Types of Internet Security Procedures