Internet Related Security (2)
-
Upload
shweta-tripathi -
Category
Documents
-
view
218 -
download
0
Transcript of Internet Related Security (2)
-
8/13/2019 Internet Related Security (2)
1/22
-
8/13/2019 Internet Related Security (2)
2/22
WHAT IS INTERNET ?
The Internetis a global system of interconnected computernetworksthat use the standard Internet ProtocolSuite(TCP/IP) to serve billions of users worldwide.
It is a network of networksthat consists of millions ofprivate, public, academic, business, and government
networks, of local to global scope, that are linked by a broadarray of electronic, wireless and optical networkingtechnologies.
The Internet can also be defined as a worldwideinterconnection of computers and computer networks thatfacilitate the sharing or exchange of informationamong users.
The Internet carries a vast range of informationresources andservices, such as the inter-linked hypertextdocuments oftheWorld Wide Web(WWW) and the infrastructure tosupport electronic m
http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Userhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/Electronic_mailhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Hypertexthttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Userhttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Internet_Protocol_Suitehttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_network -
8/13/2019 Internet Related Security (2)
3/22
Internet Security?
Spoofing
Replay Attack
-
8/13/2019 Internet Related Security (2)
4/22
What do we Need to Protect?
To Secure Data: Information we keep on computers (product
design, financial records, personnel data)
Lost time, lost sales, lost confidence
Resources Unauthorized use of computer time & space
Reputation Misrepresentation, forgery, negative publicity
-
8/13/2019 Internet Related Security (2)
5/22
Fundamental Security
Objectives
Four fundamental objectives of Info Security
Confidentiality- Protection from unauthorizedpersons
Integrity- consistency of data; no unauthorizedcreation, alteration or destruction
Availability- ensuring access to legitimate users Legitimate use- ensuring appropriate use by
authorized users
-
8/13/2019 Internet Related Security (2)
6/22
6
Who is vulnerable?
Financial institutions and banks Internet service providers
Pharmaceutical companies Government and defense agencies Contractors to various government
agencies Multinational corporations ANYONE ON THE NETWORK
-
8/13/2019 Internet Related Security (2)
7/22
Adware
Cookies
Phishing Spyware
Hackers
BASIC SECURITY ATTACKS:
-
8/13/2019 Internet Related Security (2)
8/22
ADWARES
Installed with Good Programs
Hotbar
Kazaa
Weatherbug
ITS EFFECTS:
Often hijacks your home page.
Continuous popups
Slower computer processing, takes the
computer longerto process or startup.
-
8/13/2019 Internet Related Security (2)
9/22
INTERNET COOKIES
Short pieces of data used by web servers to help identifyweb users
Helpful on shopping sites
ITS EFFECTS: Identifies your IP address during your visit
CAN SEE WHAT WEB PAGES YOU VISIT, HOW OFTEN,AND HOW LON
Identifies your IP address during your visit
-
8/13/2019 Internet Related Security (2)
10/22
Phishing
Sending people e-mail messages in order tolure them into divulging sensitive data
The data sought is commonly passwordsand credit-card details
The sender commonly assumes a relativelyhighly trusted identity e.g. a finl institution
The data is commonly keyed into a web-form
on a site that purports to be operated by thetrusted identity
-
8/13/2019 Internet Related Security (2)
11/22 Tom Stafford, 2004
What isSpyware?
The Spyware is defined as software that aidsin gathering information about a person ororganization without their knowledge, and
that may send that information to anotherentity without user consent Spyware guru Steve Gibson considers it to
be anything that surreptitiously utilizes acomputers Internet back channel tocommunicate with an external server
-
8/13/2019 Internet Related Security (2)
12/22
VIRUS SPYWARE
Damages data Steals sensitive privateinformation.
Written by hackers Written by professional onlinecriminals.
Infection is obvious and can bedetected with anti-virus software.
Infection is silent and cannot bydetected with anti-virus software.
Most computer users are sufficientlyprotected.
Very few computer users areprotected
The threat is decreasing. The threat is increasing.
SPYWARE AND VIRUS
-
8/13/2019 Internet Related Security (2)
13/22
Trojan HorsesSpyware that is often disguised as harmless or even desirableprograms, but is actually designed to cause loss or theft of computer data and todestroy computer systems. They usually arrive as email attachments or bundled
with other software . Somegive attackers unrestricted access to your computeranytimeyoure online, allowing file transfers , adding or deleting of files and
programs, and taking control of your mouse and keyboard.
VirusA software program written to disrupt computer systems and to destroydataviruses are the most well known Internet security threat.
WormsSimilar to viruses but much more dangerous. They spread rapidly by
accessing your email address book and automatically forwarding themselves toevery address it contains. Current anti-virus software cant find worms oncetheyve been loaded ontoyour system.
Web filteringA software tool that allows computer users to determine whichWeb content they will allow onto your computer through their browser.
DIFFERENT TYPES OF SPYWARE :
-
8/13/2019 Internet Related Security (2)
14/22
SECURITY COUNTERMEASURES
THREE PHASE APPROACH
PROTECTION
DETECTION
RESPONSEIR
-
8/13/2019 Internet Related Security (2)
15/22
Different types of Countermeasures for Security
FIREWALL
SPY SWEEPER
Ad-AWARE
NORTON ANTI SECURITY VIRUS
COUNTER SPY
-
8/13/2019 Internet Related Security (2)
16/22
What is a Firewall?
A firewall is hardware, software, or acombination of both that is used to
prevent unauthorized programs orInternet users from accessing a privatenetwork and/or a single computer
-
8/13/2019 Internet Related Security (2)
17/22
How does a firewall work?
Inspects each individual packet of dataas it arrives at either side of the firewall
Inbound to or outbound from yourcomputer
Determines whether it should be allowedto pass through or if it should be blocked
-
8/13/2019 Internet Related Security (2)
18/22
Firewall
Visible
IP
Address
Internal
Network
PC Servers
Host
A system or group of systems that enforces an access control policy between twonetworks.
Firewall
Router
-
8/13/2019 Internet Related Security (2)
19/22
TYPES:Spyware/Adware
ADVANTAGES:
Has immunity that blocks known Spyware/Adware
User friendly
DISADVANTAGES:
Costly($29) Takes a while to scan .
SPY SWEEPER
-
8/13/2019 Internet Related Security (2)
20/22
AD-AWARE 6.0
TYPES:Adware
ADVANTAGE:
EASY TO USE SCANNING . User friendly.
DISADVANTAGES:
Costly($39) It was built to detect Adware
so its lacks ability to detect Spyware
-
8/13/2019 Internet Related Security (2)
21/22
NORTON SYSTEMATIC ANTI VIRUS
TYPES:
Virus,Adware,Spyware.
ADVANTAGE:
Can detect viruses , hacking programs,
spyware programs and adware programs.
Comes with Firewall.
DISADVANTAGES:
Costly($69).
Very confusing to use .
-
8/13/2019 Internet Related Security (2)
22/22
THANK YOUPRESENTED BY:
SARVESH TRIVEDI- 45
SHWETA TRIPATHI-44
TRISHALA SHAH-
SNIGDHA