IP Layers & Abstractions
10/17/2016 - How information is transferred through the internet.
First, you enter a website into a browser or click a link. That information turns into a packet. The packet will get a label with the sender's address, receiver's address, and the type of packet it is. The packet is the launched onto the local area network (LAN). From there, the router will organize the packets and put them on the right paths. As the packets leave the router, they work their way to the router switch. As packets arrive at their destination, they are moved to the network interface. In this case, the packets will move onto the proxy. This is like the middleman and is commonly used for security. The proxy opens the packet and looks for the URL. If the URL is acceptable, then it will push it forward. If the proxy does not find the URL fit for security guidelines, the packet is distroyed. Now, the packet will hit the firewall. This protects information from coming in and leaving the security of the server. After the packet passes all of these obstacles, the packet has hit the internet.
Below is a video that goes more in depth in the subject.
First, you enter a website into a browser or click a link. That information turns into a packet. The packet will get a label with the sender's address, receiver's address, and the type of packet it is. The packet is the launched onto the local area network (LAN). From there, the router will organize the packets and put them on the right paths. As the packets leave the router, they work their way to the router switch. As packets arrive at their destination, they are moved to the network interface. In this case, the packets will move onto the proxy. This is like the middleman and is commonly used for security. The proxy opens the packet and looks for the URL. If the URL is acceptable, then it will push it forward. If the proxy does not find the URL fit for security guidelines, the packet is distroyed. Now, the packet will hit the firewall. This protects information from coming in and leaving the security of the server. After the packet passes all of these obstacles, the packet has hit the internet.
Below is a video that goes more in depth in the subject.
Cybersecurity
9/3/2016
CYBERSECURITY IS A VERY SERIOUS TOPIC. EVERYDAY MULTIPLE PEOPLE HAVE THEIR INFORMATION STOLEN OVER THE INTERNET. RECENTLY, IN CLASS, WE HAVE BEEN ASSIGNED TO RESEARCH SOME CYBERSECURITY THREATS. MY PARTNER AND I RESEARCHED PHISHING. PHISHING IS WHEN PEOPLE TRY TO GET YOUR INFORMATION BY ACTING LIKE LEGITIMATE COMPANIES (AMAZON, FACEBOOK, ETC.). PHISHING CAN HAVE A MAJOR IMPACT ON BUSINESSES AND ON EVERYDAY PEOPLE. ONCE SOMEONE GETS YOUR PERSONAL INFORMATION, THEY CAN ACCESS A LOT OF YOUR ACCOUNTS. YOU CAN PREVENT BEING A VICTUM OF PHISHING BY NOT GIVING OUT YOUR PERSONAL INFORMATION ONLINE. IN CONCLUSION, BE EXTREMELY CAREFUL ABOUT THE INFORMATION YOU GIVE OUT ONLINE.
CYBERSECURITY IS A VERY SERIOUS TOPIC. EVERYDAY MULTIPLE PEOPLE HAVE THEIR INFORMATION STOLEN OVER THE INTERNET. RECENTLY, IN CLASS, WE HAVE BEEN ASSIGNED TO RESEARCH SOME CYBERSECURITY THREATS. MY PARTNER AND I RESEARCHED PHISHING. PHISHING IS WHEN PEOPLE TRY TO GET YOUR INFORMATION BY ACTING LIKE LEGITIMATE COMPANIES (AMAZON, FACEBOOK, ETC.). PHISHING CAN HAVE A MAJOR IMPACT ON BUSINESSES AND ON EVERYDAY PEOPLE. ONCE SOMEONE GETS YOUR PERSONAL INFORMATION, THEY CAN ACCESS A LOT OF YOUR ACCOUNTS. YOU CAN PREVENT BEING A VICTUM OF PHISHING BY NOT GIVING OUT YOUR PERSONAL INFORMATION ONLINE. IN CONCLUSION, BE EXTREMELY CAREFUL ABOUT THE INFORMATION YOU GIVE OUT ONLINE.