Preview

Internet Filters

Satisfactory Essays
Open Document
Open Document
442 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Filters
Peter Kimbrell
Dr Beth Gibbs
Microcomputers CIS146
October 21, 2014
Internet Filters
When browsing the Internet, users may encounter a filter. Filters are programs that remove or block certain items from being displayed. Four widely used Internet filters are anti-spam programs, web filters, phishing filters, and pop-up blockers.
An anti-spam program is a filtering program that attempts to remove spam before it reaches an Inbox or forum. Spam is an unsolicited email message or posting sent too many recipients or forums at once. The content of spam ranges from selling a product or service, to promoting a business opportunity, to advertising offensive material. Spam also may contain links or attachments that contain malware. If an email
…show more content…
Some restrict access to specific websites; others filter websites that use certain words or phrases. Many businesses use web-filtering software to limit employee’s web access CITATION Fin14 \l 1033 (Finch and Redder). Some schools, libraries, and parents use this software to restrict access to minors.
A phishing filter is a program that warns or blocks users from potentially fraudulent or suspicious websites. Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain someone’s personal and/or financial information. Some phishing messages ask people to reply with their information; others direct them to a phony website or a pop-up window that looks like a legitimate website, which then collects their information CITATION Lan14 \l 1033 (Lane). Some browsers include phishing filters.
A pop-up blocker is a filtering program that stops popup ads from displaying on webpages. A pop-up ad is an Internet advertisement that suddenly appears in a new window on top of a webpage. Many browsers include a pop-up blocker. People also can download pop-up blockers from the web at no cost CITATION Fin14 \l 1033 (Finch and

You May Also Find These Documents Helpful

  • Good Essays

    With children doing so much of their school work and research on the internet it is important to try to maintain a safe, appropriate environment especially when they are using the internet at school or the library. “The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. CIPA imposes certain types of requirements on any school or library that receives funding for Internet access or internal connections from the E-rate program – a program that makes certain communications technology more affordable for eligible schools and libraries. In early 2001, the FCC issued rules implementing CIPA.” (FCC, n.d.). CIPA was enacted to protect children while they use the internet at school or libraries where they should feel safe from being exposed to inappropriate material. This act is not…

    • 794 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A firewall is a software program or a piece of information that help screen out hackers, virus, worms and Trojan horse that try to reach to your computer over the internet.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Here you can alter the level of security you want to set for the internet and block websites that you may feel are inappropriate. You need to protect data with a safe password. A password that includes numbers as well as letters will be a lot safer than just a normal word.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    A firewall is a network security hardware and/or software program that is used to control the flow of traffic into and out of a network or computer. When a computer has firewall protection the flow of data is monitored and filtered. Also, firewalls are barriers to unauthorized access; for example, when a person or program requests access to a network it must first get authorization and verification from the firewall and user. Furthermore, firewalls help protect networks from hackers, viruses, and other malicious digital security risks. Finally, a firewall ensures that our computers are not sending dangerous data to outside networks.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The recipe for a strong argument is comprised of two main facets. One is its ability to persuade and the other its ability to reason. It’s possible for an argument to persuade without reason, but if an article lacks reason and fails to persuade it’s left completely exposed. Alice Bailey and Laura Tallman’s article, “Internet filters are gates, not erasers, to protect kids in library” which appeared in 2009 in The Press Democrat, exemplifies an argument that attempts to persuade while lacking credibility, reason and accountability. The focus of Bailey and Tallman’s article is to persuade the reader to support the idea of internet filters in public libraries in attempt to protect children from pornographic images, to which they claim carry incomparable danger. The article uses fear as a means to persuade and to make up for its substantial lack of evidence and organization. It is is scattered with loaded language and proof surrogates while all together presenting a false dilemma to the reader, which is intolerable in a topic that surrounds the First Amendment. For these reasons the “Gates” article is unacceptable and fails as an argumentative piece of writing.…

    • 1926 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Children are also at risk through technology so procedures must be put in place to ensure they are safe while using the internet. One of the polices in our setting to reduce the risk of exposure to potentially harmful or inappropriate material is to block access to unsuitable sites and content. This is called E-safety.…

    • 1161 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internet is an amazing place where people can communicate, transfer and research information, and find entertainment sites. It also allows freedoms that major media enterprises did not have. The concern with the Internet is it contains sites that are not appropriate for children. Some people believe the Internet should be free from censorship while other argue the Internet should be controlled.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the internet changing constantly every day the United States Congress are implementing many legislative acts to address concerns with the usage of different kinds of technology. There are many advances in information technology that resulted in ethical issues such as the creation of the Children’s Internet Protection Act (CIPA) which was put into law in the year of 2000 by Congress. This law addresses any concerns about access to offensive content on the internet in the schools and libraries. Children and teenagers are exposed to the internet daily in schools, public, and at home. The internet can expose children to inappropriate material and predators online. The schools and libraries must enforce an Internet safety policy that contains protection measures, which block or filter the internet access to images that are obscene, child pornography, and what is harmful to minors. The main purpose of the act is to protect children from the dangers that the internet has ("Federal Communications Commission", n.d.).…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    First, there are children in the libraries, and we should protect them from seeing things that they should not see. Children can learn a lot from the internet. There are many sites they can visit to help them with homework. However, their curiosity may lead them to websites not viable for children. The internet filters software can protect them from this danger. Also, most library filters leave the choice of what to block in the hands of the filter administrator who selects the categories to block, so the people ask library staffers the permission to access the websites that are blocked.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Windows Firewall

    • 13700 Words
    • 55 Pages

    A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.…

    • 13700 Words
    • 55 Pages
    Better Essays
  • Satisfactory Essays

    Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Packet filtering is the earliest technology developed to protect the network from dangers in the Internet. It works at network transport layer. A data is split in to several packets and then reassembled back once it has reached its destination. Administrators creates a set of rules which will then be configured to the router, router will then act as a security guard, will either deny or allow packets from passing through. However packet filtering has only limited function, it can only analyze header information in IP packets. For an instance it can all allow or deny specific functions of FTP such as the use of “GET” and “PUT” command (Ogletree, 2000). Packet filtering susceptible to IP Spoofing (Webopedia, 2011). IP Spoofing is used by unauthorized people to gain access to a network, it is a technique done by using the IP address of an authorized or trusted host to enter the network. Advantages of packet filtering Mainly increases the efficiency level by eliminating the processing of overhead by higher level firewall such as proxies. It helps implement choke point as a security strategy because packet filter is installed and monitored in a single location. It also protects network against network sweeping threats and also resolver certain spoofing attacks (Preetham, 20002). Disadvantages of packet filtering Packet filter only checks what protocol, source and destination is used but won’t check on who is trying to access the network. Besides that Trojan horses or viruses can enter into the network using HTTP tunneling (Preetham, 2002).…

    • 1000 Words
    • 4 Pages
    Good Essays