS YOU OUGHT TO KNOW (IT SECURITY) &#8211; II\",\"datePublished\":\"2009-11-18T08:56:17+00:00\",\"dateModified\":\"2024-11-09T10:36:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/\"},\"wordCount\":652,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/\",\"name\":\"Internet Trust and Security: A Critical Look\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2009-11-18T08:56:17+00:00\",\"dateModified\":\"2024-11-09T10:36:28+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"description\":\"Explore how the Internet's trust-based foundation affects security today. Understand why being critical and cautious is essential.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/things-you-ought-to-know-it-security-ii\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"THINGS YOU OUGHT TO KNOW (IT SECURITY) &#8211; II\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\",\"name\":\"Spam Prats\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"caption\":\"Spam Prats\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/admin-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet Trust and Security: A Critical Look","description":"Explore how the Internet's trust-based foundation affects security today. Understand why being critical and cautious is essential.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/","og_locale":"en_US","og_type":"article","og_title":"Internet Trust and Security: A Critical Look","og_description":"Explore how the Internet's trust-based foundation affects security today. Understand why being critical and cautious is essential.","og_url":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2009-11-18T08:56:17+00:00","article_modified_time":"2024-11-09T10:36:28+00:00","author":"Spam Prats","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spam Prats","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/"},"author":{"name":"Spam Prats","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"headline":"THINGS YOU OUGHT TO KNOW (IT SECURITY) &#8211; II","datePublished":"2009-11-18T08:56:17+00:00","dateModified":"2024-11-09T10:36:28+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/"},"wordCount":652,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/","url":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/","name":"Internet Trust and Security: A Critical Look","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2009-11-18T08:56:17+00:00","dateModified":"2024-11-09T10:36:28+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"description":"Explore how the Internet's trust-based foundation affects security today. Understand why being critical and cautious is essential.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/things-you-ought-to-know-it-security-ii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"THINGS YOU OUGHT TO KNOW (IT SECURITY) &#8211; II"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498","name":"Spam Prats","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","caption":"Spam Prats"},"url":"https:\/\/ivyproschool.com\/blog\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"predecessor-version":[{"id":12485,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/120\/revisions\/12485"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}