INTERNET SECURITY

Views:
 
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

INTERNET SECURITY:

INTERNET SECURITY

WHAT IS INTERNET SECURITY?:

WHAT IS INTERNET SECURITY? Internet security is a branch of computer security specifically related to the internet. It’s objective is to establish rules and measures to use against attacks over the internet

TYPES OF SECURITY:

TYPES OF SECURITY SECURITY Network layer securit y IPSec Protocol Electronic mail security (E-mail) PGP MIME S/MIME

NETWORK LAYER SECURITY:

NETWORK LAYER SECURITY Uses cryptographic methods Used for securing communications on internet

WHAT ARE THE RISK?:

WHAT ARE THE RISK? Vulnerabilities Phishing Virus Hacking Trojan horses

VULNERABILITIES:

VULNERABILITIES In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness

IDENTIFYING & REMOVING VULNERABILITIES:

IDENTIFYING & REMOVING VULNERABILITIES Removal methods constant vigilance best practices in deployment auditing

PHISHING:

PHISHING In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

PHISHING TECHNIQUES:

PHISHING TECHNIQUES Phishing techniques Link manipulation Filter evasion Phone phishing

LINK MANIPULATION:

LINK MANIPULATION Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization The following example link, http://en.wikipedia.org/wiki/Genuine, appears to take you to an article entitled "Genuine"; clicking on it will in fact take you to the article entitled "Deception"

FILTER EVASION:

FILTER EVASION Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.

PHONE PHISHING:

PHONE PHISHING Not all phishing attacks require a fake website Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

MAIN TARGETS FOR PHISHING SCAMS:

MAIN TARGETS FOR PHISHING SCAMS

WHAT IS COMPUTER VIRUS?:

WHAT IS COMPUTER VIRUS? A computer virus is a computer program that can copy itself and infect a computer The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability

HOW DOES IT SPREAD?:

HOW DOES IT SPREAD?

HOW TO PREVENT VIRUS INVASION?:

HOW TO PREVENT VIRUS INVASION? Load only software from original disk or CD’s. Execute only programs of which you are familiar as to their origin Check all shareware and free programs Purchase a virus program that runs as you boot or work your computer

HACKING:

HACKING In common usage, a hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge.

HACKING TECHNIQUES:

HACKING TECHNIQUES TECHNIQES Vulnerability scanner Password cracking Packet sniffer Spoofing attack Social engineering Trojan horses Viruses

HOW WE CAN AVOID THESE RISKS?:

HOW WE CAN AVOID THESE RISKS? We must use antivirus software’s We must use firewall for hacker attacks We shouldn’t open every files When we receive an email we should be careful We shouldn’t share our personal information on internet We shouldn’t accept every file, when we talk our friends such as msn messenger

ROLE OF FIREWALLS IN INTERNET SECURITY:

ROLE OF FIREWALLS IN INTERNET SECURITY A firewall controls access between networks It generally consists of gateways and filters which vary from one firewall to another Firewalls act as the intermediate server between SMTP and HTTP connections

TYPES OF FIREWALLS:

TYPES OF FIREWALLS FIREWALLS Packet Filters Circuit-Level Gateways Application-Level Gateways

A presentation by SREEJITH.S UIT NTA:

A presentation by SREEJITH.S UIT NTA THANK YOU

authorStream Live Help