1. Trang chủ
  2. » Công Nghệ Thông Tin

CEHv6 module 44 internet content filtering techniques

44 196 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 44
Dung lượng 1,51 MB

Nội dung

Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3351 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Version 6 Module XLIV Internet Content Filtering Techniques Ethical Hacking and Countermeasures v6 Module XLIV: Internet Content Filtering Techniques Exam 312-50 Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3352 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News Source: http://www.wkyc.com/  News According to Cuyahoga County (Ohio) Prosecutor Bill Mason, children are becoming the major victims of Internet crime as children of all ages make use of Internet. He has announced that Brown County Prosecutor Thomas F. Grennan has joined the OICAC. OICAC (Ohio Internet Crimes Against Children) is the organization whose goal is to capture and successfully prosecute the online attackers. Participation of Thomas in OICAC will help the children safety on Internet. Mason added that advantages of using Internet are there, but children are unaware of the dangers. Distribution of child pornography and online child sexual harassment are the serious threats to children and their families. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3353 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective This module will familiarize you with: Internet Filter Key Features of Internet Filters Pros and Cons of Internet Filters Internet Content Filtering Tools Module Objective This module will familiarize you with:  Internet Filters  Key Features of Internet Filters  Pros and Cons of Internet Filters  Internet Content Filtering Tools Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3354 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Internet Filter Pros and Cons of Internet Filters Key Features of Internet Filters Internet Content Filtering Tools Module Flow Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3355 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Introduction to Internet Filter An Internet filter is a software that blocks unwanted content such as pornography and group sites Filters use a list of keywords and well-known URLs to restrict children from accessing inappropriate material More advanced filters can also block or filter chat rooms, instant messages, file downloads, and forums There are also filters that block out SPAM  Introduction to Internet Filters Filtering is a technique that allows/disallows the passage of unwanted data through the network according to the settings. Internet filter is a program that blocks/allows Internet traffic, according to the predefined set of rules. These filters can be used to block the unwanted content such as pornography and related group sites. There are many filters available that have the capacity to block a particular keyword. A list of keywords and well-known URLs are used by filters to keep children away from accessing unwanted content. IMs, downloading, forums, and chatting can be blocked by advanced Internet filters. Some separately programmed filters also block the spam. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3356 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Key Features of Internet Filters • Allow you to create a profile for each member of your family User profiles: • Provides detailed information on what your children have been doing and saying online, including sites visited Reporting: • You can set limits on when and how long a user may be online Time Limits: • Choose software that allows you to download regular updates to keyword and URL lists Regular updates: • Make sure the software will work with the browser you use, as well as your operating system Compatibility:  Key Features of Internet Filters Some key features of the Internet filters are:  User profiles: Separate profile for individual members of the family can be created.  Reporting: This feature reports the complete information of what a person has done staying online, including sites visited.  Time limits: This feature allows setting the time for how long a user may be online. Accessing Internet for more time can be restricted during working hours. Kids can be kept away from the computer during mid nights.  Regular updates: Maximum Internet filters provide the regular updates about new keywords and URL lists.  Compatibility: The software works with the browser and the operating system. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3357 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Pros and Cons of Internet Filters • Prevents children from deliberately or inadvertently accessing pornography • Prevent predators from talking to your children online • Allows kids to surf online without constant parental presence Pros: • Can sometimes filter out “safe” sites, words, and people • May create a false sense of security for parents • Tech-savvy kids may find a way around filters, or may access inappropriate content elsewhere Cons:  Pros and Cons of Internet Filters Internet Filters Pros:  Kids can be prevented from accessing porn sites  It prevents predators from talking to your kids online  It helps parents to allow kids to surf without any assistance Internet Filters Cons  Sometimes some good and safe sites, words, and people may be filtered out  False security can be assured to parents. Some kids may find ways to break filters or access unwanted content from other places such as cafes Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3358 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Internet Content Filtering Tools Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3359 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited iProtectYou iProtectYou is an Internet filtering and monitoring program designed for parents who are concerned about the possible detrimental effects of the Internet on the development of their children Features: • Block e-mails, chat sessions, instant messages, and P2P connections if they contain inappropriate words • Prevent your private information (credit card number for example) from being sent to the Internet • Set a schedule to specify days and times when on-line activity is allowed • Limit Internet Traffic to a specified amount of data that can be sent or received per user / per day • Control the list of programs that can have access to the Internet • Get notification e-mails with full description of blocked operations and an attached screen-shot of your kids' computer to control them remotely  iProtectYou Source: http://www.softforyou.com/ip-index.html The iProtectYou Internet filtering and parental control software program enables you to fully control your child’s online use, thus preventing your child from being exposed to the inappropriate, harmful, and dangerous aspects of the Internet. In addition, this program enables businesses to limit and control their employee’s access to the Internet and computer as a whole. Features:  iProtectYou restricts your family members from visiting Web sites and news groups that may contain pernicious information.  It blocks emails, chat sessions, instant messages, and P2P connections if they contain inappropriate words.  It prevents your private information (a credit card number, for example) from being sent to the Internet.  It sets a schedule to specify the day and time when on-line activity is allowed.  It limits Internet traffic to a specified amount of data that can be sent or received per user or per day.  It controls the list of programs that can have access to the Internet.  It gets notification emails with full description of blocked operations and an attached screen-shot of your kids' computer to control them remotely. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Internet Content Filtering Techniques Module XLIV Page | 3360 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Ngày đăng: 26/12/2013, 21:03

TỪ KHÓA LIÊN QUAN