Internet Security

24
INTERNET SECURITY

description

Internet Security

Transcript of Internet Security

Page 1: Internet Security

INTERNET SECURITY

Page 2: Internet Security

WHAT IS INTERNET SECURITY?Internet security is a branch of computer security specifically related to the internet.It’s objective is to establish rules and measures to use against attacks over the internet

Page 3: Internet Security

TYPES OF SECURITY SECURITY

Network layer security IPSec Protocol Electronic mail security (E-mail)

PGP MIME S/MIME

Page 4: Internet Security

NETWORK LAYER SECURITYUses cryptographic methodsUsed for securing communications on internet

Page 5: Internet Security
Page 6: Internet Security

WHAT ARE THE RISK?

Vulnerabilities

Phishing

Virus

Hacking

Trojan horses

Page 7: Internet Security

VULNERABILITIESIn computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance.To be vulnerable, an attacker must have at least one applicable tool or technique that can connect to a system weakness

Page 8: Internet Security
Page 9: Internet Security

IDENTIFYING & REMOVING VULNERABILITIES

Removal methods

constant vigilancebest practices in deployment auditing

Page 10: Internet Security

PHISHINGIn the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Page 11: Internet Security

PHISHING TECHNIQUES

Phishing techniques

Link manipulation Filter evasion Phone phishing

Page 12: Internet Security

LINK MANIPULATION

Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization

The following example link, http://en.wikipedia.org/wiki/Genuine, appears to take you to an article entitled "Genuine"; clicking on it will in fact take you to the article entitled "Deception"

Page 13: Internet Security

FILTER EVASIONPhishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.

Page 14: Internet Security

PHONE PHISHINGNot all phishing attacks require a fake websiteMessages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accountsVishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

Page 15: Internet Security

MAIN TARGETS FOR PHISHING SCAMS

Page 16: Internet Security

WHAT IS COMPUTER VIRUS?

A computer virus is a computer program that can

copy itself and infect a computer

The term "virus" is also commonly but

erroneously used to refer to other types

of malware, including but not limited

to adware and spyware programs that do not

have the reproductive ability

Page 17: Internet Security

HOW DOES IT SPREAD?

Page 18: Internet Security

HOW TO PREVENT VIRUS INVASION?Load only software from original disk or CD’s.Execute only programs of which you are familiar as to their originCheck all shareware and free programs Purchase a virus program that runs as you boot or work your computer

Page 19: Internet Security

HACKINGIn common usage, a hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge.

Page 20: Internet Security

HACKING TECHNIQUES

TECHNIQES

Vulnerability scanner

Passw

ord cr

ackin

g Packet sniffer

Spoofi

ng attack

Social engineering Trojan horses

Vir

use

s

Page 21: Internet Security

HOW WE CAN AVOID THESE RISKS?We must use antivirus software’sWe must use firewall for hacker attacksWe shouldn’t open every filesWhen we receive an email we should be

carefulWe shouldn’t share our personal information

on internetWe shouldn’t accept every file, when we talk

our friends such as msn messenger

Page 22: Internet Security

ROLE OF FIREWALLS IN INTERNET SECURITY

A firewall controls access between networksIt generally consists of gateways and filters which vary from one firewall to anotherFirewalls act as the intermediate server between SMTP and HTTP connections

Page 23: Internet Security

TYPES OF FIREWALLS

FIREWALLS

Packet Filters Circuit-Level GatewaysApplication-Level Gateways

Page 24: Internet Security

A presentation bySREEJITH.SUIT NTA

THANK YOU