ISP’s Connect You to the World

June 6, 2016 | Views: 4155

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hello there Cybrarians,

As always, I appreciate your huge support and comments. That’s why I’ve decided to write another article today which might be useful for you. I’m going to discuss everything about ISP’s (Internet Service Providers) because many people have asked me, “How does an ISP work and what do they know about us (the clients)?”.

My discussion will be done in Question/Answer format, so we can efficiently explain the most about the ISP’s.

 

Q: What’s an ISP?

A: An ISP is a company that provides access to the Internet, sometimes for a fee. They’re usually acting as a layer between you (the client) and the unfiltered Internet. This company uses multi-layered networking equipment and custom software. Their mission is to filter the Internet, protect your sensitive information and provide fast, safe and stable Internet connections.

 

Q: How do I Choose an ISP?

A: You must be careful and read all the documents before signing the contract because shady ISP’s also exist. Shady ones offer cheap fees, but their clients may not be protected as they should. ISP’s with good reputations are always a better choice. When you’ve found a good ISP, you’ll be ready to contract with them and use their services with trust.

 

Q: What do ISP’s Know About You?

A: They usually know some ID information, the Internet habits and your visited sites (on some level, which is more relevant to their technical handling). They also know some technical and networking data, which will help them optimize the network.

 

Q: What Tools and Methods of Protection do They Use?

A: They usually use more layers of technical and networking equipment, but their core methods are:

  • Monitoring and Filtering: They can monitor the packets that come in and come out, and filter the data with some criteria/rules. This method is used in combination of another technologies, which gives powerful control over the data to the ISP. They can react if they need to.
  • Compression and Optimization: They can compress the data with some equipment or software and optimize the speed of the data at the network level.
  • Anonymity and Encryption: They can encrypt the data between the client and the server on the network layer to make safer connections.
  • Artificial Intelligence: Some mainstream ISP’s use AI, which will analyze the packets on the network and decide an action. This is usually the best automated protection, but these AI modules are really expensive. AI is useful in blocking attacks, filtering malware etc.

 

I hope that this article helped you in understanding ISP’s. Feel free to support me, message me and comment.

Thank you.

 

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
13 Comments
  1. Thank you @Dr3AMCoDeR!

    I know that on any network that might have backdoors open (I don’t know how,) it is possible to insert a Trojan into someone else’s computer, and my question is since the ISP has more access to any other user in the internet, is it possible that they insert a Trojan? If they have a Trojan in their customer’s computers wouldn’t then they be able to send coded software such as key-loggers, screenshot software …etc? Is encryption enough? Firewalls and antiviruses?

    Thanks for sharing!

    • Hi MatrixHacker,

      Thank you for your interesting question, however I have impression that something confuses you regarding the trojans and networks, so I’ll just explain how things work on short.

      I’d like to point out some facts so we all make sure that we are on the same page.

      – The viruses (Generally) are software programs that have usually some bad intention. There are many different types of Viruses including Trojans which are one of the family of viruses. Viruses must be Installed or delivered in some way through the Operating System without being detected.

      – The ISP is the third-party between the “Internet” and the user, but the ISP has also limited control over the networking (packets coming in and coming out) between the user PC and them. In theory, the ISP can redirect the user and indirectly control his navigation, but ISP’s are not allowed to do that because they also must be ethical and don’t break the law.

      I hope that my Answer was useful something for you. Greets.

  2. How about setting up your own server and removing the ISP from the equation. Thoughts?

    • That’s great question. In my opinion, It’s not possible to remove the ISP from the equation because even if you configure your own “direct” connection (which is not direct anyway), you must take the internet data from somewhere else, which usually is from another ISP-like provider/data center. Keep in mind that the Internet is a Big Network which is built from smaller networks and there is no company that owns everything. The Internet is built that way so everything can be with its own identity, organized and understandable for all technology.

  3. Very good one Thanks.Can u make a brief article 🙂

  4. great one very nice.

  5. Thank you for the support guys, I’m glad that I can share some of my experience. I will write another article whenever I have more time.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 295 / December 14, 2019
How do I Get MTA Certified?
Views: 893 / December 12, 2019
How much does your PAM software really cost?
Views: 1344 / December 10, 2019
How Do I Get into Android Development?
Views: 1723 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel