You are on page 1of 22

ANONYMITY IN THE

INTERNET
TOPICS COVERED
• ANONYMITY DEFINED
• TYPES OF ANONYMITY
• ANONYMITY AND THE INTERNET
• ADVANTAGES AND DISADVANTAGES OF
ANONYMITY
I. ANONYMITY: DEFINED MEANING:
THE STATE OF BEING NAMELESS; HAVING NO
IDENTITY. TYPES OF ANONYMITY:

• PSEUDO IDENTITY: IDENTIFIED BY A CERTAIN


PSEUDONYM, CODE, OR NUMBER.

• UNTRACEABLE IDENTITY: NOT KNOWN BY ANY NAME


INCLUDING PSEUDO NAMES.

• ANONYMITY WITH A PSEUDO ADDRESS TO RECEIVE


AND SEND CORRESPONDENCE WITH OTHERS: USING
ANONYMOUS REMAILERS, USER GROUPS, AND NEWS
TWO CHANNELS THAT CARRY OUT ANONYMOUS ACTS:
• ANONYMOUS USERS.
• ANONYMOUS SERVERS.

TWO TYPES OF ANONYMITY SERVERS:


* FULL ANONYMITY SERVERS
1. NO LOGGING
2. ENCRYPTION
3. HIDDEN IP ADDRESSES
4. NO PERSONAL INFORMATION REQUIRED
5. ONION ROUTING
6. DARKNET SERVICES
* PSEUDONYMOUS SERVERS
1. USE OF PSEUDONYMS
2. LIMITED PERSONAL INFORMATION
3. PRIVACY FOCUS
4. REDUCED ACCOUNTABILITY
5. COMMUNITY BUILDING
6. BALANCING ACT
ANONYMOUS USERS.
-ANONYMOUS USERS ARE INDIVIDUALS WHO
ENGAGE IN ONLINE ACTIVITIES, SUCH AS
BROWSING WEBSITES, PARTICIPATING IN FORUMS,
OR POSTING COMMENTS, WITHOUT REVEALING
THEIR REAL IDENTITY. THEY TYPICALLY USE
PSEUDONYMS OR DO NOT PROVIDE ANY PERSONAL
INFORMATION THAT COULD BE USED TO IDENTIFY
THEM. ANONYMITY ONLINE CAN PROVIDE PRIVACY
AND PROTECTION, BUT IT CAN ALSO BE MISUSED
FOR MALICIOUS OR UNETHICAL PURPOSES.
ANONYMOUS SERVERS
-ANONYMOUS SERVERS TYPICALLY REFER TO SERVERS OR
COMPUTER SYSTEMS THAT ARE SET UP TO PROVIDE
SERVICES OR HOST CONTENT ON THE INTERNET WHILE
MAINTAINING A HIGH DEGREE OF ANONYMITY AND
PRIVACY FOR THEIR OPERATORS. THESE SERVERS ARE
DESIGNED TO OBSCURE OR HIDE THE IDENTITY AND
LOCATION OF THE INDIVIDUALS OR ORGANIZATIONS
RUNNING THEM.
THE ADVANTAGES OF ANONYMITY
• ANONYMITY IS GOOD WHEN A WHISTLE-
BLOWER USES IT TO CHECK UNHEALTHY
ACTIVITIES WITHIN THE ORGANIZATION.
• ANONYMITY IS GOOD IN CASE OF NATIONAL
SECURITY.
• ANONYMITY IS GOOD IF INTIMIDATION AND
FEAR OF REPRISALS IS PRESENT
• ANONYMITY IS GOOD FOR SOME
RELATIONSHIPS AND THE SECURITY OF SOME
PEOPLE.
THE DISADVANTAGES OF ANONYMITY
• CRIMINALS AND EMBEZZLERS CAN USE IT TO
THEIR ADVANTAGE, ESPECIALLY IN ONLINE
SOCIAL NETWORKS.

• LOTS OF DISPUTES COULD BE SOLVED IF


INFORMATION FROM INDIVIDUALS’ PARTY TO
THESE DISPUTES CAN REVEAL THE NECESSARY
INFORMATION.
SECURITY IN THE CYBERSPACE
TOPICS COVERED

• CATEGORIES OF CYBER SECURITY


• DATA SECURITY
• PHYSICAL SECURITY
• PHYSICAL ACCESS CONTROLS
• ANONYMOUS SERVERS
• INFORMATION SECURITY CONTROLS
• SYSTEM SECURITY
• NETWORK SECURITY
THREE CATEGORIES OF CYBER
SECURITY
1. UNAUTHORIZED ACCESS TO DATA
2. ATTACKS ON SYSTEM RESOURCES
3. ATTACKS ON COMPUTER NETWORKS
Unauthorized access to data
-refers to the act of gaining entry to computer systems, networks, or digital resources without proper authorization or
permission. It is a violation of computer security and often illegal. When someone engages in unauthorized access,
they may view, modify, steal, or delete data without the owner's consent or knowledge.

Attacks on system resources


-refer to various malicious activities and techniques employed by cybercriminals and hackers to disrupt, degrade, or
compromise the functioning of a computer system's hardware or software components. These attacks can lead to
service outages, data loss, or unauthorized access to sensitive information. Here are some common types of attacks on
system resources.

Attack on a computer network


-refers to a malicious or unauthorized attempt to compromise the security, integrity, or availability of a network, its
resources, or the data it carries. These attacks can come from various sources, including hackers, cybercriminals, or
even insiders with malicious intent. The primary goals of network attacks can vary but often include unauthorized
access, data theft, disruption of network services, or the compromise of network devices and infrastructure.
DATA SECURITY - IS CONCERNED WITH
VULNERABILITIES PERTAINING TO
UNAUTHORIZED ACCESS TO DATA.

IT INVOLVES THESE THREE ELEMENTS:


• CONFIDENTIALITY
• INTEGRITY
• AVAILABILITY
TWO TYPES OF SECURITY:
- PHYSICAL SECURITY
- INFORMATION SECURITY
CONFIDENTIALITY
-REFERS TO THE PRACTICE OF PROTECTING SENSITIVE OR PRIVATE INFORMATION FROM
BEING DISCLOSED OR ACCESSED BY UNAUTHORIZED INDIVIDUALS OR ENTITIES. IT ENSURES
THAT ONLY THOSE WITH THE PROPER AUTHORIZATION OR NEED-TO-KNOW HAVE ACCESS TO
SUCH INFORMATION, MAINTAINING ITS SECRECY AND PREVENTING UNAUTHORIZED
DISCLOSURE OR MISUSE. THIS CONCEPT IS ESSENTIAL IN VARIOUS CONTEXTS, INCLUDING
BUSINESS, HEALTHCARE, LEGAL MATTERS, AND PERSONAL PRIVACY, TO SAFEGUARD
SENSITIVE DATA AND MAINTAIN TRUST AND PRIVACY.
INTEGRITY
-REFERS TO THE QUALITY OF BEING ACCURATE, COMPLETE, AND UNALTERED. IT ENSURES
THAT DATA REMAINS UNCHANGED AND RELIABLE THROUGHOUT ITS LIFECYCLE,
SAFEGUARDING AGAINST UNAUTHORIZED OR ACCIDENTAL MODIFICATIONS, CORRUPTION,
OR TAMPERING. DATA INTEGRITY IS CRUCIAL FOR MAINTAINING TRUST, DATA QUALITY, AND
THE PROPER FUNCTIONING OF SYSTEMS AND PROCESSES.
AVAILABILITY
-REFERS TO THE STATE OF BEING ACCESSIBLE AND OPERATIONAL WHEN NEEDED. IT
ENSURES THAT SYSTEMS, SERVICES, AND DATA ARE RELIABLY AND PROMPTLY AVAILABLE TO
AUTHORIZED USERS. HIGH AVAILABILITY IS CRUCIAL TO PREVENT DOWNTIME, MAINTAIN
PRODUCTIVITY, AND ENSURE THAT CRITICAL FUNCTIONS CAN BE PERFORMED WITHOUT
INTERRUPTION. IT IS A KEY ASPECT OF SYSTEM RELIABILITY AND RESILIENCE.
Physical security can be guaranteed if the following four
mechanisms are in place:
1. Deterrence to try to defend systems against intruders who may try to gain access.
2. Prevention used in mechanisms that work by trying to stop intruders from gaining access .
3. Detection should be the third line of defense. It assumes the intruder has succeeded or is in
the process of gaining access to the system. So it tries to “see” that intruder who has gained or
who is trying to gain access.
4. Response is an aftereffect mechanism that tries to respond to the failure of the first three
mechanisms. It works by trying to stop and/or prevent damage or access to a facility.
PHYSICAL ACCESS CONTROLS TO ENSURE
PHYSICAL SECURITY, A REGIME OF ACCESS
CONTROLS MUST BE PUT IN PLACE.
• PHYSICAL SECURITY BARRIERS (EX.
CLOSE CIRCUIT TELEVISION (CCTV))
• ELECTRONIC ACCESS CONTROLS (EX.
PASSWORDS AND FIREWALLS)
Cryptography –
the science of writing and reading coded messages, forms the basis for all secure
transmission.

• Encryption - a method that protects the communications channel from sniffers. The encryption
algorithm can either be:

-Symmetric Encryption VS Asymmetric Encryption-


* Symmetric Encryption - uses a common key and the same cryptographic algorithm to scramble and
unscramble the message Asymmetric Encryption.
*Asymmetric Encryption
- Both the sender and the receiver each have a pair of these keys, one public and one private.
AUTHENTICATION - IS A PROCESS
WHEREBY THE SYSTEM GATHERS AND BUILDS
UP INFORMATION ABOUT THE USER TO ASSURE
THAT THE USER IS GENUINE. - AUTHENTICATION
PROTOCOLS BASED ON CRYPTOGRAPHY USE TO
CREATE AN ENCRYPTED MESSAGE DIGEST THAT
IS APPENDED TO A DOCUMENT AS A DIGITAL
SIGNATURE.
DIGITAL SIGNATURE.
• A SECURE DIGITAL SIGNATURE SYSTEM
CONSISTS OF TWO PARTS:
1. A METHOD OF SIGNING A DOCUMENT
2. AUTHENTICATION THAT THE SIGNATURE WAS
ACTUALLY GENERATED BY WHOEVER IT
REPRESENTS.

• NON-REPUDIATION: ONCE SUBMITTED, A


DIGITAL SIGNATURES CAN NEVER BE DISOWNED
BY THE SIGNER OF A DOCUMENT CLAIMING THE
SIGNATURE WAS FORGED
TYPES OF EXPLOITS
• VIRUSES
• WORM
• TROJAN HORSE
• BOTNET
• DISTRIBUTED DENIAL-OF-SERVICE ATTACK
(DDOS)
• ROOTKIT
• E-MAIL SPAM
• PHISHING
• SPEAR-PHISHING
NETWORK SECURITY (DEFINED):

• IT IS CONCERNED WITH SECURING


COMPUTER NETWORKS AGAINST
VARIOUS KINDS OF ATTACKS. THESE
ATTACKS HAVE RANGED FROM
PROGRAMS LAUNCHED BY INDIVIDUALS
WITH MALICIOUS INTENTIONS TO
INDIVIDUALS WHO CLAIMED THEIR
INTENTIONS WERE BENIGN.
THE END

You might also like